> cat /dev/github | grep security-tools

~/hackyfeed $

A cybersecurity tools aggregator — discover the latest pentesting, red team, and offensive security tools from GitHub.

sort: ( this page )

jexboss

AI Summary: JexBoss is a tool designed to test and exploit Java deserialization vulnerabilities primarily in JBoss Application Server and other Java platforms. It supports versions 3 to 6 of JBoss and is effective against a variety of frameworks and applications, utilizing exploitation vectors such as admin and JMX consoles, servlet deserialization, and specific vulnerabilities like CVE-2017-5638. Notable features include easy installation, support for multiple target applications, and demonstration videos for practical use cases.

JNDI-Injection-Exploit-Plus

AI Summary: JNDI-Injection-Exploit-Plus is a comprehensive tool designed for generating operational JNDI links, facilitating background services with RMI, LDAP, and HTTP servers to test vulnerabilities effectively. It enhances the functionality of standard JNDI exploit tools by offering additional remote and local reference gadgets, support for multiple JDK versions, and the capability to create base64 and hex payloads, making it a robust resource for security testing. With over 75 deserialization gadgets included, it provides a diverse set of options for vulnerability assessments.

jnitrace

AI Summary: jnitrace is a dynamic analysis tool designed to trace the usage of the JNI API in Android applications, leveraging the Frida framework for real-time monitoring. It simplifies the tracking of native library interactions, offering features such as customizable filtering options for method tracing, backtrace configuration, and the ability to save output in JSON format for further analysis. This tool enhances the reverse engineering process, making it more efficient by reducing the manual effort required to analyze JNI calls.

jok3r

AI Summary: Jok3r is a Python CLI application designed to assist penetration testers in executing automated network infrastructure and web security assessments. With over 50 integrated open-source tools, it streamlines vulnerability identification through context-aware checks, CVE lookups, and brute force attacks, all packaged within a Docker image for ease of use and customization. Notable features include automatic service fingerprinting, a comprehensive library of security checks for various network services, and automated post-authentication testing.

joomscan

AI Summary: OWASP JoomScan is an open-source vulnerability scanning tool designed specifically for Joomla CMS deployments, enabling automated detection of vulnerabilities and misconfigurations that could be exploited by attackers. Developed in Perl, it features a lightweight, modular architecture and provides a user-friendly interface with comprehensive reporting capabilities in both text and HTML formats. Notable features include component enumeration, version checks, firewall detection, and the ability to compile detailed reports to assist administrators in maintaining system security.

jsql-injection

AI Summary: jSQL Injection is a lightweight, open-source tool designed for identifying database information from servers, optimized for penetration testing. It is cross-platform, supporting Windows, Linux, and Mac with Java compatibility from versions 21 to 25, and is integrated into various security-focused distributions such as Kali Linux. Notable features include a user-friendly interface, support for multiple database engines, and comprehensive testing functionalities, making it suitable for both novice and experienced security analysts.

juice-shop

AI Summary: OWASP Juice Shop is a deliberately insecure web application designed for educational purposes such as security training, demonstrations, and Capture The Flag (CTF) events. It contains a wide range of vulnerabilities that align with the OWASP Top Ten, making it an effective tool for testing security tools and techniques. Notable features include its modern architecture, comprehensive vulnerability exposure, and support for various installation methods, including Docker and Vagrant.

juicy-potato

AI Summary: Juicy Potato is a Local Privilege Escalation tool designed to exploit COM servers for escalating privileges from Windows Service Accounts to NT AUTHORITY\SYSTEM. Notable features include customizable CLSID targeting, flexible COM listening configurations (IP and port), and multiple process creation modes, enabling users to launch executables or scripts with different impersonation privileges. This tool is particularly effective for users with SeImpersonate or SeAssignPrimaryToken privileges, allowing them to bypass security mechanisms on Windows systems.

JustTryHarder

AI Summary: JustTryHarder is a comprehensive cheat sheet designed to assist users in navigating the Penetration Testing with Kali Linux (PWK) course and preparing for the Offensive Security Certified Professional (OSCP) exam. It consolidates various penetration testing techniques, such as OS detection, privilege escalation, and exploitation methods, while providing clear examples and references. Notable features include a wide array of topics that cover essential hacking methodologies and tools, making it a valuable resource for both beginners and experienced practitioners in the cybersecurity field.

K8tools

AI Summary: K8tools is a collection of security research and penetration testing tools designed for use in various environments, including remote command execution and web shells. Notably, these tools are modified to enhance compatibility and stability, catering to security professionals who require reliable functionalities. The repository serves as a hub for downloading tools, accessing documentation, and submitting feedback for continuous improvement.


README

K8tools

Author GitHub issues Github Stars GitHub forks GitHub license

image

声明: 工具仅供安全研究或授权渗透,非法用途后果自负。
下载: https://github.com/k8gege/K8tools
文档: http://k8gege.org/p/72f1fea6.html

karma_v2

AI Summary: Karma v2 is a passive open-source intelligence (OSINT) automated reconnaissance framework designed for information security researchers, penetration testers, and bug hunters to gather extensive details about target systems. It integrates with the Shodan Premium API to perform a variety of scans including SSL certificate verification, vulnerability detection, and asset discovery, and it features capabilities like fetching IP banners and interesting leaks across numerous protocols and services. The tool’s output can be displayed in the terminal and saved to files for further analysis.

KawaiiGPT

AI Summary: KawaiiGPT is an open-source command-line tool that provides seamless access to various large language models, including DeepSeek, Gemini, and Kimi-K2, through a reverse-engineered Pollinations API without the need for API keys. It features integrated prompt injection capabilities for security research, allowing for uncensored model access and red-team evaluations, along with native support for Linux and Termux, and a user-friendly console interface. Notably, it offers easy configuration options and a streamlined installation process via a single command.

kb

AI Summary: kb is a minimalist knowledge base manager designed for efficient organization and retrieval of information artifacts. It supports functionalities such as adding, viewing, editing, and deleting artifacts, alongside advanced searching options including grep capabilities and template management for better categorization. Notably, it allows for easy import/export of knowledge bases and integrates seamlessly with multiple installation methods, enhancing its usability for various platforms.


README

kb. A minimalist knowledge base manager

Build Status

kernel-exploits

AI Summary: The bcoles/kernel-exploits repository provides various updated local root exploit implementations targeting vulnerabilities in the Linux kernel, specifically those identified by their CVEs. Each exploit enables privilege escalation through vulnerabilities such as improper memory handling or mismanaged user namespaces, allowing attackers to gain root access under certain conditions. Notable features include detailed exploit descriptions and references to original sources for further investigation.


README

Kernel Exploits

Various kernel exploits

CVE-2021-22555

Linux local root exploit.

kernel-exploits

AI Summary: The xairy/kernel-exploits repository contains a collection of Linux kernel exploit code samples for various vulnerabilities, primarily focusing on local privilege escalation (LPE) and information leak scenarios. Each entry is associated with specific Common Vulnerabilities and Exposures (CVEs), detailing the exploit’s impact and vector, enhancing understanding and mitigation strategies for kernel security vulnerabilities. Notable features include the absence of licensing, making the code freely available for educational and research purposes.

kernelpwn

AI Summary: The kernelpwn repository serves as a comprehensive resource for Capture The Flag (CTF) challenges focused on kernel exploitation, providing both challenge write-ups and educational material for beginners in the field. It features a collection of solved kernel-pwn challenges with detailed write-ups, covering various complex exploitation techniques such as SMEP, SMAP, KPTI, and KASLR bypasses. Notable features include a focus on both kernel and non-userland vulnerabilities, as well as an invitation for community contributions to enhance the repository’s challenge offerings.

keychain

AI Summary: Keychain is a tool designed to manage SSH and GPG keys efficiently by serving as a persistent frontend to ssh-agent and gpg-agent, allowing a single long-running instance per system. Its primary use case is to minimize the frequency of passphrase entries to once per reboot, enhancing security and convenience, especially for remote cron jobs. Notable features include seamless integration with key management, bash completion support for various command-line options, and user-friendly installation procedures.

Keylogger

AI Summary: Keylogger is a lightweight, open-source tool developed in Visual C++ for educational purposes, designed to monitor system activity by capturing keystrokes, mouse clicks, and periodic screenshots in stealth mode. Its notable features include FTP integration for automatic log uploads, the ability to run unnoticed in the background, and persistence through auto-start and auto-copy mechanisms. The tool emphasizes ethical use, warning against unauthorized application.


README

Keylogger

Visitor Badge
Please don’t forget to give us a ⭐ if you find this project useful!

Keylogger

AI Summary: The Keylogger tool captures keyboard, mouse, screenshot, and microphone inputs on a target computer and sends the collected data to the user’s email for security testing purposes. Notable features include self-deletion capabilities if the target discovers the code and automated data transmission every 10 seconds. The tool is easy to deploy by running a single script with minimal setup requirements.


README

Inputs To Mail.

Get Keyboard,Mouse,ScreenShot,Microphone Inputs and Send to your Mail. Purpose of the project is testing the security of information systems

Keylogger

AI Summary: Keylogger is a lightweight multi-platform tool designed to record keystrokes on Windows, Linux, and Mac OS, saving them to a local log file. Its primary use case includes personal monitoring for computer security and self-analysis, with notable features such as the ability to run in both visible and invisible modes on Windows, and a straightforward installation process across all supported operating systems.


README

A simple keylogger for Windows, Linux and Mac

MIT Licence

keypatch

AI Summary: Keypatch is a plugin for IDA Pro that integrates the Keystone Assembler Engine, providing enhancements for binary patching during reverse engineering tasks. It features a Patcher for direct assembly input, a Fill Range tool, and a Search utility to locate assembly instructions within binaries. With support for multiple architectures and platforms, an event-driven UI for automated updates, and user-friendly options like automatic comments and undo functionality, Keypatch addresses the limitations of IDA’s built-in assembler while streamlining the reverse engineering process.

keystone

AI Summary: Keystone is a lightweight and versatile multi-platform assembler framework supporting various architectures including Arm, RISC-V, and X86, among others. It features a clean architecture-neutral API, is thread-safe, and provides bindings for multiple programming languages, making it an ideal tool for developers needing assembly capabilities across different environments. Built on LLVM, Keystone enhances functionality and offers open-source licensing options suitable for both personal and commercial use.


README

Keystone Engine

Build Status Build Status Build status

kics

AI Summary: KICS (Keeping Infrastructure as Code Secure) is an open-source tool designed to identify security vulnerabilities, compliance issues, and infrastructure misconfigurations in infrastructure-as-code early in the development cycle. It supports various platforms and offers a comprehensive set of queries for thorough analysis, making it essential for maintaining security in cloud-native projects. Notable features include its integration capabilities and extensive documentation for ease of use, enhancing security throughout the software development lifecycle.

killshot

AI Summary: KillShot is a comprehensive penetration testing framework designed for information gathering and website vulnerability scanning. Its primary use case involves automating data collection through integrated tools such as WhatWeb and Nmap, while offering features like a CMS Exploit Scanner and web application vulnerability assessments, including XSS and SQL injection detection. The framework also facilitates backdoor generation and includes a fuzzer, making it a versatile tool for security professionals.

krane

AI Summary: Krane is a Kubernetes RBAC static analysis tool designed to identify security risks within K8s RBAC configurations and provide mitigation suggestions. Key features include a customizable set of built-in and user-defined risk rules, a user-friendly dashboard for visualizing RBAC posture, continuous analysis capabilities within clusters, and integration with Slack for alerting on significant risks. Additionally, Krane offers reporting in machine-readable formats and can be deployed locally, within CI/CD pipelines, or as a standalone service.