Starred repositories
A comprehensive guide for FL Studio MIDI scripting
Mozilla Monitor arms you with tools to keep your personal information safe. Find out what hackers already know about you and learn how to stay a step ahead of them.
Rewrite of the popular wireless network auditor, "wifite"
Open source large document set visualization platform
A swiss army knife for pentesting networks
A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
seedbox installation script for Ubuntu and Debian systems
USA based Information Security & I.T. Conferences
Official Black Hat Arsenal Security Tools Repository
🎨 A curated list of delightful VS Code packages and resources.
EXTREME PROXY HARVESTER AND CHECKER By Jeff Childers Harvest and Check Free Proxies. Check For Alive and Anonymous Proxies. This Requires NO Database and This Can Be Executed On A Shared Hosting Pl…
This repository is maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), AI security,…
This is a wifi Brute Force. script undetectable and secure!
[Draft]Awesome Cyber Security Resource Collection. Currently contains 8000+ open source repositories, and not very well classified. For each repository, extra info included: star count, commit coun…
Silentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.
Scrapes the web for reliable http or https proxies and prints them to stdout. Can also be used as a python library to easily generate reliable proxies for use within Python applications.
Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.
The Official Bash Bunny Payload Repository
Payloads for the Hak5 Bash Bunny
Payloads for the Hak5 Bash Bunny
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
Wordlists sorted by probability originally created for password generation and testing
Qt Port for Linux, Mac OSX and Windows