GitHub Trends
10.1K subscribers
15.3K links
See what the GitHub community is most excited about today.

A bot automatically fetches new repositories from https://github.com/trending and sends them to the channel.

Author and maintainer: https://github.com/katursis
Download Telegram
#typescript #blueteam #burpsuite #exploit #golang #hacking #hacking_tools #pentest #redteam #redteam_tools #scanner #security

Yakit is a powerful tool for interactive application security testing. It uses a special programming language called Yaklang, which is designed specifically for cybersecurity. Here are the key benefits Yakit provides a user-friendly GUI, making it accessible even for those who don't want to write code.
- **Advanced Features** You can execute custom Yaklang scripts or plugins at any step of penetration testing.
- **Flexible Deployment** There is an active community and detailed documentation available to help you learn and use Yakit effectively.

Overall, Yakit simplifies and enhances your security testing experience with its robust features and user-friendly interface.

https://github.com/yaklang/yakit
#other #android #awesome #bug_bounty #fuzzing #hacking #penetration_testing #pentesting_windows #reverse_engineering #security

This collection of resources is designed for hackers, pentesters, and security researchers. It includes a wide range of lists and repositories covering various aspects of security such as Android security, application security, bug bounty programs, exploit development, and more. These resources provide tools, tutorials, and references to help you improve your skills in cybersecurity. By using these resources, you can gain access to valuable information and tools that will enhance your knowledge and capabilities in the field of cybersecurity, making you better equipped to handle security assessments, incident responses, and other related tasks.

https://github.com/Hack-with-Github/Awesome-Hacking
#other #awesome #awesome_list #bsd #cheatsheets #devops #guidelines #hacking #hacks #howtos #linux #lists #manuals #one_liners #pentesters #resources #search_engines #security #security_researchers #sysops

This collection of tools and resources is designed to help you improve your workflow, security, and productivity. Here’s a concise summary of the benefits The repository gathers a wide range of tools for various tasks, including CLI tools, GUI tools, web tools, and more. This makes it a one-stop resource for system administrators, developers, and security professionals.

- **Security and Hardening** There are tools and tips to enhance your productivity, such as shell tricks, shell functions, and shortcuts for common tasks.

- **Learning Resources** The project is open-source and community-driven, meaning contributions are welcome, and the resources are continuously updated and improved.

Overall, this repository can significantly streamline your workflow, improve your security posture, and provide valuable learning resources.

https://github.com/trimstray/the-book-of-secret-knowledge
1
#cplusplus #analyzer #binary_analysis #c_plus_plus #cpp #cybersecurity #dark_mode #dear_imgui #disassembler #forensics #hacking #hacktoberfest #hex_editor #ips #mathematical_evaluator #multi_platform #pattern_language #preprocessor #reverse_engineering #static_analysis #windows

ImHex is a powerful hex editor designed for reverse engineers, programmers, and anyone who needs to work with binary data. It offers many features that make it useful and user-friendly. Here are the key benefits ImHex allows you to edit bytes, manage patches, undo and redo changes infinitely, and copy bytes in various formats. It also supports colorful highlighting, data display in different types (like integers, floats, colors), and decoding data in various encodings.
- **Custom Pattern Language** It has dark and light modes to protect your eyes, especially during late-night work sessions.
- **Data Analysis and Visualization** It supports various search methods (string, sequence, regex) and numerous hashing algorithms.
- **Modern Interface** ImHex works on Windows, macOS, and Linux, with options for web and nightly pre-release versions.

Overall, ImHex provides a comprehensive set of tools to make working with binary data efficient and comfortable.

https://github.com/WerWolv/ImHex
#dockerfile #application_security #appsec #best_practices #bugbounty #guide #hacking #hacktoberfest #owasp #penetration_testing #pentesting #security

The OWASP Web Security Testing Guide (WSTG) is a comprehensive resource for testing the security of web applications and services. Created by security professionals and volunteers, it provides a framework of best practices used globally. The guide is constantly updated, with the current version being 5.0, and previous stable releases like 4.2 available. Users can benefit by learning detailed methods for securing web applications, contributing to the guide through feedback or translations, and connecting with the community via Slack, Twitter, or Google Groups. This helps ensure your web applications are secure and up-to-date with the latest security standards.

https://github.com/OWASP/wstg
#other #backdoor #backdoor_attacks #backdoors #blackhat #hacking #hacking_tools #malware #malware_analysis #malware_database #malware_research #malware_sample #malware_samples #rat #rat_builder #remote_admin_tool #remote_control #trojan #trojan_builder #trojan_malware #trojan_rat

This GitHub repository contains a collection of over 450 trojan builders for educational and research purposes. It includes screenshots and samples, but users must download at their own risk and use them lawfully. Contributions are welcome, and discussions can be opened on GitHub. Larger files are split and require 7-Zip to unpack. The benefit to users is access to a comprehensive resource for studying and understanding trojan builders, which can help in cybersecurity research and education.

https://github.com/Cryakl/Ultimate-RAT-Collection
#python #active_directory #hacking #infosec #infosectools #networks #pentest #pentest_tool #pentest_tools #pentesting #python #python3 #red_team #security #security_tools #windows

NetExec is a powerful tool for network security testing. It helps users automate tasks like finding vulnerabilities, executing commands on remote machines, and gathering network information. This tool is especially useful for penetration testers and cybersecurity professionals. By using NetExec, users can efficiently assess and improve the security of large networks, making it easier to identify and fix weaknesses. It supports various network protocols and integrates well with other security tools, making it a valuable asset for those in the cybersecurity field.

https://github.com/Pennyw0rth/NetExec
#python #bounty #bugbounty #bypass #cheatsheet #enumeration #hacking #hacktoberfest #methodology #payload #payloads #penetration_testing #pentest #privilege_escalation #redteam #security #vulnerability #web_application

Payloads All The Things is a comprehensive collection of useful payloads and bypass techniques for web application security testing and penetration testing. It offers detailed documentation for each vulnerability, including how to exploit it and ready-to-use payloads, plus files for tools like Burp Intruder. You can contribute your own payloads or improvements, making it a collaborative resource. It also links to related projects for internal network and hardware pentesting, and provides learning resources like books and videos. Using this resource helps you efficiently find and test security weaknesses in web applications, improving your pentesting effectiveness and knowledge.

https://github.com/swisskyrepo/PayloadsAllTheThings
👍1
#other #bluetooth #bt #coding #cybersecurity #diy #electronics #esp32 #flashing #hacker #hacking #jammer #nrf24 #programming

The ESP32-BlueJammer is a device that disrupts all wireless signals operating on the 2.4 GHz frequency, including Bluetooth, BLE, WiFi, RC drones, and many smart gadgets. It uses an ESP32 chip combined with nRF24 modules to create noise and send unnecessary packets, effectively jamming these signals within a range of over 30 meters, which can be extended with better antennas or amplifiers. This jammer is intended strictly for educational and security testing purposes to help understand and improve wireless security. It is illegal to use for malicious purposes, so it should be handled responsibly and legally[1][2][3].

https://github.com/EmenstaNougat/ESP32-BlueJammer
#python #cybersecurity #fyp #hacking #hacking_tool #indonesia #information #information_gathering #ip_geolocation #linux #osint #osint_python #osint_tool #pentesting #phone_number #python #python_hacking #termux #termux_hacks #termux_tool

GhostTrack is a simple tool you can install on Linux or Termux to track locations, phone numbers, or social media usernames using open-source intelligence (OSINT). It offers menus for IP tracking (which can be combined with another tool called Seeker), phone number tracking, and username tracking on social media. This helps you gather information about a target’s location or identity easily. The benefit is that you can quickly find useful data for security, investigation, or personal knowledge without needing advanced skills, all through a straightforward Python-based program created by HunxByts.

https://github.com/HunxByts/GhostTrack