Skip to content
Change the repository type filter

All

    Repositories list

    • Find, verify, and analyze leaked credentials
      Go
      GNU Affero General Public License v3.0
      2.3k0011Updated Apr 17, 2026Apr 17, 2026
    • 1200Updated Mar 1, 2026Mar 1, 2026
    • Run individual controls or full compliance benchmarks for NSA CISA Kubernetes Hardening Guidance across all of your Kubernetes clusters using Powerpipe and Stea…
      Pascal
      Apache License 2.0
      7000Updated Jan 16, 2026Jan 16, 2026
    • Run individual configuration, compliance and security controls or full compliance benchmarks for CIS across all of your GCP projects using Powerpipe and Steampi…
      Puppet
      Apache License 2.0
      14000Updated Jan 16, 2026Jan 16, 2026
    • Run individual configuration, compliance and security controls or full compliance benchmarks for CIS, HIPAA HITRUST, NIST, and more across all of your Azure sub…
      Puppet
      Apache License 2.0
      19000Updated Jan 16, 2026Jan 16, 2026
    • Run individual controls or full compliance benchmarks for CIS, PCI, NIST, HIPAA and more across all of your AWS accounts using Powerpipe and Steampipe.
      Puppet
      Apache License 2.0
      70000Updated Jan 16, 2026Jan 16, 2026
    • Fork Threat Modeling Platform - Community
      MIT License
      82801Updated Oct 10, 2025Oct 10, 2025
    • devops-ia/helm-charts
      Smarty
      MIT License
      3000Updated Apr 8, 2024Apr 8, 2024
    • research

      Public
      VerSprite Security Research
      JavaScript
      4017200Updated Feb 2, 2023Feb 2, 2023
    • alpnpass

      Public
      This tool will listen on a given port, strip SSL encryption, forward traffic through a plain TCP proxy, then encrypt the returning traffic again and send it to …
      Go
      The Unlicense
      73100Updated Oct 18, 2021Oct 18, 2021
    • This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.
      Python
      Other
      168100Updated Mar 12, 2021Mar 12, 2021
    • opensoc

      Public
      Shell
      0000Updated Sep 25, 2020Sep 25, 2020
    • engage

      Public
      Tools and Materials for the Frida Engage Blog Series
      JavaScript
      174500Updated Mar 28, 2018Mar 28, 2018
    • Blind Cross-site Scripting Collector and Manager
      HTML
      24100Updated Jul 10, 2015Jul 10, 2015
    • Vulnerable Flask Web Application
      Python
      5900Updated Apr 27, 2015Apr 27, 2015
    • Introduction to Reverse Engineering Training
      Java
      31100Updated Apr 22, 2015Apr 22, 2015
    • I have taken all of the challenges from Protostar - https://exploit-exercises.com/protostar/- and compiled them for the ARM architecture.
      C
      392500Updated Apr 7, 2015Apr 7, 2015
    • tweepy

      Public
      Twitter for Python!
      Python
      MIT License
      4.6k000Updated Apr 4, 2015Apr 4, 2015
    • A Python library for parsing, manipulating, and generating STIX content.
      Python
      BSD 3-Clause "New" or "Revised" License
      89100Updated Dec 23, 2014Dec 23, 2014
    • Demo application for json-io research
      Java
      0000Updated Aug 15, 2014Aug 15, 2014
    • exifphp

      Public
      A vulnerable application to demonstrate smuggling PHP code through EXIF data
      PHP
      GNU General Public License v3.0
      3200Updated Jul 29, 2014Jul 29, 2014
    • PCredz

      Public
      This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, etc fr…
      Python
      450100Updated Jun 25, 2014Jun 25, 2014
    • liffy

      Public
      Local File Inclusion Exploitation Tool
      Python
      GNU General Public License v2.0
      20300Updated Jun 16, 2014Jun 16, 2014
    ProTip! When viewing an organization's repositories, you can use the props. filter to filter by custom property.