Highlights
Lists (13)
Sort Name ascending (A-Z)
😎 cool stuff
a handful of projects I think are really neat🏡 cti operations
tools and platforms for disseminating and consuming a range of threat intelligence🧰 cyber tools
useful tools for security development, hacking & testing⚙️ data ops
platforms and tools for mangling and managing large datasets🍯 deception
a collection of honeypot frameworks, platforms & canaries🛠️ dns utilities
tools for manipulating, getting data out of & working with nameservers🐾 fingerprinting
tools for identifying and fingerprinting internet protocols🤳🏼 image utilities
tools for working with stego, redaction, exif and others⚙️ misc reconnaisance
tools for discovering data and uncovering info from a range of sources🌐 net ops
tools for scaling, tracing, capturing and creating packets🕵🏼♀️ social reconnaisance
useful projects for open-source led investigations across social platforms🧌 system administation
useful utilities for keeping the lights on and maintaining infrastructure📚 useful lists
great aggregators for various technologies, practices and processesStars
VPN client in a thin Docker container for multiple VPN providers, written in Go, and using OpenVPN or Wireguard, DNS over TLS, with a few proxy servers built-in.
NviWatch: A blazingly fast rust based TUI for managing and monitoring NVIDIA GPU processes
Deploy headless browsers in Docker. Run on our cloud or bring your own. Free for non-commercial uses.
The recursive internet scanner for hackers. 🧡
Proxy written in golang that will emulate a PBS server and work on one or more S3 buckets
Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.
Comfortably monitor your Internet traffic 🕵️♂️
Close-Circuit Telegram Vision revolutionizes location tracking with its open-source design and Telegram API integration. Offering precise tracking within 50-100 meters, users can monitor others in …
Instant voice cloning by MIT and MyShell. Audio foundation model.
A patched version of discord, with bot login & Vencord support
Cross-platform Rust rewrite of the GNU coreutils
spiders the bitcoin network and returns ip:port ipv4/ipv6
A curated list of annual cyber security reports
Tor Browser automation with Selenium.
ExifLooter finds geolocation on all image urls and directories also integrates with OpenStreetMap
A very complete, highly tested, standards-driven (but customizable) EXIF reader/writer lovingly written in Go.
Quick ELA check on an image to help determine if it's real or "photoshopped". Will produce an ELA and overlay that on the original image to help determine if there are janky bits worth looking clos…
An open-source digital image forensic toolset
Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.
Find exposed data in Azure with this public blob scanner
This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and how they can be mitigated or detected.
This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage cloud providers.