COLLECTED BY
Organization:
Internet Archive
The Internet Archive discovers and captures web pages through many different web crawls.
At any given time several distinct crawls are running, some for months, and some every day or longer.
View the web archive through the
Wayback Machine .
The Wayback Machine - https://web.archive.org/web/20210905085243/https://github.com/topics/infosec
Here are
958 public repositories
matching this topic...
Exploitation Framework for Embedded Devices
Updated
Aug 27, 2021
Python
Updated
Sep 4, 2021
Python
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Updated
Sep 5, 2021
Python
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
Updated
Jul 24, 2021
PowerShell
Damn Vulnerable Web Application (DVWA)
A collection of open source and commercial tools that aid in red team operations.
A curated list of awesome infosec courses and training resources.
A list of interesting payloads, tips and tricks for bug bounty hunters.
Hetty is an HTTP toolkit for security research.
⬆️ ☠️ Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, polkit, docker socket
A collected list of awesome security talks
Collaborative Penetration Test and Vulnerability Management Platform
Updated
Sep 3, 2021
Python
巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
Updated
Mar 16, 2021
Python
🔍 A collection of interesting, funny, and depressing search queries to plug into
https://shodan.io/ 👩💻
A collection of all the data i could extract from 1 billion leaked credentials from internet.
Hide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️⭐
Updated
Aug 13, 2021
JavaScript
🔐 Security advisories as a simple composer exclusion list, updated daily
A python script that finds endpoints in JavaScript files
Updated
Jan 5, 2021
Python
💻 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Updated
Sep 2, 2021
Jupyter Notebook
Awesome Node.js Security resources
Updated
Aug 11, 2021
JavaScript
📡 A python program to create a fake AP and sniff data.
Updated
Nov 3, 2019
Python
Scan for open S3 buckets and dump the contents
Updated
Apr 24, 2021
Python
A proposed standard that allows websites to define security policies.
Updated
Jul 11, 2021
HTML
This challenge is Inon Shkedy's 31 days API Security Tips.
Subdomain Takeover tool written in Go
Improve this page
Add a description, image, and links to the
infosec
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
infosec
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.
Can we have a feature where a normal brute force is running based on HTTP response like 403/401 do a recursive brute force on that endpoint?