Lists (1)
Sort Name ascending (A-Z)
Stars
AutoGPT is the vision of accessible AI for everyone, to use and to build on. Our mission is to provide the tools, so that you can focus on what matters.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
real time face swap and one-click video deepfake with only a single image
Impacket is a collection of Python classes for working with network protocols.
HTTP Request & Response Service, written in Python + Flask.
The Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes the technical processes for verifying the contr…
E-mails, subdomains and names Harvester - OSINT
Prowler is an Open Cloud Security tool for AWS, Azure, GCP and Kubernetes. It helps for continuos monitoring, security assessments and audits, incident response, compliance, hardening and forensics…
An open source implementation of CLIP.
Fast subdomains enumeration tool for penetration testers
📱 objection - runtime mobile exploration
Prevent cloud misconfigurations and find vulnerabilities during build-time in infrastructure as code, container images and open source packages with Checkov by Bridgecrew.
An implementation of model parallel autoregressive transformers on GPUs, based on the Megatron and DeepSpeed libraries
WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.
Uses some known methods that attempt to minimize tracking in Windows 10
This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public expl…
Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and share th…
Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.
Universal and Transferable Attacks on Aligned Language Models
Tool to look for several security related Android application vulnerabilities
The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.
An OSINT tool to search for accounts by username and email in social networks.
Automated NoSQL database enumeration and web application exploitation tool.