> cat /dev/github | grep security-tools

~/hackyfeed $

A cybersecurity tools aggregator — discover the latest pentesting, red team, and offensive security tools from GitHub.

sort: ( this page )

TRADFRI-Hacking

AI Summary: TRADFRI-Hacking is a project designed to facilitate the reverse engineering and customization of IKEA’s TRÅDFRI home automation products, which utilize Zigbee technology. It offers detailed resources for product teardowns, firmware manipulation, and the creation of custom hardware solutions using the TRÅDFRI modules, including tools for firmware dumping and development. Notable features include an extensive documentation of various TRÅDFRI products, customizable firmware options, and insights into hardware modifications, empowering developers to repurpose and enhance these smart home devices.

traitor

AI Summary: Traitor is a privilege escalation tool designed to automatically exploit local vulnerabilities and misconfigurations in Unix-like systems to achieve a root shell. It incorporates various methods from GTFOBins and specific CVEs, allowing users to discover potential exploits with options to directly attempt them if necessary. Notable features include the ability to analyze sudo permissions, the option to exploit specific vulnerabilities, and support for various privilege escalation vectors.


README

Traitor

Automatically exploit low-hanging fruit to pop a root shell. Linux privilege escalation made easy!

trape

AI Summary: Trape is an OSINT analysis tool designed for real-time tracking and execution of social engineering attacks, primarily aimed at assisting government organizations, companies, and researchers in identifying cybercriminals. Key features include precise locator optimization, a REST API for remote website monitoring, and capabilities for executing phishing attacks, managing JavaScript injections, and analyzing target network information. The tool emphasizes stealth and user control, allowing for sophisticated manipulation of browser behavior to extract sensitive information covertly.

tripwire-open-source

AI Summary: Open Source Tripwire® is a file integrity monitoring tool designed to detect and alert users about unauthorized changes to files and directories by comparing the current filesystem state against a predefined baseline. It features a highly configurable policy file system for specifying which attributes to monitor, the capability to sign configuration and report files for added security, and the ability to generate and manage cryptographic keys for multiple machines. Users can utilize it to establish secure baselines and automate periodic checks, enhancing overall system integrity and security.

Triton

AI Summary: Triton is a dynamic binary analysis library designed for building program analysis tools, enabling automated reverse engineering and software verification. It supports dynamic symbolic execution and taint analysis across multiple architectures including x86, ARM, and RISC-V, and features a powerful API in both C++ and Python, as well as capabilities for expression synthesis, SMT solver integration, and LLVM lifting.


README

Triton is a dynamic binary analysis library. It provides internal components that allow you to build your program analysis tools, automate reverse engineering, perform software verification or just emulate code.

trivy-operator

AI Summary: The Trivy Operator is a Kubernetes-native security toolkit that utilizes Trivy to perform continuous security scans of Kubernetes clusters. It automatically generates and updates comprehensive security reports, including vulnerability assessments, configuration audits, and compliance checks, which are accessible through the Kubernetes API. Notable features include automated scans for workloads, RBAC assessments, secret exposure detection, and generation of Software Bill of Materials (SBOM) for workloads, aiding in the identification and mitigation of potential security risks in real-time.

TRX

AI Summary: TRX is an open-source reimplementation of the classic Tomb Raider games (I, II, and III), designed to enhance gameplay through decompilation and integration of open-source components. The engine supports distinct mechanics for all three titles and features enhancements such as customizable draw distances, a developer console, updated UI elements, and the capability to run custom levels. Notably, TRX is cross-platform, supporting Windows, Linux, and macOS, with extensive controller compatibility and customizable control options.

TryHackMe-Roadmap

AI Summary: The TryHackMe Road Map repository provides a comprehensive list of over 350 free TryHackMe rooms categorized by various cybersecurity topics to facilitate learning and practice in ethical hacking. Its primary use case is to help individuals, from beginners to advanced users, streamline their training by accessing a structured pathway through challenges in areas such as Linux fundamentals, web security, and more. Notable features include the organization of topics for a sequential learning approach and the inclusion of various practical scenarios to enhance hands-on experience in cybersecurity.

twitter-advanced-search

AI Summary: The Twitter Advanced Search tool enhances tweet discovery by leveraging various search operators that allow users to refine their queries based on content, hashtags, emojis, and more. Its primary use case is enabling users to perform intricate searches on Twitter’s web, mobile, and TweetDeck platforms, although it is not compatible with certain Twitter API versions. Notable features include support for boolean operators, wildcard searches, and the ability to exclude terms or phrases, significantly expanding the capabilities of standard Twitter search functionalities.

uDork

AI Summary: uDork is a Bash script designed for Google hacking, leveraging advanced search techniques to uncover sensitive information and detect web application versions without conducting direct attacks. The tool utilizes predefined dorks sourced from the Google Hacking Database, allowing users to find sensitive files, IoT devices, and security vulnerabilities efficiently. Notable features include speed improvements between requests and Docker support for easy deployment.


README

uDork - Google Hacking Tool

Author: M3n0sD0n4ld
Twitter: @David_Uton

News

11/06/2022

I have some bad news to give, last week Facebook withdrew the service by which the tool made the requests, unfortunately the tool no longer works.

Ukraine-Cyber-Operations

AI Summary: The Ukraine Cyber Operations repository provides curated threat intelligence resources specifically tailored for organizations in Ukraine, focusing on the ongoing cyber operations related to the Russia-Ukraine conflict. Notable features include a comprehensive timeline of monthly threat reports from 2022 and 2023, contextualized indicators of compromise (IOCs) contributed by the Equinix Threat Analysis Center, and vetted open-source intelligence (OSINT) sources, enhancing the situational awareness and response capabilities of users.

Ultimate-RAT-Collection

AI Summary: The Ultimate RAT Collection functions as a repository of Remote Access Trojan (RAT) samples and builders, primarily used for cybersecurity research, analysis, and reverse engineering. It emphasizes caution by advising users to conduct their analysis within secure environments like virtual machines or sandboxes to prevent contamination of critical systems. Notable features include a collection of genuine malware samples and a community-driven approach to include new samples through pull requests.

unipacker

AI Summary: Un{i}packer is a platform-independent tool designed for the automatic unpacking of Windows Portable Executable (PE) files that have been packed using various runtime packers, thereby facilitating malware analysis. Utilizing the Unicorn Engine for emulation, it effectively handles multiple well-known packers, including ASPack and UPX, and allows for manual input of addresses for less common packers. This tool is particularly beneficial for analysts seeking to bypass challenges posed by malware obfuscation and streamline the unpacking process without requiring a Windows environment.

unlicense

AI Summary: Unlicense is a Python 3 tool designed to dynamically unpack executables protected by Themida and WinLicense versions 2.x and 3.x, accommodating both 32-bit and 64-bit portable executables (PEs) and .NET assemblies. Its notable features include automatic recovery of the original entry point (OEP) and obfuscated import tables, although it requires a valid license file for certain WinLicense-protected executables and may produce non-runnable dumps. Users can interact with the tool via a command-line interface or a drag-and-drop executable option for ease of use.

urlfinder

AI Summary: URLFinder is a high-speed, passive URL discovery tool optimized for efficient web asset discovery without active scanning, making it particularly useful for penetration testers and security researchers. It features curated passive sources for comprehensive URL gathering, supports multiple output formats, and provides integration capabilities through STDIN/OUT support.


README

URLFinder

A high-speed tool for passively gathering URLs, optimized for efficient web asset discovery without active scanning.

FeaturesInstallationUsageExamplesJoin Discord

urlhunter

AI Summary: urlhunter is a reconnaissance tool designed for searching URLs exposed via URL shortener services like bit.ly and goo.gl. It utilizes collections published by the URLTeam, enabling users to perform keyword and regex searches on historical data with customizable date ranges and output options. Notable features include the ability to specify single or multiple keywords, regex searches, and support for bulk archive downloading, making it ideal for cyber intelligence and bug bounty applications.

Uscrapper

AI Summary: Uscrapper Vanta is an open-source intelligence tool designed for advanced data extraction from both the surface web and the dark web, specifically targeting personal information such as email addresses, social media links, and geolocations. Notable features include keyword-based scraping for tailored data extraction, support for .onion domains, and comprehensive reporting capabilities, which transform raw data into actionable insights. The tool employs multithreading and anti-web scraping defenses to enhance its effectiveness in information gathering.

user-scanner

AI Summary: User Scanner is an advanced email and username OSINT tool designed to verify the registration status of emails and the availability of usernames across multiple platforms, including GitHub, X (formerly Twitter), Reddit, and Instagram. It features dual-mode usage for email and username scanning, supports bulk scanning, utilizes wildcard-based username permutations, and provides clear output formats such as JSON and CSV, along with proxy support for enhanced anonymity. The tool’s modular architecture allows for easy integration of new platforms, making it a versatile choice for security professionals and branding efforts.

UserFinder

AI Summary: UserFinder is a shell-based tool designed for identifying users across various social media platforms and gathering additional information. It enables users to perform queries and compile data efficiently, featuring an easy installation process and a straightforward command-line interface. Notable features include a user-friendly script execution with minimal setup requirements and a focus on social profiling capabilities.


README

LicenseIssuesDeveloperWikipedia

Find user in social and more informations!

username-anarchy

AI Summary: Username Anarchy is a command-line tool designed for generating potential usernames during penetration testing, crucial for user account/password brute force attacks and username enumeration. It features a flexible plugin architecture for various username formats, utilizes common first and last names databases from external sources, and allows for name substitutions to maximize coverage when only partial user information is known. This tool supports input from multiple formats and automates name generation based on country datasets or popular social media aliases.

v3-periphery

AI Summary: Uniswap V3 Periphery is a collection of smart contracts designed to facilitate interactions with the Uniswap V3 Protocol, providing essential functionalities such as token swaps and liquidity operations. Its primary use case involves integrating these periphery functions into decentralized applications, enabling developers to leverage the protocol’s capabilities. Notable features include the ability to import Solidity interfaces for seamless contract interactions and comprehensive local deployment options for testing against mainnet bytecode.

V3n0M-Scanner

AI Summary: V3n0M-Scanner is an offensive security framework designed for vulnerability scanning and penetration testing, offering a Python-based toolkit that operates across both Linux and Windows platforms. Notable features include advanced scanning capabilities for SQL injection, local file inclusion to remote code execution, and a Cloudflare resolver, along with extensive target lists and efficient scanning of potentially millions of IPs for known vulnerabilities. The tool is open-source and aims to provide transparency and ease of use for security professionals.

VAC

AI Summary: VAC is a user-mode anti-cheat system developed by Valve, designed to operate non-invasively on Windows systems. The tool utilizes a set of modules to gather critical system information, enumerate processes, and monitor game performance, primarily focusing on maintaining the integrity of online gaming environments. Notable features include the use of various encryption and hashing methods, such as MD5 and CRC32, to secure operations and information within its modules.

Validity90

AI Summary: Validity90 is a tool focused on reverse engineering the communication protocol of various Validity fingerprint readers, such as models 138a:0090 and 138a:0094. It aims to create an open-source driver for integration with the libfprint library, featuring a Wireshark dissector for analyzing encrypted communication and a standalone prototype for testing device functionalities. Notably, the project is actively developing specifications and protocols for multiple devices, with partial implementation already achieving scan and internal database check capabilities.

VAmPI

AI Summary: VAmPI is a vulnerable API built on Flask that includes the OWASP Top 10 vulnerabilities for APIs, designed to assess the efficacy of security tools in detecting API-related security issues. It features a global toggle to enable or disable vulnerabilities during testing, along with token-based authentication and a Swagger UI for direct interaction. The tool serves both educational and practical purposes, allowing users to practice security testing and improve their understanding of API vulnerabilities.