Showing 34 of 34 projects
A comprehensive collection of payloads and bypass techniques for web application security testing and penetration testing.
A comprehensive collection of payloads and bypass techniques for web application security testing and penetration testing.
A fast, automated tool that decrypts encryptions, decodes encodings, and cracks hashes without prior knowledge of the key or cipher.
A modern, fast port scanner with a scripting engine and adaptive learning, capable of scanning all 65k ports in 3 seconds.
A modern, fast port scanner that finds all 65k ports in 3 seconds and features a scripting engine for extensibility.
A modern, fast port scanner with a scripting engine that can scan all 65k ports in 3 seconds.
A portable, extensible framework for network reconnaissance and MITM attacks on WiFi, BLE, HID, CAN-bus, IPv4, and IPv6 networks.
A curated collection of hacking tutorials, tools, and resources for security education and penetration testing.
A curated collection of hacking tutorials, tools, and resources for security professionals and enthusiasts.
A comprehensive collection of hacking tools, resources, and references for learning and practicing ethical hacking and penetration testing.
A fast, passive subdomain enumeration tool for security researchers and penetration testers.
A curated list of movies and TV shows every hacker and cyberpunk enthusiast must watch.
A PowerShell framework for offensive security, penetration testing, and red teaming with scripts for all phases.
A curated collection of interesting, funny, and concerning search queries for Shodan.io to find exposed devices and services.
An automated cyber security platform for adversary emulation, red teaming, and incident response built on the MITRE ATT&CK framework.
A curated list of resources for learning and practicing web application security, including tools, books, courses, and vulnerable labs.
A customizable, easy-to-use Capture The Flag framework for running cybersecurity competitions.
A next-generation web scanner that identifies websites and their technologies using over 1800 plugins with configurable aggression levels.
A comprehensive, free information security reference covering techniques, tools, tactics, and resources for learning and professional development.
A Python-based hacking tool for remotely exploiting Android devices via ADB and Metasploit to gain Meterpreter sessions.
An intentionally vulnerable Kubernetes cluster environment for hands-on security training and practice.
A penetration testing tool that discovers and accesses RTSP video surveillance cameras through network scanning and dictionary attacks.
A curated collection of security conference talks and videos from events like DEF CON, Black Hat, and BSides.
A curated list of resources for learning about vehicle security, car hacking, and automotive tinkering.
A browsable archive of decrypted NSA exploit tools and implants leaked by the Shadow Brokers in 2017.
A pure JavaScript steganography module that hides secrets inside text using invisible unicode characters, secured with passwords and encryption.
A curated collection of resources for 2G/3G/4G/5G cellular security research, including tools, papers, and hardware guides.
An open-source firmware security analyzer for embedded Linux devices, performing extraction, static/dynamic analysis, SBOM generation, and vulnerability reporting.
A Network Forensic Analysis Tool (NFAT) for deep inspection of PCAP files and live traffic, extracting credentials, building network maps, and reconstructing sessions.
A curated list of free, hands-on educational resources for learning cybersecurity through practical exercises and CTF challenges.
A Python tool for mapping and tracking WiFi networks and devices through raw 802.11 monitoring, similar to nmap for wireless networks.
A stealthy command and control framework that persists on webservers via a polymorphic PHP one-liner backdoor.
A Linux Kernel Module (LKM) rootkit for hiding processes, granting root privileges, and making files invisible.
A collection of notes, scripts, and techniques for exploiting vulnerabilities and attacking Jenkins servers.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.