> cat /dev/github | grep security-tools

~/hackyfeed $

A cybersecurity tools aggregator — discover the latest pentesting, red team, and offensive security tools from GitHub.

sort: ( this page )

PINCE

AI Summary: PINCE is a front-end tool for the GNU Project Debugger (GDB) tailored for reverse engineering, particularly in gaming contexts. Its noteworthy features include efficient memory and pointer scanning using specialized libraries, background execution for concurrent command execution, and extensive variable inspection and modification capabilities, resembling those of Cheat Engine. Additionally, PINCE supports dynamic address tables, smart casting of data types, and comprehensive disassembly functionalities, enabling users to analyze and manipulate memory with precision.

pixiewps

AI Summary: Pixiewps is a C-based tool that performs offline brute-force attacks on WPS PINs utilizing the “pixie-dust attack,” allowing it to potentially recover vulnerable pins in seconds to minutes, as opposed to hours. Notably, since version 1.4, it can also retrieve WPA-PSK from passive captures and includes support for multi-threading to enhance performance. Designed primarily for educational purposes, Pixiewps requires specific input parameters related to WPS authentication, and offers various operational modes for advanced usage.

pixload

AI Summary: pixload is a set of tools designed for creating and injecting payloads into image files, supporting formats like BMP, GIF, JPG, PNG, and WebP. Its primary use case is for stealthy payload delivery, enabling users to embed malicious code within legitimate image files while maintaining their validity. Notable features include straightforward command-line usage for various image types and integration with Metasploit for payload generation.


README

pixload – Image Payload Creating tools

DESCRIPTION

Set of tools for hiding backdoors creating/injecting payload into images.

plasma

AI Summary: PLASMA is an interactive disassembler that converts binary code into more readable assembly language with syntax highlighting, supporting architectures such as x86_64, ARM, and MIPS, along with ELF and PE formats. Its notable features include a Python API for scripting capabilities, allowing users to perform tasks like pseudo-decompilation, flow graph manipulation, and code assembly. The tool is currently under development and offers additional functionality through optional libraries for enhanced features.

Platypus

AI Summary: Platypus is a modern terminal-based tool for managing multiple reverse shell sessions and clients, implemented in Go. Its primary use case is to facilitate secure and efficient reverse shell connections across various protocols, featuring functionalities such as multiple service listening ports, a RESTful API for management, file download/upload capabilities, and an interactive shell interface that supports common control commands. Notable features include automatic server initiation, port forwarding, and a web UI for enhanced usability.

PoC

AI Summary: Proofs-of-concept

Proofs-of-concept

POC-T

AI Summary: POC-T (Pentest Over Concurrent Toolkit) is a versatile framework designed for penetration testing that facilitates concurrent tasks such as data collection, web crawling, brute-force attacks, and bulk PoC management. Its notable features include support for both multithreading and Gevent concurrency modes, simplified script writing without extensive documentation, built-in script extensions, and integration with popular search engine APIs like ZoomEye, Shodan, and Google.


README

POC-T: Pentest Over Concurrent Toolkit

Python 2.7 License Codacy Badge PoC/Scripts

PocOrExp_in_Github

AI Summary: PocOrExp in Github is a tool designed for aggregating proof of concepts (PoCs) and exploitation scripts (Exp) associated with Common Vulnerabilities and Exposures (CVE) directly from GitHub. Its primary use case is to assist cybersecurity professionals in quickly locating relevant PoCs by year and monitoring updates for existing vulnerabilities. Notable features include year-specific data retrieval, initialization options to avoid processing handled CVEs, and the ability to track changes to PoCs over time.

pocsuite3

AI Summary: pocsuite3 is an open-source framework designed for remote vulnerability testing and proof-of-concept (PoC) development, focused on empowering penetration testers and security researchers. Notable features include a versatile PoC engine supporting multiple execution modes, dynamic loading of PoC scripts and targets from various sources, as well as comprehensive integration with tools like Seebug, Shodan, and ZoomEye. The tool also offers robust capabilities such as plugin support, multi-target loading, and HTTP/SOCKS proxy configuration, making it a powerful asset in the security testing arsenal.

pokecrystal

AI Summary: The Pokémon Crystal repository consists of a comprehensive disassembly of the Pokémon Crystal game, designed to facilitate the building of various ROM versions. Primary use cases include reverse engineering, modding, and development of patches for the game, supported by resources such as documentation and tutorials. Notable features include the ability to produce different ROM versions and access to a community-driven platform for additional support and collaboration.


README

Pokémon Crystal Build Status

This is a disassembly of Pokémon Crystal.

pokeemerald

AI Summary: Pokémon Emerald is a decompilation project that allows users to build the ROM file for the Pokémon Emerald game. Its primary use case is for developers and enthusiasts looking to analyze, modify, or enhance the original game code. Notable features include the ability to reconstruct the game’s ROM and support for custom modifications.


README

Pokémon Emerald

This is a decompilation of Pokémon Emerald.

It builds the following ROM:

pokefirered

AI Summary: The Pokémon FireRed and LeafGreen repository provides a comprehensive decompilation of the popular Pokémon games, enabling users to create various ROM images of FireRed and LeafGreen. Its primary use case is for game developers and modders looking to analyze, modify, or enhance the original games. Notable features include the generation of multiple ROM versions, including revisions and switch-compatible formats, along with detailed SHA1 checksums for verification.


README

Pokémon FireRed and LeafGreen

This is a decompilation of English Pokémon FireRed and LeafGreen.

pokered

AI Summary: The Pokémon Red and Blue repository provides a disassembly of the original Pokémon games, allowing users to rebuild the ROMs for both Pokémon Red and Blue, along with additional debug versions and patches. Its primary use case is for developers and enthusiasts looking to study, modify, or enhance the original game code, supported by extensive documentation and tutorials through its Wiki. Notable features include automated builds and a structured community for collaboration on Discord.

pokeruby

AI Summary: Pokémon Ruby and Sapphire is a comprehensive disassembly of the Game Boy Advance titles Pokémon Ruby and Sapphire, enabling developers to understand and modify the game’s code. The primary use case focuses on ROM development and enhancement, allowing users to compile the original game files, pokeruby.gba and pokesapphire.gba. Notable features include built-in support for building ROMs, making it an essential tool for enthusiasts involved in Pokémon game development and reverse engineering.

pokeyellow

AI Summary: Pokémon Yellow is a disassembly repository for the classic Game Boy Color game, allowing users to build various ROMs, including the standard Pokémon Yellow and a debug version named YELLMONS.GB. The tool provides comprehensive documentation, symbol information, and assembly tools to facilitate modifications and development for enthusiasts. Notable features include the ability to generate different ROM formats and a supportive community for collaborative development and troubleshooting.


README

Pokémon Yellow Build Status

This is a disassembly of Pokémon Yellow.

Pompem

AI Summary: Find exploit tool

Find exploit tool

power-pwn

AI Summary: Power Pwn is a comprehensive offensive and defensive security toolset designed for the Microsoft 365 Power Platform and AI services. It includes multiple features such as tenant scanning with PowerDump, backdoor deployment, malware creation without coding, and tools for phishing and misconfiguration testing, providing users with extensive capabilities for security assessment and exploitation in Power Platform environments. Additionally, it offers utilities for enumerating custom GPTs and publicly exposed AI services, enhancing its utility for security professionals.

Powerful-Plugins

AI Summary: Powerful Plugins is a curated collection of open-source plugins designed to enhance various frameworks and tools such as BurpSuite, Chrome, Firefox, IDA, Immunity, OllyDbg, and the Volatility Framework. Its primary use case is to extend the functionality of these platforms, enabling improved capabilities in tasks such as web application security testing and memory analysis. Notable features include the diverse range of supported tools and the invitation for community contributions to further expand the repository.

PowerHub

AI Summary: PowerHub is a post-exploitation tool designed for PowerShell, facilitating the transfer of potentially flagged data during penetration testing engagements. Its notable features include being fileless and stateless, utilizing cert pinning and RC4 encryption for string obfuscation, allowing seamless execution of C# programs in memory, and offering multiple methods to bypass AMSI. The tool simplifies processes such as running scripts and transferring sensitive information like Kerberos tickets or passwords, either through command line or a web interface, enhancing collaboration for testing teams.

PowerShell-for-Hackers

AI Summary: PowerShell for Hackers is a repository of customizable PowerShell functions designed to aid in developing payloads for security testing and ethical hacking. Key features include a variety of functions with descriptions, usage examples, and accompanying video tutorials, which facilitate the creation of payloads for diverse scenarios such as system manipulation, desktop interactions, and data concealment. This collection emphasizes community collaboration, allowing users to contribute their own functions.


README

2022 Hak5 hacker of the Year

hak 5

Powershell-RAT

AI Summary: Powershell-RAT is a Python-based remote access tool designed for red team engagements to backdoor Windows machines. Its primary use case involves tracking user activity through screen captures and exfiltrating data via email attachments using Gmail. Key features include stealthy operation, the ability to execute tasks such as taking screenshots and scheduling tasks, and a comprehensive “Hail Mary” option for automated execution.


README

Powershell-RAT

Python based backdoor that uses Gmail to exfiltrate data as an e-mail attachment.

pretender

AI Summary: pretender is a versatile tool designed for executing man-in-the-middle (MitM) attacks by spoofing local name resolutions and performing DHCPv6 DNS takeover. It specializes in relaying attacks primarily against Windows hosts, leveraging protocols such as mDNS, LLMNR, and NetBIOS-NS spoofing. Notable features include the ability to log network queries in dry run mode, tailored domain responses, and integration with relaying tools like Impacket’s ntlmrelayx.py and krbrelayx.


README

pretender

Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover
as well as mDNS, LLMNR and NetBIOS-NS spoofing

privacy-respecting

AI Summary: The “Privacy Respecting” repository is a curated list of services and software alternatives that prioritize user privacy, aiming to offer users choices away from platforms that collect extensive personal data. It categorizes privacy-focused options across various domains such as search engines, social networks, and cloud storage, while providing insights on the implications of using mainstream services. Notable features include detailed explanations for suggested alternatives and a structured format for easy navigation through the listed services.

privacy.sexy

AI Summary: privacy.sexy is a cross-platform tool designed to enforce privacy and security best practices on Windows, macOS, and Linux systems. Its notable features include integration with unit, integration, and end-to-end testing workflows, as well as security checks for dependencies using Static Analysis Security Testing (SAST), ensuring a robust and secure user experience.


README

privacy.sexy — Privacy is sexy

Enforce privacy & security best-practices on Windows, macOS and Linux, because privacy is sexy.

PrivEsc

AI Summary: PrivEsc is a collection of privilege escalation scripts and exploits designed for Windows, Linux, and MySQL environments. Its primary use case is to help security professionals identify and exploit privilege escalation vulnerabilities in various systems. Notable features include compatibility with multiple operating systems and exploitation capabilities tailored for common service vulnerabilities.


README

PrivEsc by 1N3@CrowdShield

http://crowdshield.com

ABOUT:

A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.