An open API service providing repository metadata for many open source software ecosystems.

Topic: "security-auditing"

AliZain15848/John-the-Ripper

Size: 16.6 KB - Last synced at: 11 months ago - Pushed at: 11 months ago - Stars: 770 - Forks: 0

akismak3/John-the-Ripper

John-the-Ripper Password-Recovery-Tool Password-Auditing Cracking-Software Multi-Platform Open-Source-Security Penetration-Tool Ethical-Cracking Security-Testing Vulnerability-Assessment Hash-Decryption

Size: 15.6 KB - Last synced at: 10 months ago - Pushed at: 10 months ago - Stars: 604 - Forks: 0

harisriyoni/GENERATOR-OF-SEED-PHRASE-

Size: 1.95 KB - Last synced at: 8 months ago - Pushed at: 8 months ago - Stars: 194 - Forks: 0

mohamedgad0/SEED-CHECKER-

Size: 1.95 KB - Last synced at: 8 months ago - Pushed at: 8 months ago - Stars: 192 - Forks: 0

AkinRigo/BRUTE-FORCE-CRYPTO-WALLETS-

Size: 1.95 KB - Last synced at: 8 months ago - Pushed at: 8 months ago - Stars: 136 - Forks: 0

Tonychris123/SEED-CHECKER-

Size: 1.95 KB - Last synced at: 8 months ago - Pushed at: 8 months ago - Stars: 74 - Forks: 0

satoruGojo007/GENERATOR-OF-SEED-PHRASE-

Size: 4.88 KB - Last synced at: 8 months ago - Pushed at: 8 months ago - Stars: 61 - Forks: 0

Denleon12/GENERATOR-OF-SEED-PHRASE-

Size: 1.95 KB - Last synced at: 8 months ago - Pushed at: 8 months ago - Stars: 60 - Forks: 0

taylorwilsdon/reddacted

reddacted lets you analyze & clean up your online footprint surgically by using LLMs, PII & sentiment analysis to identify that might be likely to reveal personal info that you may not want correlated with your anonymous username

Language: Python - Size: 599 KB - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 57 - Forks: 4

ninhdan/BRUTE-FORCE-CRYPTO-WALLETS-

Size: 1.95 KB - Last synced at: 8 months ago - Pushed at: 8 months ago - Stars: 2 - Forks: 0

AdityaPatadiya/File-Integrity-Monitor-FIM

The File Integrity Monitoring (FIM) System continuously monitors multiple directories for unauthorized changes, ensuring data integrity and security. It logs modifications, detects anomalies using AI, and provides alerts for suspicious activities.

Language: Python - Size: 171 KB - Last synced at: 10 days ago - Pushed at: 10 days ago - Stars: 1 - Forks: 0

Dragce09/Metasploit-Framework-2025

Metasploit Framework for penetration testing and security research. Identify and exploit vulnerabilities in your network. 🔓🛠️

Size: 1.95 KB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 1 - Forks: 0

Xorlent/Cybersec-Links

A collection of info and links to various useful cybersecurity resources

Size: 131 KB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 1 - Forks: 0

Nachoxt17/Audit-Reports

Smart Contracts Audits Reports made by Ignacio Ceaglio.

Size: 6.84 KB - Last synced at: 10 months ago - Pushed at: 10 months ago - Stars: 1 - Forks: 0

sub2samplays/Metasploit-Framework-2025

Metasploit Framework for penetration testing and security research. Identify and exploit vulnerabilities in your network. 🔓🛠️

Size: 8.79 KB - Last synced at: 5 days ago - Pushed at: 5 days ago - Stars: 0 - Forks: 0

khulnasoft/osinsight

🔍 Production-ready detection & response queries for osquery 🛡️ Boost endpoint monitoring, detect threats 🚨, and streamline incident response ⚡

Language: Makefile - Size: 3.15 MB - Last synced at: 6 days ago - Pushed at: 19 days ago - Stars: 0 - Forks: 1

Panabit-Software/About_Panabit Fork of SYNACK147/Panabit_Info

Panabit, a software company specializing in network access, traffic management, security auditing, and data analytics

Size: 41.3 MB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

Panabit-official/Panabit_Info

Panabit Introduction

Size: 23.3 MB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 1

Water1FF/Metasploit-Framework-2025

Metasploit Framework for penetration testing and security research. Identify and exploit vulnerabilities in your network. 🔓🛠️

Size: 7.81 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

JayRyz/RedPenStrux

Automated folder and file structure generator for Red Team and Penetration Testing projects, designed to streamline organization and documentation.

Language: Shell - Size: 7.81 KB - Last synced at: about 1 month ago - Pushed at: 3 months ago - Stars: 0 - Forks: 0

vmer66bull/Ethical-Keylogger-Testing-Tool

An ethical keylogger tool for system and security testing, designed for educational and corporate use. 🔐🛠️

Size: 0 Bytes - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 0 - Forks: 0

oldmanwinter380/Activity-Monitor-Pro

Activity Monitor Pro – monitor system activity, track user behavior, and ensure device security. 🖥️🔐

Size: 0 Bytes - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 0 - Forks: 0

nyancatshire3941/Metasploit-Framework-2025

Metasploit Framework for penetration testing and security research. Identify and exploit vulnerabilities in your network. 🔓🛠️

Size: 6.84 KB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 0 - Forks: 0

realblonde48tree/Burp-Suite-Pro-Installer-2025

Burp Suite Pro for web security testing and penetration testing. Analyze and identify vulnerabilities in web applications. 🔍💻

Size: 6.84 KB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 0 - Forks: 0

icepower7946/Activity-Monitor-Pro

Activity Monitor Pro – monitor system activity, track user behavior, and ensure device security. 🖥️🔐

Size: 6.84 KB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 0 - Forks: 0

cafrifirsglad/Metasploit-Framework-2025

Metasploit Framework for penetration testing and security research. Identify and exploit vulnerabilities in your network. 🔓🛠️

Size: 6.84 KB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 0 - Forks: 0

bombarulesinpage83/Burp-Suite-Pro-Installer-2025

Burp Suite Pro for web security testing and penetration testing. Analyze and identify vulnerabilities in web applications. 🔍💻

Size: 6.84 KB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 0 - Forks: 0

goobers8114/Ethical-Keylogger-Testing-Tool

An ethical keylogger tool for system and security testing, designed for educational and corporate use. 🔐🛠️

Size: 0 Bytes - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 0 - Forks: 0

Related Topics
network-security 13 cyber-security 12 security-tools 11 penetration-testing 9 security-research 9 security-testing 9 ethical-hacking 9 computer-security 7 wallet-security 7 security-assessment 7 security-software 7 blockchain-security 7 pen-test-tools 7 web-application-security 6 network-testing 6 red-teaming 5 penetration-testing-framework 5 security-framework 5 vulnerability-exploitation 5 application-security 5 exploitation-framework 5 cryptocurrency-security 5 cryptography 5 data-security 5 digital-security 5 information-security 5 password-security 5 software-security 5 cybersecurity 5 system-monitoring 4 exploit-testing 4 data-protection 4 metasploit 4 hacking-tools 3 seed-phrase-generator 3 privacy-tools 3 exploit-development 3 seed-phrase-generation 3 seed-phrase-creation 3 system-security 3 ethical-tools 2 workplace-monitoring 2 data-analysis 2 cyber-forensics 2 corporate-security 2 activity-logger 2 user-tracking 2 user-activity 2 usage-monitoring 2 productivity-tracking 2 monitoring-tools 2 desktop-activity 2 behavioral-analytics 2 app-usage 2 activity-monitor 2 web-security-scanner 2 web-security 2 vulnerability-scanner 2 security-auditing-tools 2 penetration-testing-tools 2 pen-testing 2 burp-suite 2 app-security 2 user-activity-monitoring 2 system-analysis 2 research-tools 2 keylogger 2 keyboard-logger 2 it-tools 2 it-audit 2 security 2 real-time-monitoring 2 network-access 2 panabit 2 traffic-management 2 attack-simulation 2 brute-force-attacks 2 wallet-recovery-tools 2 wallet-protection 2 secure-wallets 2 password-cracking 2 hacking-techniques 2 encryption-tools 2 data-recovery 2 cybersecurity-tools 2 cybersecurity-research 2 cryptography-methods 2 crypto-wallets 2 crypto-security-audits 2 crypto-hacking-tools 2 brute-force-methods 2 data-analytics 2 seed-validation 2 seed-phrase-validation 2 seed-checker 2 vulnerability-assessment 2 penetration-tool 2 password-recovery-tool 2 password-auditing 2 password-analyzer 2