> cat /dev/github | grep security-tools

~/hackyfeed $

A cybersecurity tools aggregator โ€” discover the latest pentesting, red team, and offensive security tools from GitHub.

sort: ( this page )

domain-digger

AI Summary: Domain Digger is a comprehensive domain analysis toolkit designed to provide detailed insights into domain information through a user-friendly interface. Its primary use case includes performing DNS lookups, WHOIS inquiries, and IP geolocation, while notable features include intelligent search suggestions, a visual DNS map, and support for multiple DNS resolvers, enhancing both the depth and efficiency of domain investigations.


README

Do you enjoy using Domain Digger? Leave a star! ๐ŸŒŸ

domloggerpp

AI Summary: DOMLoggerpp is a browser extension designed for monitoring, intercepting, and debugging JavaScript sinks through customizable configurations. It features regex-based domain management, flexible hooking options, on-demand debugging breakpoints, a dynamic notification system, and an integrated Devtools log panel for enhanced log management and filtering. This tool is especially useful for developers and security professionals looking to analyze and debug JavaScript execution flows within web applications.


README


A browser extension that allows you to monitor, intercept, and debug JavaScript sinks based on customizable configurations.
GitHub release (latest by date)

Dorks-collections-list

AI Summary: Dorks-collections list is a comprehensive repository that aggregates various search engine dorks tailored for cybersecurity professionals, penetration testers, and researchers. It features organized links to dork lists across multiple platforms such as Google, Shodan, and GitHub, facilitating targeted searches for sensitive data and vulnerabilities. Notable features include specific sections for different types of dorks, including those for detecting sensitive files, SQL injection vulnerabilities, and administrative panels, alongside automation tools and browser extensions for streamlined usage.

dotenv

AI Summary: Dotenv is a lightweight Node.js module that simplifies the management of environment variables by loading them from a .env file into process.env. Its primary use case is to separate application configuration from code, following best practices as outlined in The Twelve-Factor App methodology. Notable features include support for multiline values, custom path configuration, and the ability to preload the module without explicit imports in application code.


README

dotenv NPM version downloads

dotenv

Dotenv is a zero-dependency module that loads environment variables from a .env file into process.env. Storing configuration in the environment separate from code is based on The Twelve-Factor App methodology.

dotenvx

AI Summary: Dotenvx is a secure dotenv tool that allows developers to manage environment variables across multiple platforms and programming languages. Its primary use case is to enhance the safety and flexibility of environment variable handling by providing support for encrypted environment files and easy integration into existing applications. Notable features include cross-platform compatibility, multi-environment management, and straightforward installation options via various package managers and direct execution methods.


README

dotenvx

doublepulsar-detection-script

AI Summary: The DoublePulsar Detection Script is a Python tool designed to identify the presence of the DoublePulsar implant on systems through SMB and RDP protocols. It supports scanning single IPs or lists of IPs with multi-threading capabilities, and includes functionality for remote uninstall of the implant for remediation. Key features include detection capabilities for both protocols, an early release for urgent network compromise identification, and associated Snort signatures for enhanced detection.

dpt-shell

AI Summary: dpt-shell is an Android Dex protection tool designed to hollow out method implementations within DEX files, facilitating runtime reconstruction for enhanced protection of Android applications. Primary use cases include securing APKs and AABs against reverse engineering, with notable features such as customizable protection configurations, exclusion of specific ABIs, and the ability to dump DEX code items for analysis.


README

dpt-shell

English | ็ฎ€ไฝ“ไธญๆ–‡

dpt-shell is an Android Dex protection shell that hollows out Dex method implementations and reconstructs them at runtime.

dradis-ce

AI Summary: Dradis is an open-source collaboration framework designed for automated penetration testing report generation, enabling InfoSec teams to streamline reporting processes by importing data from various security tools like Burp Suite and Nessus. Its notable features include platform independence, markup support for notes, and a powerful extensions interface that enhances flexibility and usability. Dradis aims to generate consistent and professional pentest reports while minimizing manual efforts, thereby allowing teams to focus on analysis and recommendations.

drakvuf

AI Summary: DRAKVUF is an agentless, virtualization-based binary analysis tool designed for in-depth execution tracing of arbitrary binaries, including operating systems. Its primary use case is malware analysis, leveraging minimal footprint to remain stealthy during the examination process while supporting a range of Windows and Linux environments. Notable features include the ability to operate without installing additional software in the virtual machine and compatibility with hardware virtualization extensions in Intel CPUs.

droidReverse

AI Summary: droidReverse is a comprehensive toolkit for Android reverse engineering, integrating multiple tools for decompiling APK files and analyzing bytecode. Its primary use case is facilitating the examination and modification of Android applications by converting APKs to readable formats and supporting various analysis capabilities, including malware detection. Notable features include support for multiple decompilation techniques, a graphical user interface for various tools, and capabilities for dynamic editing and package management.

dronesploit

AI Summary: DroneSploit is a command-line interface framework designed for penetration testing of light commercial drones, leveraging techniques and exploits similar to Metasploit. It allows users to interactively conduct security assessments on drone systems, with features that include a variety of modules for specific drone payload alterations such as changing passwords or SSIDs. The framework’s structure facilitates easy extension and integration of new hacking techniques.


README

DroneSploit Tweet

Easily pentest drones.

PyPi Read The Docs Python Versions Known Vulnerabilities DOI Black Hat Arsenal Europe 2019 License Contribution

DumpsterFire

AI Summary: The DumpsterFire Toolset is a cross-platform, modular tool designed for creating automated, time-delayed security events suitable for both Red and Blue Team exercises. Its primary use case is to facilitate realistic cyber incident simulations and training by allowing users to build customizable event chains that can generate network and filesystem artifacts, enhancing incident response capabilities. Notable features include dynamic extensibility for adding custom event modules, a menu-driven interface for ease of use, and the ability to run exercises in a controlled manner without direct supervision.

dumpulator

AI Summary: Dumpulator is a dynamic code emulation library designed for analyzing minidump files, facilitating the reverse engineering of malware and other binaries. Its primary use case includes emulating function calls and tracing execution paths within dumped memory structures, allowing users to decrypt strings and execute code snippets easily. Notable features comprise memory allocation, UTF-16 string reading, and the ability to trace execution for debugging purposes, all while presenting a clean interface for integration within Python scripts.

Dwarf

AI Summary: Dwarf is a versatile debugger designed for reverse engineers, crackers, and security analysts, facilitating the analysis of applications on various platforms, including Android, iOS, and local environments. Leveraging PyQt5 and Frida, it offers features such as a debugging UI, session management with agent integration, and the ability to trace Java and native functions, enabling users to conduct detailed investigations into application behavior. Additionally, Dwarf supports scripting with a dedicated API that enhances productivity through autocompletion and inline documentation.

e9patch

AI Summary: E9Patch is a static binary rewriting tool designed for x86_64 Linux ELF binaries that enables users to modify and patch binaries without introducing dependencies, making the output a drop-in replacement. Notable features include its scalability for large binaries, fast rewriting capability, low overhead performance, and programmability for integration with other projects. With functionalities such as instruction instrumentation and various supported modes, E9Patch can effectively enhance binary behavior for tasks such as fuzzing and system call interception.

edb-debugger

AI Summary: edb-debugger is a cross-platform debugger that supports AArch32, x86, and x86-64 architectures, facilitating development and debugging across multiple operating systems, with Linux as the officially supported platform. Notable features include a user-friendly interface, compatibility with modern compilers and libraries, and ongoing development for additional platforms such as FreeBSD, OpenBSD, OSX, and Windows. The tool aims to replicate and extend the capabilities of Ollydbg while adding multi-architecture support.


README

Gitter Build Status Build status License Paypal

eDBG

AI Summary: eDBG is a lightweight CLI debugger based on eBPF, designed for Android ARM64 platforms, which offers enhanced resistance to anti-debugging mechanisms compared to traditional ptrace-based debuggers. Its notable features include a user-friendly CLI interface akin to pwndbg, support for standard debugging functionalities, and a file and offset-based breakpoint registration system that facilitates fast startup and multi-threaded or multi-process debugging. Additionally, eDBG operates without direct program attachment, enabling stable dynamic analysis with minimal intrusion.

efiXplorer

AI Summary: efiXplorer is an IDA plugin and loader designed for the analysis and automation of reverse engineering UEFI firmware. Its primary use case is to facilitate the discovery of vulnerabilities in UEFI firmware through automated static analysis, and it provides features that enhance the recovery of service function calls within such firmware. Notably, it supports integration with various hex-ray tools and includes comprehensive documentation for installation and usage.


README

License: GPL v3 efiXplorer CI

EggShell

AI Summary: EggShell is a post-exploitation surveillance tool developed in Python, designed for establishing command line sessions on target machines with extended functionalities. Notable features include file uploading/downloading, tab completion, command execution, photo capturing, and device location tracking, with enhanced security through SSL and support for Linux and iOS in version 3.0.0. This tool serves as a proof of concept for penetration testing on devices that users own.


README

EggShell

About

EggShell is a post exploitation surveillance tool written in Python. It gives you a command line session with extra functionality between you and a target machine. EggShell gives you the power and convenience of uploading/downloading files, tab completion, taking pictures, location tracking, shell command execution, persistence, escalating privileges, password retrieval, and much more. This is project is a proof of concept, intended for use on machines you own.

ElectricEye

AI Summary: ElectricEye is a comprehensive Python CLI tool designed for multi-cloud and multi-SaaS environments that focuses on Asset Management, Security Posture Management, and Attack Surface Monitoring. It supports over 100 services and conducts more than 1000 checks aligned with over 20 regulatory and best practice frameworks, enabling organizations to enhance their cloud security and compliance effortlessly. Notable features include cross-Account, cross-Region capabilities and support for major platforms like AWS, GCP, Azure, and more, making it a versatile solution for managing diverse cloud architectures.

elpscrk

AI Summary: Elpscrk is an intelligent password generation tool designed to create permutations based on user-provided information about a target, effectively generating potential passwords through statistical methodologies. It offers six complication levels ranging from simple to highly complex, enabling tailored password generation based on the user’s customization needs. Notably, Elpscrk is memory efficient and capable of producing up to one million password combinations, making it a powerful option for password profiling and security analysis.

EmailAll

AI Summary: EmailAll is a powerful email collection tool designed to aggregate email addresses from various online sources, including search engines and datasets. Its primary use case is to support cybersecurity professionals in gathering emails for domain reconnaissance, and it features integration with multiple API services for data retrieval along with modular results storage in JSON format. The tool allows easy configuration for proxies and APIs, enhancing its flexibility for various deployment environments.

emploleaks

AI Summary: EmploLeaks is an Open Source Intelligence (OSINT) tool that facilitates the gathering of employee information from companies, primarily utilizing LinkedIn to extract employee lists and personal email addresses. Notable features include the ability to search a custom COMB database for leaked passwords using the retrieved emails, and an extension for identifying personal code repositories on GitLab. The tool requires Python for installation and offers a user-friendly command-line interface for executing its functionalities.

EntityFramework-Reverse-POCO-Code-First-Generator

AI Summary: The EntityFramework Reverse POCO Code First Generator is a tool designed to reverse engineer existing databases and generate fully customizable Entity Framework Code First POCO classes along with configuration mappings and DbContext setups. Its primary use case is to facilitate the rapid creation of data access code that mimics hand-crafted designs, enhancing readability and maintainability. Notable features include support for multiple database types (including SQL Server and PostgreSQL), customizable output through template files, and integration with Visual Studio via a VSIX installer.

enum4linux-ng

AI Summary: enum4linux-ng is an advanced enumeration tool designed for extracting information from Windows and Samba systems, primarily targeted at security professionals and CTF participants. It builds on the capabilities of the original enum4linux by incorporating enhanced output parsing, allowing for findings to be exported in YAML or JSON formats, and implementing features such as multiple authentication methods, smart enumeration, and support for both IPv6 and SMBv1.


README

enum4linux-ng

A next generation version of enum4linux