Take it like a gift

RedELK
RedELK

Tool for Red Teams used for tracking and alarming about Blue Team activities.

droopescan
droopescan

A plugin-based scanner that aids security researchers in identifying issues with several CMSs.

Security Monkey
Security Monkey

Monitor AWS, GCP, OpenStack, and GitHub orgs for assets and their changes over time.

HostileSubBruteforcer
HostileSubBruteforcer

Bruteforce existing subdomains and provide informations about them.

AllAboutBugBounty
AllAboutBugBounty

Bug Bounty notes gathered from various sources.

subzuf
subzuf

A smart DNS response-guided subdomain fuzzer.

NMapify
NMapify

Quickly and accurately create a visual representation of their Nmap output.

lyncsmash
lyncsmash

Locate and attack Lync and Skype for Business.

AzureADLateralMovement
AzureADLateralMovement

Lateral movement graph for Azure Active Directory.

AWSloot
AWSloot

Pull secrets from an AWS environment.

Sguil
Sguil

The analyst console for network security monitoring.

Mosca
Mosca

Manual search tool to find bugs like a grep unix command.

ADRecon
ADRecon

Gather information about the Active Directory and generates a report.

al-khaser
al-khaser

Public malware techniques used in the wild: virtual machine, emulation, debuggers.

Acunetix
Acunetix

Quickly find and fix the vulnerabilities that put your web applications at risk of attack.