> cat /dev/github | grep security-tools

~/hackyfeed $

A cybersecurity tools aggregator — discover the latest pentesting, red team, and offensive security tools from GitHub.

sort: ( this page )

epicgames-freegames-node

AI Summary: EpicGames-FreeGames-Node is an automated tool designed to log into the Epic Games Store and identify available free games efficiently. Its primary use case is to simplify the process of retrieving checkout links for free games across multiple user accounts and can be executed on a scheduled basis. Notable features include support for JSON configuration, multiple notification mechanisms (such as email, Discord, and Telegram), and the ability to handle device code authentication for logging in.

ESP32-DIV

AI Summary: ESP32-DIV is an open-source multi-band wireless toolkit based on the ESP32, designed for wireless testing, signal analysis, jammer development, and protocol spoofing across Wi-Fi, BLE, 2.4GHz, and Sub-GHz frequency bands. Notable features include real-time packet monitoring, Wi-Fi deauthentication attacks, Bluetooth advertisement spoofing, and Sub-GHz command replay capabilities. The toolkit is intended strictly for educational and research purposes to ensure ethical usage in wireless security assessments.


README

ESP32-DIV

ESP32DIV - Advanced Wireless Toolkit

espoofer

AI Summary: espoofer is an open-source tool designed to assess vulnerabilities in email systems related to SPF, DKIM, and DMARC authentication protocols. It aims to aid mail server administrators and penetration testers in identifying potential weaknesses that could be exploited for email spoofing attacks. Notable features include three operational modes—server, client, and manual—that facilitate comprehensive testing of both sending and receiving services.


README

espoofer

espoofer is an open-source testing tool to bypass SPF, DKIM, and DMARC authentication in email systems. It helps mail server administrators and penetration testers to check whether the target email server and client are vulnerable to email spoofing attacks or can be abused to send spoofing emails.

ethereum-lists

AI Summary: Ethereum-lists is a collaborative repository that maintains and updates lists of malicious URLs, fake token addresses, Ethereum addresses, and contract details, facilitating community contributions through pull requests. Its primary use case is to serve as a resource for users to identify and avoid phishing attempts and fraudulent tokens within the Ethereum ecosystem. Notable features include an easily accessible structure for submitting changes and clear guidelines for contributions, promoting community involvement in enhancing security awareness.

Ethical-Hacking-Labs

AI Summary: Ethical Hacking Labs is a comprehensive educational resource designed for students and professionals in the cybersecurity field, providing a hands-on approach to learning ethical hacking techniques. It includes a series of tutorials that cover essential topics such as networking, system administration, and various ethical hacking methodologies, from basic to advanced practices. Notable features include practical labs, foundational modules on core knowledge, and guidance on using tools like Metasploit, Maltego, and Recon-ng for effective penetration testing and reconnaissance.

Ethical-Hacking-Tools

AI Summary: Ethical-Hacking-Tools is a repository that provides a curated collection of tools and resources for ethical hacking and penetration testing. Its primary use case is to assist cybersecurity professionals in identifying and addressing vulnerabilities within computer systems and networks. Notable features include links to various Linux distributions optimized for security testing, such as Kali Linux and Parrot OS, along with educational content on hacking practices and hacker classifications.


README

Ethical-Hacking-Tools


forthebadge

evil-winrm

AI Summary: Evil-WinRM is a versatile Ruby-based tool designed for penetration testing that facilitates remote command execution via Windows Remote Management (WinRM) protocol. It supports advanced features such as in-memory script and DLL execution, pass-the-hash and Kerberos authentication, SSL, and customizable logging, making it particularly effective for post-exploitation scenarios. The tool is compatible with both Linux and Windows clients, providing a robust interface for querying and managing remote Windows systems while bypassing some antivirus defenses.

evillimiter

AI Summary: Evil Limiter is a network management tool designed to monitor, analyze, and control the bandwidth of devices on a local network without needing physical or administrative access. Utilizing ARP spoofing and traffic shaping techniques, it enables users to throttle upload and download speeds for specific hosts, block internet connections, and manage network resources effectively through a command-line interface. Notable features include automatic network configuration detection, the ability to scan IP ranges, and manage hosts dynamically with various commands for limiting and unblocking access.

EvilOSX

AI Summary: EvilOSX is a Remote Administration Tool (RAT) designed for macOS that enables stealthy monitoring and control of compromised systems. It boasts features such as terminal emulation, module extensibility, and the ability to retrieve sensitive user data like passwords and iCloud tokens, all while remaining undetected by antivirus solutions through encrypted payloads. Additionally, it includes functionalities for taking screenshots, recording audio, and executing local privilege escalation attempts, making it a potent tool for unauthorized system access and data exfiltration.

evilwaf

AI Summary: EvilWAF is a sophisticated transparent MITM Firewall bypass proxy and deep WAF vulnerability scanner designed for authorized security testing purposes. It operates at the transport layer, allowing seamless integration with various security tools while employing advanced techniques such as TCP and TLS fingerprint rotation, source port manipulation, and automated WAF detection to evade defensive mechanisms. Notable features include a comprehensive multi-layer WAF scanning capability, direct origin bypass, and a robust IP rotation strategy through Tor and proxy pools, ensuring effective assessment of firewall vulnerabilities.

Exegol

AI Summary: Exegol is a modular cybersecurity environment tailored for offensive security professionals, addressing traditional security distribution challenges. Its primary use case is for hackers and security experts who require a reliable toolkit for field operations. Notable features include its customizable structure and community-driven design, enhancing usability and effectiveness in practical cybersecurity applications.


README

banner

Exegol is a comprehensive cybersecurity environment designed by offensive security experts, for fellow hackers, with its community. It solves the common pain points of traditional security distributions by providing a modular and reliable toolkit that’s made for the field.

exphub

AI Summary: Exphub is a vulnerability exploitation script repository containing various Proof of Concept (PoC) and exploit scripts for commonly exploited vulnerabilities across platforms like Weblogic, Struts2, Tomcat, and Drupal. It includes detailed usage documentation for a wide range of scripts, such as remote command execution (RCE) and Webshell uploader scripts, all of which have been tested for effectiveness. The tool aims to streamline the process of vulnerability scanning and exploitation by consolidating multiple scripts for easy access and execution.

exploitnotes

AI Summary: Exploit Notes is a comprehensive resource platform designed for security research, focusing on hacking techniques and tools applicable to penetration testing, bug bounty programs, and Capture The Flag (CTF) challenges. It encompasses a wide array of topics including reconnaissance, various operating systems, web applications, databases, networks, and emerging technologies such as AI and blockchain. Users can leverage this repository for educational purposes, with the option to run it locally via a straightforward setup process.

extract_otp_secrets

AI Summary: The extract_otp_secrets tool is a Python script designed to extract one-time password (OTP) secrets from QR codes generated by two-factor authentication applications, such as Google Authenticator. It supports multiple input methods, including live capture from a camera, image files, and text files from external QR code readers, while allowing users to export the extracted secrets to JSON or CSV formats or print them as QR codes. Notable features include a built-in GUI for live QR code capture and flexible output options.

eyeballer

AI Summary: Eyeballer is a tool designed for large-scope network penetration testing, specifically aimed at identifying potentially vulnerable web hosts from a vast collection of screenshots. It employs machine learning to classify sites into categories such as “Old-Looking Sites,” “Login Pages,” and “Parked Domains,” allowing users to prioritize targets based on their likelihood of containing vulnerabilities. Notable features include support for GPU usage, a user-friendly setup process, and integration with popular screenshotting tools like EyeWitness and GoWitness.

f8x

AI Summary: f8x is an automated deployment tool focused on Infrastructure as Code (IaC) that leverages Terraform and Wails to facilitate multi-cloud deployment and project orchestration. Its primary use case includes setting up various environments for Red/Blue team operations, providing options for batch installations of essential tools, and deploying specific environments such as CTFs and middleware with minimal dependencies. Notable features include a variety of installation options for development and pentesting environments, and full compatibility with multiple Linux distributions.

Facebook-BugBounty-Writeups

AI Summary: The Meta(Facebook) Bug Bounty Writeups repository compiles a collection of documented vulnerabilities discovered on Facebook, showcasing varying bounty rewards ranging from account takeovers to remote code execution. Its primary use case is to serve as a resource for security researchers and ethical hackers to share and learn from reported vulnerabilities in Meta’s platforms. Notable features include a chronological organization of writeups, contributing guidelines, and links to detailed analysis articles for each reported bug.

fail2ban

AI Summary: Fail2Ban is a security tool that monitors log files for multiple failed authentication attempts, automatically banning IP addresses that exceed a specified threshold by updating firewall rules. It supports various standard log files, including those from SSH and Apache, and can be configured to monitor custom log files as needed. Notable features include its capability to work with both IPv4 and IPv6 addresses, and a client-server architecture for managing configurations and interactions.

fame

AI Summary: FAME (FAME Automates Malware Evaluation) is a Python-based framework designed to automate and enhance the analysis of malicious files, enabling analysts to quickly identify malware families and extract relevant configurations and indicators of compromise (IOCs). The tool utilizes Flask for its web interface and Celery for managing background tasks, streamlining the end-to-end analysis process. FAME aims to empower malware analysis efforts by providing an efficient and user-friendly solution for processing malware samples.

faraday

AI Summary: Faraday is an open-source vulnerability management tool designed to facilitate the organization, aggregation, and visualization of security data in a multiuser environment. Its primary use case is to streamline vulnerability discovery and management by integrating various community tools while providing insightful visualizations for both managers and analysts. Notable features include its command-line interface for direct terminal access, support for multiple installation methods (including Docker and PyPi), and the ability to automate scanning tools within CI/CD pipelines.

fav-up

AI Summary: Fav-up is a tool that leverages favicon icons to identify real IP addresses using the Shodan API. It supports multiple lookup methods, including local files, URLs, and domain searches, and can output results in CSV or JSON formats. Key features include customizable API key input options, support for batch processing via input lists, and the ability to retrieve detailed information such as favicon hashes and associated masked IPs.

FavFreak

AI Summary: FavFreak is a reconnaissance tool that streamlines the process of gathering information using favicon hashes from a list of URLs. It fetches the favicon.ico for each URL, computes its hash, and matches it against a predefined fingerprint dictionary to identify known services. Key features include sorting results by favicon hashes and generating Shodan dorks, making it a valuable asset for bug bounty hunters and OSINT investigations.


README

FavFreak - Weaponizing favicon.ico for BugBounties , OSINT and what not

FacFreak

FBI-tools

AI Summary: FBI-tools is a comprehensive Open Source Intelligence (OSINT) toolkit featuring a variety of tools for analysts to gather and analyze data from multiple online sources. Its notable features include domain squatting detection with SquatSquasher, web reconnaissance capabilities with reNgine, and efficient user account searches across platforms using UsernameSearchOSINT. Additionally, the collection encompasses specialized tools for investigating social media, phone numbers, and dark web intelligence, streamlining the OSINT process.

featherduster

AI Summary: FeatherDuster is a cryptographic analysis tool designed to facilitate the identification and exploitation of weaknesses in cryptosystems, leveraging its underlying library, Cryptanalib. It offers capabilities for automatic encoding detection and decoding, interaction with multiple ciphertext formats, and supports various cryptographic analysis functions, making it suitable for both researchers and practitioners in the field of cryptography. The tool aims to simplify the process of analyzing flawed cryptographic implementations, while Cryptanalib serves as a flexible engine for developing custom crypto attack methods.

fernflower

AI Summary: Fernflower is an analytical decompiler for Java, capable of converting compiled Java class files back into human-readable source code. It is integrated within IntelliJ IDEA for debugging and navigation, and can also be executed from the command line to decompile class files, ZIPs, and JARs, offering numerous customizable command-line options to fine-tune the decompilation process. Notable features include support for decompiling inner classes, handling generic signatures, and options for renaming identifiers based on debugging information.