Starred repositories
Crack Interface lockscreen, Metasploit and More Android/IOS Hacking
Porch Pirate is the most comprehensive Postman recon / OSINT client and framework that facilitates the automated discovery and exploitation of API endpoints and secrets committed to workspaces, colβ¦
Web Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security professionals & bug-hunters
An automated target reconnaissance pipeline.
[Draft]Awesome Cyber Security Resource Collection. Currently contains 8000+ open source repositories, and not very well classified. For each repository, extra info included: star count, commit counβ¦
a recon tool that finds sensitive data inside the screenshots uploaded to prnt.sc
Quickly Extracts IP's, Email Addresses, Hashes, Files, Credit Cards, Social Security Numbers and a lot More From Text
Search Google/Bing/Ecosia/DuckDuckGo/Yandex/Yahoo for a search term (dork) with a default set of websites, bug bounty programs or custom collection.
ASN / RPKI validity / BGP stats / IPv4v6 / Prefix / URL / ASPath / Organization / IP reputation / IP geolocation / IP fingerprinting / Network recon / lookup API server / Web traceroute server
Take a list of domains, crawl urls and scan for endpoints, secrets, api keys, file extensions, tokens and more
Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email
SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.
Hourly updated database of exploit and exploitation reports
π Curated list about cryptocurrency security (reverse / exploit / fuzz..)
Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)
π£ Remotely render any nearby iPhone or iPad unusable with an AirDrop exploit (now patched)
π© π€π» [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337
πA curated list of modern Android exploitation conference talks.
Commodity Injection Signatures, Malicious Inputs, XSS, HTTP Header Injection, XXE, RCE, Javascript, XSLT
Android Penetration Tool [ RAT for Android ]
Android RAT with web panel and undetectable App
Proof of concept for abusing Telegram's "People Near Me" feature and tracking people's location
A collection of android Exploits and Hacks