PANO - Advanced OSINT Investigation Platform Combining Graph Visualization,...
PANO is a powerful OSINT investigation platform that combines graph visualization, timeline analysis, and AI-powered tools to help you uncover hidden connections and patterns in your data.Getting...
View ArticleTruffleHog Explorer - A User-Friendly Web-Based Tool To Visualize And Analyze...
Welcome to TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog. TruffleHog is one of the most powerful secrets discovery, classification,...
View ArticleMaryam - Open-source Intelligence(OSINT) Framework
OWASPMaryam is a modular open-source framework based on OSINT and data gathering. It is designed to provide a robust environment to harvest data from open sources and search engines quickly and...
View ArticleCentralizedFirewall - Provides A Firewall Manager API Designed To Centralize...
Firewall Manager API ProjectInstallationFollow these steps to set up and run the API project:1. Clone the Repositorygit clone https://github.com/adriyansyah-mf/CentralizedFirewallcd...
View ArticleBytesrevealer - Online Reverse Enginerring Viewer
Bytes Revealer is a powerful reverse engineering and binary analysis tool designed for security researchers, forensic analysts, and developers. With features like hex view, visual representation,...
View ArticleGhost-Route - Ghost Route Detects If A Next JS Site Is Vulnerable To The...
A Python script to check Next.js sites for corrupt middlewarevulnerability (CVE-2025-29927).The corrupt middleware vulnerability allows an attacker to bypass authentication and access protected routes...
View ArticleText4Shell-Exploit - A Custom Python-based Proof-Of-Concept (PoC) Exploit...
A custom Python-based proof-of-concept (PoC) exploit targeting Text4Shell (CVE-2022-42889), a critical remote code execution vulnerability in Apache Commons Text versions < 1.10. This exploit...
View ArticlePEGASUS-NEO - A Comprehensive Penetration Testing Framework Designed For...
____ _ _ | _ \ ___ __ _ __ _ ___ _ _ ___| \ | | | |_) / _ \/ _` |/ _` / __| | | / __| \| | | __/ __/ (_| | (_| \__ \ |_| \__ \ |\ | |_| \___|\__, |\__,_|___/\__,_|___/_| \_| |___/ ███▄ █ ▓█████ ▒█████...
View ArticleFrogy2.0 - An Automated External Reconnaissance And Attack Surface Management...
Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit designed to map out an organization's entire internet presence. It identifies assets, IP addresses, web...
View ArticleCamtruder - Advanced RTSP Camera Discovery and Vulnerability Assessment Tool
Camtruder is a high-performance RTSP camera discovery and vulnerability assessment tool written in Go. It efficiently scans and identifies vulnerable RTSP cameras across networks using various...
View ArticleVulnKnox - A Go-based Wrapper For The KNOXSS API To Automate XSS...
VulnKnox is a powerful command-line tool written in Go that interfaces with the KNOXSS API. It automates the process of testing URLs for Cross-Site Scripting (XSS) vulnerabilities using the advanced...
View ArticleScrapling - An Undetectable, Powerful, Flexible, High-Performance Python...
Dealing with failing web scrapers due to anti-bot protections or website changes? Meet Scrapling.Scrapling is a high-performance, intelligent web scraping library for Python that automatically adapts...
View ArticlePulsegram - Integrated Keylogger With Telegram
PulseGram is a keylogger integrated with a Telegram bot. It is a monitoring tool that captures keystrokes, clipboard content, and screenshots, sending all the information to a configured Telegram bot....
View ArticleWshlient - A Simple Tool To Interact With Web Shells And Command Injection...
Web Shell ClientDescription & DemoWshlient is a web shell client designed to be pretty simple yet versatile. One just need to create a text file containing an HTTP request and inform where Wshlient...
View ArticleUro - Declutters Url Lists For Crawling/Pentesting
Using a URL list for security testing can be painful as there are a lot of URLs that have uninteresting/duplicate content; uro aims to solve that.It doesn't make any http requests to the URLs and...
View ArticleSubGPT - Find Subdomains With GPT, For Free
SubGPT looks at subdomains you have already discovered for a domain and uses BingGPT to find more. Best part? It's free!The following subdomains were found by this tool with these 30 subdomains as...
View ArticleLiam - Automatically Generates Beautiful And Easy-To-Read ER Diagrams From...
Automatically generates beautiful and easy-to-read ER diagrams from your database.Website• Documentation• RoadmapWhat's Liam ERD?Liam ERD generates beautiful, interactive ER diagrams from your...
View ArticleCAMEL - The First And The Best Multi-Agent Framework. Finding The Scaling Law...
🐫 CAMEL is an open-source community dedicated to finding the scaling laws of agents. We believe that studying these agents on a large scale offers valuable insights into their behaviors, capabilities,...
View ArticleDeep-Live-Cam - Real Time Face Swap And One-Click Video Deepfake With Only A...
Real-time face swap and video deepfake with a single click and only a single image.DisclaimerThis deepfake software is designed to be a productive tool for the AI-generated media industry. It can...
View ArticleFirecrawl-Mcp-Server - Official Firecrawl MCP Server - Adds Powerful Web...
A Model Context Protocol (MCP) server implementation that integrates with Firecrawl for web scraping capabilities.Big thanks to @vrknetha, @cawstudios for the initial implementation!You can also play...
View ArticleAPI-s-for-OSINT - List Of API's For Gathering Information About Phone...
APIs For OSINT This is a Collection of APIs that will be useful for automating various tasks in OSINT.Thank you for following me! https://cybdetective.comIOT/IP Search...
View ArticleByeDPIAndroid - App To Bypass Censorship On Android
Android application that runs a local VPN service to bypass DPI (Deep Packet Inspection) and censorship.This application runs a SOCKS5 proxy ByeDPI and redirects all traffic through it.InstallationOr...
View ArticleWitcher - Managing GitHub Advanced Security (GHAS) Controls At Scale
Implement and monitor Appsec control at scale.RequirementsNodeJS 20.13Tested onMacUbuntuHow to install$ git clone git@github.com:mf-labs/witcher.git$ cd witcher$ npm iBuild a Docker image$ git clone...
View ArticlePegasus-Pentest-Arsenal - A Comprehensive Web Application Security Testing...
/\ _ / | / \ | \ | |\| | | | | / | /| |/ |/ |/ ,/; ; ; ,'/|; ,/,/, ,'/ |;/,/,/,/| ,/; |;|/,/,/,/,/| ,/'; |;|,/,/,/,/,/| ,/'; |;|/,/,/,/,/,/|, / ; |;|,/,/,/,/,/,/| / ,'; |;|/,/,/,/,/,/,/| /,/';...
View ArticleShodan-Dorks - Dorks for Shodan; a powerful tool used to search for...
This GitHub repository provides a range of search queries, known as "dorks," for Shodan, a powerful tool used to search for Internet-connected devices. The dorks are designed to help security...
View Article