Showing 36 of 37 projects
An open-source penetration testing tool that automates SQL injection detection and database takeover.
An advanced XSS detection suite that uses context analysis and intelligent payload generation to find vulnerabilities.
A rogue Access Point framework for conducting Wi-Fi security testing and phishing attacks during red team engagements.
A terminal-based HTTP client for keyboard-centric API testing and development workflows.
A Python tool for fast subdomain enumeration using OSINT and bruteforce, designed for penetration testers and bug hunters.
A lightweight, dependency-free tool that bootstraps your dotfiles with a simple install script.
A modular web application fuzzer that replaces FUZZ keywords with payloads to test parameters, authentication, forms, and directories.
A Python-based serial utility for flashing, provisioning, and interacting with Espressif SoCs.
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation.
pyinfra turns Python code into shell commands and runs them on your servers for fast, scalable infrastructure automation.
A security auditing tool for SSH server and client configurations, analyzing algorithms, vulnerabilities, and policy compliance.
A static website generator with a built-in admin UI and desktop app for managing content.
A multi-threaded Python brute-forcing tool with a modular design for reliable and flexible password guessing attacks.
A Python tool that pulls infrastructure assets and relationships from AWS, GCP, Azure, and 30+ other platforms into a Neo4j graph for security analysis.
A high-performance offensive security tool for reconnaissance, vulnerability scanning, and information gathering.
An automated Python tool for auditing and exploiting NoSQL database vulnerabilities and web application injection attacks.
A free Mac OS X computer forensics tool that parses system artifacts, extracts user data, and verifies file reputation.
A Python tool for auditing SSH server configurations, security, and compatibility.
Find origin servers of websites behind CloudFlare or CloudFront using Censys internet-wide scan data.
A tool for translating Dalvik bytecode to Java bytecode, enabling Java analysis tools to work with Android applications.
A Python tool for mapping and tracking WiFi networks and devices through raw 802.11 monitoring, similar to nmap for wireless networks.
Detects Bitcoin arbitrage opportunities across multiple cryptocurrency exchanges and supports automated trading.
A free software toolkit for performing DoS/DDoS attacks and creating encrypted P2P networks.
Monitor GitHub for sensitive information leaks in near real-time and send alert notifications.
A Python tool that scans HTTP servers for publicly accessible secret files and security vulnerabilities like git repos and backup files.
Generate HTML5 slideshows from Markdown, reStructuredText, or Textile markup.
A graphical tool for custom wordlist generation using human password paradigms, with output for Hashcat and John the Ripper.
An open-source OSINT tool that automates Twitter intelligence analysis by extracting and structuring user data, activity, and geolocation information.
A Python security analysis tool that automatically discovers and reports comprehensive information about a given domain.
A Python tool that sniffs sensitive credentials and data from network interfaces or pcap files across multiple protocols.
A Python tool that generates YARA rules for malware detection by filtering out strings and opcodes that appear in goodware.
A user-level tool to execute Docker containers without root privileges, enabling container usage in batch systems and restricted environments.
An obfuscation-neglect Android malware scoring system that analyzes APKs for malicious behavior patterns.
A fast, straightforward, reliable tool for performing massive, automated code refactoring using custom Python patterns.
A Python tool for calculating RSA and RSA-CRT cryptographic parameters and generating OpenSSL-compatible keys.
A tool for quickly evaluating IAM permissions and identifying security risks in AWS accounts through graph-based analysis.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.