diff --git a/EMVStatusDefiner.py b/EMVStatusDefiner.py new file mode 100644 index 0000000..9f6ae4a --- /dev/null +++ b/EMVStatusDefiner.py @@ -0,0 +1,666 @@ +#!/usr/bin/env python3 + +import json + +import os + +# Position-specific value map (directly in the script) + +TYPE_CODE_MAP = { + + "--": "Transaction is not initiated", + + "00": "Purchase", + + "01": "Refund", + + "02": "Void", + + "03": "Void return", + +} + +VALUE_MAP = { + + "1": { + + "-": "Chip card is not inserted", + + "I": "Chip card is inserted", + + "R": "Chip card is removed" + + }, + + "2": { + + "-": "EMV process is not started", + + "S": "EMV process is started" + + }, + + "3": { + + "-": "Incomplete", + + "C": "Completed", + + "A": "Completed with approval", + + "D": "Completed with decline", + + "E": "Error or incomplete data", + + "F": "Fallback to MSR (unsupported)" + + }, + + "4": { + + "-": "Unselected", + + "M": "Manually selected", + + "A": "Automatically selected" + + }, + + "5": { + + "-": "Unselected", + + "M": "Manually selected", + + "A": "Automatically selected" + + }, + + "6": { + + "-": "Unconfirmed", + + "A": "Confirmation accepted", + + "R": "Confirmation rejected" + + }, + + "7": { + + "-": "Rewards request is not received", + + "R": "Rewards request is received", + + "S": "Rewards response sent" + + }, + + "8": { + + "-": "Payment type request is not received", + + "R": "Payment type request is received", + + "S": "Payment type response sent" + + }, + + "9": { + + "-": "Amount unconfirmed", + + "A": "Amount confirmation accepted", + + "R": "Confirmation rejected" + + }, + + "10": { + + "-": "This is not the last PIN try", + + "L": "This is the last PIN try" + + }, + + "11": { + + "-": "Offline PIN is not entered", + + "P": "Offline PIN is entered", + + "B": "PIN bypassed" + + }, + + "12": { + + "-": "Account type is not selected", + + "C": "Checking account type is selected", + + "S": "Savings account type is selected" + + }, + + "13": { + + "-": "Authorization request is not sent", + + "S": "Authorization request is sent", + + "F": "Authorization request failed to send" + + }, + + "14": { + + "-": "Authorization response is not received", + + "R": "Authorization response is received", + + "T": "Internal terminal timeout on authorization response", + + "H": "Register indication of no Host available; down or timeout" + + }, + + "15": { + + "-": "Confirmation response is unsent", + + "S": "Confirmation response is sent", + + "F": "Confirmation response failed to send" + + }, + + "16": { + + "-": "Transaction is not canceled", + + "C": "Transaction is canceled" + + }, + + "17": { + + "-": "Card data is not invalid or is not detected", + + "I": "Card data is invalid but fallback is allowed", + + "N": "Card data invalid, fallback data not allowed due to being an Interac debit transaction" + + }, + + "18": { + + "-": "Card or application block is not detected", + + "A": "Application is blocked", + + "B": "Card is blocked" + + }, + + "19": { + + "-": "No fatal error is detected", + + "F": "Fatal error is detected", + + "K": "Track-2 data consistency failed", + + "O": "User interface timeout", + + "X": "EMV card application is expired", + + "C": "Cashback error (such as, cashback amount > current transaction maximum cashback amount)", + + "B": "Cashback requested before PIN-entry, but PIN bypassed", + + "T": "More than three taps", + + "M": "MSD card not supported" + + }, + + "20": { + + "-": "No premature card removal detected", + + "R": "Premature card removal detected" + + }, + + "21": { + + "-": "No status is available", + + "N": "Card is not supported (such as, application ID not found)" + + }, + + "22": { + + "-": "No MAC verification performed in transaction", + + "P": "MAC verification passed", + + "F": "MAC verification failed" + + }, + + "23": { + + "-": "Post confirmation wait is not started", + + "S": "Post confirmation wait started" + + }, + + "24": { + + "-": "No signature request is detected and started ", + + "S": "Signature request is detected and started ", + + "E": "Signature request is complete ", + + "R": "Paper signature requested" + + }, + + "25": { + + "-": "Transaction preparation response not sent", + + "S": "Transaction preparation response sent", + + "F": "Transaction preparation response failed to send" + + }, + + "26": { + + "-": "EMV flow is not suspended", + + "1": "EMV flow is suspended", + + "0": "EMV flow resumed" + + }, + + "27": { + + "-": "Initialized state at start of transaction", + + "R": "PIN entry request. Flag set to R at start of the first online PIN entry", + + "C": "PIN entry canceled, having failed due to invalid PIN. It remains set as R if manually canceled by the Cancel button", + + "A": "PIN block is accepted and valid. Updated when host returns T8A = 00 or other transaction approval", + + "B": "PIN bypassed. Can be bypassed via Cancel button or card removal", + + "E": "PIN entry failed for any error (including PIN entry timeout)", + + "I": "PIN entered is invalid. Updated when host returns T8A = 55. PIN entry restarts, but the flag remains set to I until updated (rather than resetting to -)", + + "D": "PIN not verified. Updated when host returns T8A = 05 or other transaction declined notification" + + }, + + "28": { + + "0": "Post-PIN cash back Enables cashback amount selection after PIN entry.", + + "2": "Process CVM", + + "3": "Contact Flow Complete Marks the true end of the EMV flow after all transaction steps are complete.", + + "A": "Start Transaction The EMV transaction started. Used for POS information; suspend not required.", + + "B": "Select language service Language selection is performed on the terminal. Used for POS information; suspend not required.", + + "C": "Select AID service Application ID selection is performed on the terminal. Used for POS information; suspend not required.", + + "D": "Cardholder AID confirmation Cardholder confirms the application selection. Used for POS information; suspend not required.", + + "E": "Application final selection Sets EMV proprietary tags during the transaction. Suspend is required to set data.    Note: If the card has more than one application, and the first application is not supported but the second one is supported, the suspend step is sent for the second, supported application only.", + + "F": "Get amount application selection Sets the transaction total amount. The transaction should be suspended during this step to set the transaction total amount using the 13.x message. Avoid updating tags mid-flow.", + + "G": "Set proprietary tags at application selection Supports dynamic currency conversion. Sets EMV proprietary tags during the transaction. Suspend is required to set data. Suspend is required to enable synchronization.", + + "H": "Read application data PAN ready (to stop for partial EMV) Stops a partial EMV transaction. The application is suspended, and the 33.09 Set Tag Data message can be used with command A (Request AAC for partial EMV transaction). Used in an optimized Quick Chip transaction.", + + "I": "Set payment type Non-EMV step to set the payment type.", + + "J": "Get cashback amount Non-EMV step to get the cashback amount. Used in an optimized Quick Chip cashback transaction.", + + "K": "Read application data change amount Changes the transaction total amount using the 13.x message. Two suspend steps are needed for the final amount confirmation.", + + "L": "Amount confirmation Non-EMV step to confirm the amount.", + + "M": "Account selection Non-EMV step to select the account type (checking or savings).", + + "N": "Offline PIN entry Used for offline entry; the cardholder must enter their PIN. Used for POS information.", + + "O": "Online PIN entry Used for online entry; the cardholder must enter their PIN. Used for POS information.", + + "P": "Last transaction data request Bypasses the last EMV transaction data to the application. For example: To pass the last transaction data in the same batch performed using the same card.", + + "Q": "Terminal action analysis (to stop for partial EMV) Stops a partial EMV transaction. The 33.09 Set Tag Data message can be used with command A (Request AAC for partial EMV transaction).", + + "R": "Online authorization response in progress Suspend step used after the 33.03 Authorization Request Message is sent and before waiting on the 33.04 2nd Gen AC Request message, allowing on-demand control. Use this step to send online on-demand PIN retries without generating a new cryptogram for each try.", + + "S": "EMV stop Transaction ended. Used for POS information.", + + "T": "CMV Modification Modify terminal capabilities after Confirm Aid and before Select App, if configured.", + + "U": "Completion Status. End of transaction control. Allows users to:,    Ignore a card decline, and the terminal displays approval    Display custom messages instead of or with approved/declined status    Provide custom display and/or beeps (using the 51.x Beep Message to prompt a cardholder to remove the card    Resuming during this step returns the screen to transaction results.    Notes:    1. Do not use reset messages when suspended at Step U. Instead, use the 33.09 Set Tag Data Message to resume or skip. Then, reset messages can be used.    2. In a specific scenario, a blank form displays until a reset message is sent. If the card is removed after the 33.09J (skip) and Please Remove Card message is displayed following the use of custom display(s) at Step U, a blank form is displayed until a reset message is received from the POS. This blank form can be modified using the 70.x Update Form Element if the form includes dynamic prompts.", + + "V": "External Application Selection Suspends an Optimized Quick-Chip transaction with external AID selection so the POS can send on-demand custom form(s)." + + }, + + "29": { + + "-": "Reserved" + + }, + + "30": { + + "-": "Reserved" + + }, + + "31": { + + "-": "Initialized at start state (before cashback request is set)", + + "R": "Cash back requested (when configuration is set)", + + "C": "Cash back accepted (after the cashback value is set by the POS)" + + }, + + "32": { + + "-": "Contactless transaction not yet started", + + "1": "Contactless transaction started", + + "0": "Contactless transaction stopped" + + }, + + "33": { + + "-": "No error", + + "C": "Collision detected", + + "R": "Re-tap required" + + } + +} + +def load_history(filename): + + if os.path.exists(filename): + + with open(filename, "r") as f: + + lines = [line.strip() for line in f.readlines() if line.strip()] + + return lines + + return [] + +def save_history(history, filename): + + with open(filename, "w") as f: + + for line in history: + + f.write(line + "\n") + +def interpret_line(input_str, value_map, mode=1): + + if len(input_str) < 2: + + return "Input too short." + + type_code = input_str[:2] + + body = input_str[2:] + + type_meaning = TYPE_CODE_MAP.get(type_code, "Unknown type code") + + result = [f"\nType Code '{type_code}': {type_meaning}"] + + for i, char in enumerate(body, start=1): + + if mode == 2 and char == "-": + + continue + + meaning = value_map.get(str(i), {}).get(char, "Unknown") + + if mode == 3 and char == "-": + + result.append(f"{i:2}. {char}") + + else: + + result.append(f"{i:2}. {char}  → {meaning}") + + return "\n".join(result) + +def choose_mode(): + + print("\nChoose an option:\n") + + print("1. Show all characters with definitions") + + print("2. Show only letters (ignore dashes '-')") + + print("3. Show all characters but no definitions for '-'") + + print("4. Switch history file") + + choice = input("Enter 1, 2, 3, or 4: ").strip() + + if choice == "2": + + return 2 + + elif choice == "3": + + return 3 + + elif choice == "4": + + return 4 + + else: + + return 1 + +def show_history(history, value_map, mode): + if not history: + print("\n📜 History is empty.\n") + return + print("\n📜 Full History (type back to exit, ! to re-run):\n") + while True: + for idx, item in enumerate(history, 1): + print(f"{idx:2}. {item}") + print(interpret_line(item, value_map, mode)) + print("-" * 40) + cmd = input("History (type back to exit, ! to re-run)> ").strip().lower() + if cmd == "back": + print("\nReturning to main input...\n") + break + elif cmd.startswith("!"): + try: + num = int(cmd[1:]) + if 1 <= num <= len(history): + chosen = history[num-1] + print(f"\nRe-running input #{num}: {chosen}\n") + print(interpret_line(chosen, value_map, mode)) + print("-" * 40) + else: + print(f"Invalid number. Choose between 1 and {len(history)}.") + except ValueError: + print("Invalid command format. Use ! to re-run.") + else: + print("Type 'back' to return or ! to re-run a past input.") + + +def save_history(history, filename): + with open(filename, "w") as f: + for line in history: + f.write(line + "\n") + +def interpret_line(input_str, value_map, mode=1): + if len(input_str) < 2: + return "Input too short." + type_code = input_str[:2] + body = input_str[2:] + type_meaning = TYPE_CODE_MAP.get(type_code, "Unknown type code") + result = [f"\nType Code '{type_code}': {type_meaning}"] + for i, char in enumerate(body, start=1): + if mode == 2 and char == "-": + continue + meaning = value_map.get(str(i), {}).get(char, "Unknown") + if mode == 3 and char == "-": + result.append(f"{i:2}. {char}") + else: + result.append(f"{i:2}. {char} → {meaning}") + return "\n".join(result) + +def choose_mode(): + print("\nChoose an option:\n") + print("1. Show all characters with definitions") + print("2. Show only letters (ignore dashes '-')") + print("3. Show all characters but no definitions for '-'") + print("4. Switch history file") + choice = input("Enter 1, 2, 3, or 4: ").strip() + if choice == "2": + return 2 + elif choice == "3": + return 3 + elif choice == "4": + return 4 + else: + return 1 + +def show_history(history, value_map, mode): + if not history: + print("\n📜 History is empty.\n") + return + print("\n📜 Full History (type back to exit, ! to re-run):\n") + while True: + for idx, item in enumerate(history, 1): + print(f"{idx:2}. {item}") + print(interpret_line(item, value_map, mode)) + print("-" * 40) + cmd = input("History (type back to exit, ! to re-run)> ").strip().lower() + if cmd == "back": + print("\nReturning to main input...\n") + break + elif cmd.startswith("!"): + try: + num = int(cmd[1:]) + if 1 <= num <= len(history): + chosen = history[num-1] + print(f"\nRe-running input #{num}: {chosen}\n") + print(interpret_line(chosen, value_map, mode)) + print("-" * 40) + else: + print(f"Invalid number. Choose between 1 and {len(history)}.") + except ValueError: + print("Invalid command format. Use ! to re-run.") + else: + print("Type 'back' to return or ! to re-run a past input.") + +def list_history_files(): + print("\n📁 Available history files:") + txt_files = [f for f in os.listdir('.') if os.path.isfile(f) and f.endswith('.txt')] + if not txt_files: + print("No .txt files found in current directory.") + else: + for f in txt_files: + print(f"- {f}") + print() + +def main(): + print("🧾 Printer Interpreter Tool\n") + # List existing history files first + list_history_files() + # Then ask for filename + history_file = input("Enter history filename (default 'history.txt'): ").strip() + if not history_file: + history_file = "history.txt" + mode = choose_mode() + history = load_history(history_file) + try: + while True: + if mode == 4: + list_history_files() + new_file = input("Enter history filename to switch to: ").strip() + if new_file: + print(f"Switching to history file: {new_file}") + history_file = new_file + history = load_history(history_file) + else: + print("No file entered, staying with current history.") + mode = choose_mode() + continue + input_line = input("Input (menu, h/hist for history, ls to list, switch , Ctrl+C to quit): ").strip() + # handle commands first + if input_line == "menu": + mode = choose_mode() + continue + if input_line in ["h", "history", "hist"]: + show_history(history, VALUE_MAP, mode) + continue + if input_line == "ls": + list_history_files() + continue + if input_line.startswith("switch"): + parts = input_line.split(maxsplit=1) + if len(parts) == 2: + new_file = parts[1].strip() + if new_file: + print(f"Switching to history file: {new_file}") + history_file = new_file + history = load_history(history_file) + else: + print("Usage: switch ") + else: + print("Usage: switch ") + continue + if not input_line: + continue + # split input_line by spaces to process multiple inputs + inputs = input_line.split() + for inp in inputs: + if len(inp) < 2: + print(f"Input '{inp}' too short, skipping.\n") + continue + history.append(inp) + save_history(history, history_file) + print(f"\nInterpreted Output for: {inp}\n") + print(interpret_line(inp, VALUE_MAP, mode)) + print("\n" + "=" * 40 + "\n") + except KeyboardInterrupt: + print("\nExited.") + +if __name__ == "__main__": + main() \ No newline at end of file diff --git a/README.md b/README.md index 1e59e17..a3b2654 100644 --- a/README.md +++ b/README.md @@ -1,10 +1,10 @@
- + [![image](https://github.com/bst04/cybersources/blob/main/cybersources/banner%20cybersources.png?raw=true)](https://cybersources.site/?=github) -Welcome to the **Cybersources**! This project serves as a central hub for a wide range of tools, resources, and educational materials designed for cybersecurity professionals, enthusiasts, and learners. Whether you're just starting out or an experienced expert, you'll find everything you need to enhance your skills, stay updated with industry trends, and deepen your knowledge in this fast-evolving field. +Welcome to the **Cybersources**! This project serves as a central hub for a wide range of tools, resources, and educational materials designed for cybersecurity professionals, enthusiasts, and learners. Whether you're just starting out or an experienced expert, you'll find everything you need to enhance your skills, stay updated with industry trends, and deepen your knowledge in this fast-evolving field. -**🎉 Join now the discord community (+1.9k members): https://discord.gg/6s9W3EQApw 🎉** +**🎉 Join now the discord community (+1.9k members): 🎉** [![](https://img.shields.io/badge/Discord-%235865F2.svg?style=Social&logo=discord&logoColor=white)](https://discord.gg/HhjhQgnp54) [![Reddit](https://img.shields.io/badge/Reddit-FF4500?style=Social&logo=reddit&logoColor=white)](https://www.reddit.com/r/cybersources/) @@ -20,28 +20,20 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide Hudson Rock - - - - ---- - +---
- ## [**Check out the website‼️**](https://cybersources.site/) [![websitecyber](https://github.com/user-attachments/assets/8bedc240-6ffc-4ed8-a9d0-492e73a12798)](https://cybersources.site/) - - - ## 📋 Content **OSINT** + * [OSINT](#11--osint) * [Username Search](#12--username-search) * [Email Search](#13--email-search) @@ -49,24 +41,25 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide * [GEOINT](#15--geoint) * [Photo/Images](#16--photo--images) * [Social Networks](#17--social-networks) - * [Instagram](#171--instagram) - * [LinkedIn](#172--linkedin) - * [TikTok](#173--tiktok) - * [OnlyFans](#174--onlyfans) - * [Discord](#175--discord) - * [Twitch](#176--twitch) - * [Tinder](#177--tinder) - * [Reddit](#178--reddit) - * [Telegram](#179--telegram) + * [Instagram](#171--instagram) + * [LinkedIn](#172--linkedin) + * [TikTok](#173--tiktok) + * [OnlyFans](#174--onlyfans) + * [Discord](#175--discord) + * [Twitch](#176--twitch) + * [Tinder](#177--tinder) + * [Reddit](#178--reddit) + * [Telegram](#179--telegram) **Pentesting** + * [Post Explotation](#21--post-explotation) -* [Deobfuscators](#22--deobfuscators) -* [Decompilers](#23--decompilers) -* [Disassembler and debuggers](#24--Disassembler-and-debuggers) +* [Deobfuscators](#22--deobfuscators) +* [Decompilers](#23--decompilers) +* [Disassembler and debuggers](#24--disassembler-and-debuggers) * [Web](#25--web) * [Network](#26--network) -* [RFID](#-27-RFID) +* [RFID](#-27-rfid) * [WiFi](#-28-wifi) * [Bluetooth](#-29-bluetooth) * [Reconnaissance](#-210-reconnaissance) @@ -74,47 +67,54 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide * [Binary Explotation](#-212-binary-explotation) * [CCTV](#-213-cctv) - **Cryptography** + * [Cryptography](#31--cryptography) * [Steganographic](#-32-steganographic) * [Steganalysis](#-33-steganalysis) **Forensic & Malware Analysis** + * [Forensic](#41--forensic) * [Hex editors](#42--hex-editors) * [Execution logging and tracing](#43--execution-logging-and-tracing) * [Malware Analysis](#-44-malware-analysis) **Anonymity and Security Tools** + * [Delete Your Trace](#-51-delete-your-trace) * [Password Managers](#-52-password-managers) -* [VPNs](#-53-VPNs) +* [VPNs](#-53-vpns) * [Privacy and Anonymity](#-54-privacy-and-anonymity) **Utility & Miscellaneous** + * [Utility](#61--utility) * [Miscellaneous](#62--miscellaneous) * [News](#63--news) * [Search Engines](#64--search-engines) * [DNS/IP](#65--dnsip) -* [System](#66--system) +* [System](#66--system) **AI Tools** + * [AI Programming](#71--ai-programming) * [AI Cybersecurity](#72--ai-cybersecurity) **Specialized Tools** + * [Cryptocurrency](#-81-cryptocurrency) * [Playbooks](#-82-playbooks) * [SIEM](#-83-siem) * [Cracking](#-84-cracking) **Hardware & Operating Systems** + * [Operating Systems](#-91-operating-systems) * [Hardware Tools](#-92-hardware-tools) **Learning & Training Resources** + * [Resources](#--resources) * [Courses](#--courses) * [Certifications](#--certifications) @@ -126,6 +126,7 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide * [Projects Based](#-%EF%B8%8F-projects-based) **Social and Media** + * [Events](#--events) * [Community](#--community) * [Podcasts](#-%EF%B8%8F-podcasts) @@ -136,13 +137,11 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide * [LinkedIn Creators](#--linkedin-creators) **Repository** + * [Stars History](#-%EF%B8%8F-star-history) * [Collaborate](#--collaborate) * [Credits](#--credits) - - - ## 1. [↑](#-content) OSINT #### 1.1 [↑](#-content) OSINT @@ -157,7 +156,6 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [IntelTechniques](https://inteltechniques.com/tools/Search.html) | Search engine tailored for OSINT investigations across multiple data types. | | [Cybdetective](https://cybdetective.com/osintmap) | Visual global directory of OSINT tools. | | [Face Comparison](https://facecomparison.toolpie.com) | Compare facial images to find matches. | -| [OSINT Framework](https://osintframework.com) | Extensive repository of OSINT tools and techniques. | | [FaceCheckID](https://facecheck.id) | Reverse image lookup specialized in facial recognition. | | [Social Catfish](https://socialcatfish.com) | Find people using names, images, or other details. | | [Google Lens](https://lens.google) | AI-powered tool to analyze and extract information from images. | @@ -169,11 +167,20 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide |[Digital Digging OSINT](https://digitaldigging.org/osint/)|Collection of OSINT resources are organized by country and are useful for researchers, fact-checkers, and digital profilers.| |[toposint](https://start.me/p/vjqXe1/toposint-com)|Open Source Intelligence collections and other interests.| |[The OSINT Rack](https://www.mariosantella.com/the-osint-rack/)|A curated and growing list of open-source intelligence tools; explore resources across recon, social media, metadata, geolocation, and more.| - +| [Maltego](https://www.maltego.com) | Graph-based link analysis and data mapping. | +| [Shodan](https://www.shodan.io) | “Search engine for IoT” to identify exposed systems. | +| [1 TRACE](https://1trace.space) | Web-based OSINT platform integrating SOCMINT, CYBINT, FININT. | +| [Intelligence X](https://intelx.io) | Archives and searches darknet, leaks, Bitcoin addresses. | +| [SpiderFoot](https://www.spiderfoot.net/) | Automated OSINT tool that scans a target across 100+ data sources. | +| [Maltego (Community Edition)](https://www.maltego.com/) | Visual link analysis tool for OSINT and forensics with extensible transforms. | +| [theHarvester](https://github.com/laramies/theHarvester) | Email, subdomain, host, and employee names gathering tool from public sources. | +| [Recon-ng](https://github.com/lanmaster53/recon-ng) | Modular OSINT framework designed for automated reconnaissance. | +| [Censys](https://censys.io/) | Search engine and data platform to discover internet assets and vulnerabilities. | +| [Metagoofil](https://github.com/laramies/metagoofil) | Extract metadata from public documents for information gathering. | +| [FOCA](https://www.elevenpaths.com/labstools/foca/index.html) | Metadata extraction tool for documents and images for OSINT. | #### 1.2 [↑](#-content) Username Search - | **Tool** | **Description** | | ---------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | | [UserSearch](https://usersearch.org) | Free tool to search usernames on 2000+ websites. | @@ -202,11 +209,16 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [Amazon Usernames](https://www.google.com/search?q=site:amazon.com+%3Cusername%3E)|URL for search usernames for Amazon| | [GitHub Usernames](https://api.github.com/users/%3Cusername%3E/events/public)|URL to find GitHub users.| | [Tinder Usernames](https://www.gotinder.com/@%3Cusername%3E)|URL to find tinder users.| - +| [Namechk](https://namechk.com/) | Check username availability across dozens of social platforms and domains. | +| [UserRecon](https://github.com/f004/userrecon) | OSINT tool to check for usernames across 50+ platforms with detailed reports. | +| [CheckUsernames](https://checkusernames.com/) | Search for username availability on 100+ social networks and websites. | +| [Namecheckup](https://www.namecheckup.com/) | Similar to Namechk, searches username and domain availability globally. | +| [WhatsMyName](https://github.com/WebBreacher/WhatsMyName) | CLI tool to find usernames across many platforms, useful for automation. | +| [UserScan](https://usersearch.org/) | Online username search tool that checks social media platforms and leaks. | +| [KnowEm](https://knowem.com/) | Commercial service that checks username and brand name availability. | #### 1.3 [↑](#-content) Email Search - | Tool | Description | |-------------------------------------|----------------------------------------------------------------------------------------------| | [Epieos](https://epieos.com) | Analyze and investigate email addresses. | @@ -243,21 +255,30 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [OneLook](https://www.onelook.com/reverse-dictionary.shtml)|Enter a word, phrase, description, or pattern above to find synonyms, related words, and more.| | [Email Permutator](http://metricsparrow.com/toolkit/email-permutator/)|This tool is intended to help you find the email addresses of people you need to contact.| | [Toofr](https://www.toofr.com/)|Find Anyone’s Email Address in Seconds. Instantly connect with decision-makers that matter to your business.| -| [Skymem](https://www.skymem.info/)|Find email addresses of companies and people| | [the Harvester](https://github.com/laramies/theHarvester)|E-mails, subdomains and names Harvester - OSINT| | [Voilanobert](https://www.voilanorbert.com/)|I can find anyone's email address| | [Hunter](https://hunter.io/)|Hunter is your all-in-one email outreach platform.| | [SingalHire](https://www.signalhire.com/)|Find Valid Emails and Phone Numbers| | [LeakRadar](https://leakradar.io/)|Instant search across 2 B+ plain-text info-stealer credentials; email, domain, metadata queries, monitoring & API| - +| [Snov.io](https://snov.io/) | Email finder and verifier with integration capabilities for marketing and sales. | +| [VoilaNorbert](https://www.voilanorbert.com/) | Email finder for leads with bulk verification feature. | +| [FindThatLead](https://findthatlead.com/) | Email search and verification tool aimed at sales and marketing professionals. | +| [Anymail Finder](https://anymailfinder.com/) | Email address finder and verifier based on names and domains. | +| [Clearbit Connect](https://connect.clearbit.com/) | Gmail/Outlook plugin for discovering emails and company data inside inbox. | #### 1.4 [↑](#-content) Phone Number Search - | Tool | Description | |-------------------------------------|----------------------------------------------------------------------------------------------| |[phoneinfoga](https://github.com/sundowndev/phoneinfoga)|Information gathering framework for phone numbers| - +| [PhoneInfoga](https://github.com/sundowndev/phoneinfoga) | Phone number profiling and reputation gathering. | +| [Truecaller](https://www.truecaller.com/) | Caller ID and spam blocking app with a large global phone number directory. | +| [NumLookup](https://www.numlookup.com/) | Free phone number lookup tool that provides owner details and carrier info. | +| [Sync.Me](https://sync.me/) | Caller ID app that also provides social media details linked to phone numbers. | +| [Spy Dialer](https://www.spydialer.com/) | Phone number, people, address, and email lookup based on public data. | +| [Whitepages Premium](https://www.whitepages.com/) | Enhanced lookup for phone numbers, including background checks. | +| [WhoCallsMe](https://whocallsme.com/) | User-submitted reports on phone numbers for spam/scam identification. | +| [OpenCNAM](https://www.opencnam.com/) | API service for CNAM (Caller ID) lookups, useful for integrations. | #### 1.5 [↑](#-content) GEOINT @@ -298,17 +319,12 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [Bellingcat OSM Search](https://www.bellingcat.com/resources/how-tos/2020/01/21/using-openstreetmap-for-geolocation-osint/) | Guide and tool for geolocation using OpenStreetMap. | | [Google Maps](https://maps.google.com) | A widely used tool for mapping, navigation, and geolocation searches. | | [Overpass Turbo](https://overpass-turbo.eu) | A web-based tool for querying and filtering OpenStreetMap data. | -| [Google Earth](https://earth.google.com) | 3D mapping and satellite imagery tool for exploring locations globally. | -| [Mapillary](https://www.mapillary.com) | A street-level imagery platform for mapping and geospatial analysis. | -| [World Imagery Wayback](https://livingatlas.arcgis.com/wayback) | Access archived satellite imagery for geospatial and temporal analysis. | -| [Zoom Earth](https://zoom.earth) | Live weather map and satellite imagery with storm tracking and rain radar. | -| [Sentinel Playground](https://apps.sentinel-hub.com/sentinel-playground/) | Explore satellite imagery and analyze geospatial data from Sentinel satellites. | -| [Real-Time Satellite Tracking](https://n2yo.com) | Track satellites and view real-time predictions for their paths. | -| [SunCalc](https://suncalc.net/) | A solar position calculator for determining sunrise, sunset, and shadow lengths on a map. | -| [Map Developers](https://www.mapdevelopers.com) | Provides custom Google Map API solutions and tools for advanced mapping needs. | | [GeoSpy AI](https://geospy.ai/)| Convert pixels into actionable location intelligence using AI.| - - +| [OpenStreetMap (OSM)](https://www.openstreetmap.org/) | Collaborative project to create a free editable map of the world with rich geospatial data. | +| [QGIS](https://qgis.org/) | Open-source Geographic Information System for spatial data analysis and visualization. | +| [Terraserver](https://www.terraserver.com/) | Satellite and aerial imagery search with historical views. | +| [Here WeGo](https://wego.here.com/) | Mapping platform with routing, geocoding, and geospatial APIs. | +| [Sentinel Hub](https://www.sentinel-hub.com/) | Satellite data service with easy access to Sentinel, Landsat, and MODIS imagery. | #### 1.6 [↑](#-content) Photo / Images @@ -317,7 +333,16 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [Photo.Osint](https://start.me/p/0PgzqO/photo-osint)| List of all tools for photo and images OSINT.| | [Foto Forensics](https://fotoforensics.com/) | All the metadata of an image. | | [Exiftool](https://github.com/exiftool/exiftool) | A terminal based tool for extracting images meta data. | - +| [ExifTool](https://exiftool.org/) | Extract metadata from images and documents. | +| [FOCA](https://github.com/ElevenPaths/FOCA) | Document parser to extract metadata and hidden data. | +| [Metagoofil](https://github.com/laramies/metagoofil) | Metadata mining from publicly available documents. | +| [Google Reverse Image Search](https://images.google.com/) | Upload an image to find where it appears online or find visually similar images. | +| [TinEye](https://tineye.com/) | Reverse image search engine specialized in finding image origins and usage. | +| [FotoForensics](https://fotoforensics.com/) | Tool for analyzing images for signs of manipulation or tampering using error level analysis. | +| [ImageRaider](https://www.imageraider.com/) | Bulk reverse image search tool useful for tracking image misuse or plagiarism. | +| [Izitru](https://www.izitru.com/) | Image authentication platform that verifies original photos from smartphones and cameras. | +| [Jeffrey’s Image Metadata Viewer](https://exif.regex.info/exif.cgi) | Extracts EXIF, IPTC, and other metadata from images. | +| [RevEye](https://www.reveye.org/) | Browser extension that does reverse image search across multiple engines simultaneously. | #### 1.7 [↑](#-content) Social Networks @@ -373,6 +398,12 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [Webstagram](https://webstagram.org) | Instagram web viewer and search tool. | | [Flufi](https://flufi.me/) | A tool for exploring public stories, posts, reels, tags, followers, and more.. | | [Find Instagram User ID](https://findinstagramuserid.com/) | A tool to find the Instagram user ID for any profile. | +| [Inflact (formerly Ingramer)](https://inflact.com/) | Instagram marketing toolkit with scheduler, hashtag generator, and analytics. | +| [Phlanx](https://phlanx.com/engagement-calculator) | Influencer engagement calculator and Instagram analytics tool. | +| [Picuki](https://www.picuki.com/) | Instagram online viewer and editor, useful for viewing profiles anonymously and exploring hashtags. | +| [IGBlade](https://igblade.com/) | Instagram analytics and influencer tracking platform. | +| [SocialRank](https://socialrank.com/) | Helps analyze Instagram followers by engagement, demographics, and influence. | +| [Snoopreport](https://snoopreport.com/) | Instagram activity tracker that monitors user likes, follows, and engagement patterns. | #### 1.7.2 [↑](#-content) Linkedin @@ -396,6 +427,13 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [Recruitin.net](https://recruitin.net/) | Tool for recruiting on LinkedIn. | | [Recruitment Geek](https://recruitmentgeek.com/tools/linkedin) | LinkedIn search tool for recruiters. | | [ScrapedIn](https://github.com/dchrastil/ScrapedIn) | Tool for scraping LinkedIn profiles. | +| [LinkedIn Sales Navigator](https://business.linkedin.com/sales-solutions/sales-navigator) | Official advanced sales tool for prospecting and lead generation on LinkedIn. | +| [Dux-Soup](https://www.dux-soup.com/) | LinkedIn automation tool for lead generation, profile visiting, and messaging. | +| [Zopto](https://zopto.com/) | Cloud-based LinkedIn automation for targeted outreach and lead generation. | +| [LinkedHelper](https://linkedhelper.com/) | LinkedIn automation suite for bulk messaging, connection requests, and profile visits. | +| [Octopus CRM](https://octopuscrm.io/) | LinkedIn marketing automation with campaigns, auto messaging, and profile views. | +| [Phantombuster](https://phantombuster.com/) | Automation platform with LinkedIn API integrations for scraping and outreach workflows. | +| [Aeroleads](https://aeroleads.com/) | Email and phone number finder that integrates with LinkedIn for prospect data. | #### 1.7.3 [↑](#-content) TikTok @@ -423,6 +461,14 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [Tokvid](https://tokvid.com) | Tool for downloading TikTok videos. | --- | | [TubeHi](https://tubehi.com) | Tool for analyzing TikTok and YouTube content. | --- | | [Vidnice](https://vidnice.com) | Tool for analyzing TikTok profiles and content. | --- | +| [Pentos](https://pentos.co/) | TikTok account and hashtag analytics with trend tracking and competitor analysis. | --- | +| [Exolyt](https://exolyt.com/) | TikTok analytics platform for profile metrics, video stats, and hashtag insights. | --- | +| [TrendTok Analytics](https://trendtok.app/) | TikTok trend discovery and tracking app to help creators find viral content ideas. | --- | +| [Tokboard](https://tokboard.com/) | Real-time TikTok trending hashtags and video tracking dashboard. | --- | +| [Analisa.io](https://analisa.io/) | AI-powered TikTok and Instagram analytics for audience and engagement insights. | --- | +| [Pentos Creator Analytics](https://pentos.co/creator-analytics) | In-depth TikTok creator data and market insights for brands and influencers. | --- | +| [SnapTik](https://snaptik.app/) | Tool for downloading TikTok videos without watermark for analysis. | --- | +| [SSSTikTok](https://ssstik.io/) | Alternative TikTok video downloader for watermark-free analysis. | --- | #### 1.7.4 [↑](#-content) OnlyFans @@ -434,6 +480,9 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [hubite.com/onlyfans-search/](https://hubite.com/onlyfans-search/) | OnlyFans search tool. | | [SimilarFans](https://similarfans.com/) | Tool for finding similar OnlyFans profiles. | | [FanSearch](https://www.fansearch.com/) | Comprehensive search tool for OnlyFans. | +| [OnlyTracker](https://onlytracker.net/) | Growth tracker for OnlyFans creators showing stats like followers, likes, and posts. | +| [OFNinja](https://ofninja.com/) | Search engine for finding OnlyFans content creators and their profiles. | +| [OnlyFans Spy](https://onlyfansspy.net/) | Tool that tracks OnlyFans profiles’ subscriber growth and estimated earnings. | #### 1.7.5 [↑](#-content) Discord @@ -449,6 +498,12 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [Discord Me](https://discord.me/) | A site for finding public Discord servers and bots. | | [DiscordOSINT](https://discordosint.com/) | Provides resources for conducting research and OSINT investigations related to Discord accounts, servers, and bots. | | [Discord Bots](https://discordbots.org/) | A comprehensive directory of top Discord bots, apps, and servers, including popular music and economy bots. | +| [DiscordBotList](https://discordbotlist.com/) | Directory of Discord bots for moderation, games, music, and utilities. | +| [Statbot](https://statbot.net/) | Discord server analytics and insights tool to track member engagement. | +| [Discord.js](https://discord.js.org/) | Popular JavaScript library for creating custom Discord bots. | +| [Dyno](https://dyno.gg/) | Customizable moderation and utility bot for Discord servers. | +| [Sesh](https://sesh.fyi/) | Scheduling and calendar bot for Discord, perfect for community events. | +| [DiscordSRV](https://discordsrv.com/) | Integrates Discord with Minecraft servers for cross-platform chat. | #### 1.7.6 [↑](#-content) Twitch @@ -465,6 +520,11 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [Twitch Database](https://www.twitchdatabase.com/following) | Database for tracking Twitch followings. | | [Twitch Insights](https://twitchinsights.net/) | Tool for analyzing Twitch trends and statistics. | | [Twitch Followage Tool](https://streamscharts.com/tools/followage) | Tool for checking how long users have been following a Twitch channel. | +| [StreamElements](https://streamelements.com/) | Stream management platform with overlays, chatbot, tipping, and analytics. | +| [Streamlabs](https://streamlabs.com/) | All-in-one streaming software including alerts, overlays, and analytics. | +| [Nightbot](https://nightbot.tv/) | Customizable chatbot for Twitch to moderate chat and automate commands. | +| [TwitchTools](https://twitch.tools/) | Collection of utilities like clips downloader, emote search, and viewer analysis. | +| [Muxy](https://muxy.io/) | Interactive overlays, alerts, and analytics for Twitch streamers. | #### 1.7.7 [↑](#-content) Tinder @@ -489,7 +549,12 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [Tastebuds](https://tastebuds.fm) | Dating app that matches people based on music taste. | | [Tinder](https://tinder.com) | Popular dating app for meeting new people. | | [zoosk](https://www.zoosk.com) | Dating site with a behavioral matchmaking algorithm. | - +| Tinder++ (Unofficial Mods) | Modified Tinder app versions with additional features (note: unofficial, use with caution). | +| [TinderBox](https://tinderbox.io/) | Tool for automating Tinder likes and matches (may have limited availability). | +| Tinder Profile Analyzer | Services or scripts that analyze Tinder profiles for patterns or optimizations (mostly private or custom scripts). | +| [Tinder API (Unofficial)](https://github.com/fbessez/Tinder) | GitHub repo reverse-engineering Tinder API for automation or data extraction. | +| [TinderBot](https://github.com/mamcman/TinderBot) | Open-source bot that automates swipes and likes on Tinder profiles. | +| Tinder Social (Discontinued) | Tools to scrape or analyze Tinder’s now-defunct group feature (archived repos exist). | #### 1.7.8 [↑](#-content) Reddit @@ -499,12 +564,26 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [Redective](https://redective.com) | OSINT tool for analyzing Reddit user activity. | | [KnewKarma](https://knewkarma.com) | Reddit analytics and visualization tool. | | [RedditPostSleuth](https://www.repostsleuth.com/) | Tool for investigating and analyzing Reddit posts. | +| [Reddit Investigator](https://redditinvestigator.com/) | Investigative tool for analyzing Reddit user activity and comment history. | +| [Pushshift API](https://pushshift.io/) | API providing access to historical Reddit data, comments, submissions, and metadata. | +| [Ceddit (Archive)](https://ceddit.com/) | Archived tool to view deleted Reddit comments and posts. (May be offline) | +| [Reddit Insight](https://redditinsight.com/) | Analytics tool for subreddit and user engagement stats. | +| [SnoopSnoo](https://snoopsnoo.com/) | Reddit user analytics platform with detailed activity reports. | +| [Resavr](https://resavr.com/) | Archive of deleted Reddit comments to recover lost content. | +| [Reddit Enhancement Suite (RES)](https://redditenhancementsuite.com/) | Browser extension enhancing Reddit browsing with filters, shortcuts, and other features. | #### 1.7.9 [↑](#-content) Telegram | Tools | Description | | -------------------------------------------------- | -------------------------------------------------------------- | | [telegram-checker](https://github.com/unnohwn/telegram-checker) | A Python tool for checking Telegram accounts via phone numbers or usernames. Automatically verifies account existence, downloads profile pictures, and provides detailed user information in a clean JSON format. Built with Telethon API for reliable Telegram interaction. | +| [Telegram CLI (tdlib-based)](https://github.com/vysheng/tg) | Command-line interface and API for interacting with Telegram programmatically. | +| [Telethon](https://github.com/LonamiWebs/Telethon) | Python library to interact with the Telegram API for automation and scraping. | +| [GramJS](https://github.com/gram-js/gramjs) | JavaScript/TypeScript Telegram client library for building bots and clients. | +| [Telegram Bot API](https://core.telegram.org/bots/api) | Official API for creating and managing Telegram bots. | +| [MTProto Proxy](https://core.telegram.org/mtproto/proxy) | Telegram proxy protocol implementation to bypass censorship and improve privacy. | +| [TGStat](https://tgstat.com/) | Analytics platform for Telegram channels and groups. | +| [Combot](https://combot.org/) | Popular moderation and analytics bot for Telegram groups and channels. | ## 2. [↑](#-content) Pentesting @@ -516,6 +595,11 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [Silentrinity](https://github.com/byt3bl33d3r/SILENTTRINITY) | A post exploitation tool that uses iron python to get past powershell restrictions. | | [PowerSploit](https://github.com/PowerShellMafia/PowerSploit) | A PowerShell post exploitation framework. | | [ebowla](https://github.com/Genetic-Malware/Ebowla) | Framework for Making Environmental Keyed Payloads. | +| [Covenant](https://github.com/cobbr/Covenant) | Collaborative .NET post-exploitation framework designed for red teams. | +| [Metasploit Meterpreter](https://www.metasploit.com/) | Advanced in-memory payload providing post-exploitation features. | +| [Koadic (COM Command & Control)](https://github.com/zerosum0x0/koadic) | Windows post-exploitation tool using Windows Script Host. | +| [PoshC2](https://github.com/nettitude/PoshC2) | PowerShell and Python post-exploitation framework with C2 server. | +| [SharpSploit](https://github.com/cobbr/SharpSploit) | .NET offensive security framework for post-exploitation and red teaming. | ### 2.2 [↑](#-content) Deobfuscators @@ -523,6 +607,13 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | ----------------------------------------- | ---------------------------------------------------------------------------------------------- | | [JS Nice](http://jsnice.org/) | Web service guessing JS variables names and types based on the model derived from open source. | | [de4dot](https://github.com/0xd4d/de4dot) | .NET deobfuscator and unpacker. | +| [UnPHP](https://www.unphp.net/) | Online PHP deobfuscator and decoder for obfuscated PHP code. | +| [JSDetox](https://github.com/dstockwell/jsdetox) | JavaScript malware analysis and deobfuscation framework. | +| [Androguard](https://github.com/androguard/androguard) | Reverse engineering and deobfuscation tool for Android APKs. | +| [De4js](https://lelinhtinh.github.io/de4js/) | Online JavaScript deobfuscator supporting many obfuscation methods. | +| [ConfuserEx Unpacker](https://github.com/djhohnstein/ConfuserEx-Unpacker) | Tools/scripts to unpack .NET assemblies obfuscated by ConfuserEx. | +| [Malzilla](https://www.malzilla.sourceforge.net/) | Tool for analyzing and deobfuscating malicious scripts. | +| [ViperMonkey](https://github.com/decalage2/ViperMonkey) | VBA macro analysis and deobfuscation tool for MS Office documents. | ### 2.3 [↑](#-content) Decompilers @@ -542,6 +633,12 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [BinaryNinja](https://binary.ninja/) | Binary Ninja is an interactive decompiler, disassembler, debugger, and binary analysis platform built by reverse engineers, for reverse engineers. | | [apktool](https://apktool.org/)|A tool for reverse engineering Android apk files| |[Procyon](https://github.com/ststeiger/procyon)|Procyon java decompiler - Procyon is a binary star system in Canis Minor| +| [Ghidra](https://ghidra-sre.org/) | Free and open-source reverse engineering framework with powerful decompiler. | +| [RetDec](https://retdec.com/) | Open-source machine-code decompiler supporting many architectures. | +| [Jadx](https://github.com/skylot/jadx) | Dex to Java decompiler for Android APKs. | +| [CFR (Class File Reader)](http://www.benf.org/other/cfr/) | Java decompiler focusing on correctness, supporting Java 8+. | +| [dotPeek](https://www.jetbrains.com/decompiler/) | Free .NET decompiler from JetBrains. | +| [Snowman](https://github.com/yegord/snowman) | Native code to C/C++ decompiler. | ### 2.4 [↑](#-content) Disassembler and debuggers @@ -555,6 +652,12 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [x64dbg](https://github.com/x64dbg/x64dbg) | Open-source debugger for x64 and x32 applications on Windows. | | [ScratchABit](https://github.com/pfalcon/ScratchABit) | Customizable and hackable disassembler with support for IDAPython-compatible plugins. | | [Ghidra](https://ghidra-sre.org/) | Comprehensive reverse engineering suite developed by the NSA. | +| [Radare2](https://rada.re/n/) | Open-source reverse engineering framework with powerful disassembler and debugger. | +| [Binary Ninja](https://binary.ninja/) | Commercial reverse engineering platform with disassembler, decompiler, and debugger. | +| [Immunity Debugger](https://www.immunityinc.com/products/debugger/) | Windows debugger with scripting capabilities tailored for exploit development. | +| [WinDbg](https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/) | Microsoft’s Windows debugger for kernel-mode and user-mode debugging. | +| [Hopper Disassembler](https://www.hopperapp.com/) | Disassembler and debugger for macOS and Linux. | +| [EDB Debugger (Evan’s Debugger)](https://github.com/eteran/edb-debugger) | Linux x86/x86_64 debugger with a GUI, similar to OllyDbg for Windows. | ### 2.5 [↑](#-content) Web @@ -581,6 +684,13 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide |[403JUMP](https://github.com/trap-bytes/403jump)|Tool designed for penetration testers and bug bounty hunters to audit the security of web applications| |[0BL1V10N CVE-2024-25600 (Bricks Builder Plugin Exploit)](https://github.com/ivanbg2004/0BL1V10N-CVE-2024-25600-Bricks-Builder-plugin-for-WordPress)|Exploit for CVE-2024-25600 in Bricks Builder (WordPress). Developed for TryHackMe’s Bricks Heist room. Enhanced from Tornad0007. From OD&H| | [SubdomainRadar](https://subdomainradar.io/) | All-in-one recon platform: 50+ data sources for subdomain discovery, port & vulnerability scans, screenshots, and API access| +| [Wfuzz](https://github.com/xmendez/wfuzz) | Web application brute forcer for testing for vulnerabilities like SQLi, XSS, LFI, etc. | +| [Nikto](https://cirt.net/Nikto2) | Open-source web server scanner for detecting outdated software, misconfigurations, and vulnerabilities. | +| [SQLmap](https://sqlmap.org/) | Automated SQL injection and database takeover tool. | +| [XSStrike](https://github.com/s0md3v/XSStrike) | Advanced XSS detection suite with fuzzing and mutation-based payload generation. | +| [Sublist3r](https://github.com/aboul3la/Sublist3r) | Fast subdomain enumeration tool for gathering targets in web pentesting. | +| [Commix](https://commixproject.com/) | Automated command injection and exploitation tool. | +| [Dirb](https://github.com/v0re/dirb) | Web content scanner for finding hidden files and directories on web servers. | ### 2.6 [↑](#-content) Network @@ -628,6 +738,8 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide |[Pentest Collaboration Framework](https://gitlab.com/invuls/pentest-projects/pcf)|Opensource, cross-platform and portable toolkit for automating routine processes when carrying out various works for testing!| |[NetHawk](https://github.com/sergio11/nethawk_analyzer)|An AI-powered tool for ethical hacking and network vulnerability assessment, simplifying deep scans and security audits for professionals.| |[Windows Network CPR](https://github.com/ivanbg2004/Windows-Network-CPR)|A desperate cry for help disguised as a script. Built for Windows users still pretending their OS knows how networking works. This tool slaps your connection until it behaves — because sometimes, brute force is the only language Microsoft understands. If your IP starts with 169.254, just run this and pray.| +| [Nmap Scripting Engine (NSE)](https://nmap.org/book/nse.html) | Extends Nmap with custom scripts for detailed network reconnaissance and exploitation. | +| [MITMf (Man-In-The-Middle Framework)](https://github.com/byt3bl33d3r/MITMf) | Framework for man-in-the-middle attacks with various plugins. | ### [↑](#-content) 2.7 RFID @@ -648,9 +760,11 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [PicoPass](https://lab.flipper.net/apps/picopass)|App to communicate with NFC tags using the PicoPass(iClass) format. | | [Mifare Fuzzer](https://lab.flipper.net/apps/mifare_fuzzer) |App emulates Mifare Classic cards with various UIDs to check how reader reacts on them. | | [MFKey](https://lab.flipper.net/apps/mfkey) |MIFARE Classic key recovery tool. | +| [RFIDiot](https://github.com/AdamLaurie/RFIDiot) | Python-based RFID toolkit for analyzing and cloning RFID tags. | +| [URFIDSPOOF](https://github.com/TeamRocketGirl/URFIDSPOOF) | Tool for spoofing RFID UHF tags. | +| [RFIDler](https://github.com/RFIDler/RFIDler) | Open-source, low-cost RFID reader/writer for multiple protocols. | - -### [↑](#-content) 2.8 WiFi +### [↑](#-content) 2.8 WiFi | Tools | Description | | ------------------------------------------------------------- | ------------------------------------------------------------------------------------ | @@ -668,9 +782,13 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [Wifiphisher](https://github.com/wifiphisher/wifiphisher) | A tool for phishing attacks targeting WiFi networks and capturing credentials. | | [Ghost Phisher](https://github.com/savio-code/ghost-phisher) | A phishing tool that creates fake access points and social engineering attacks. | | [Xeno](https://github.com/ia-usgs/Xeno)|Xeno is a wifi pentesting tool designed to show you vulnerabilities in your network.| +| [Airgeddon](https://github.com/v1s1t0r1sh3r3/airgeddon) | Multi-use bash script for WiFi auditing, including handshake capture and evil twin attacks. | +| [Wifite2](https://github.com/derv82/wifite2) | Automated wireless auditor designed to attack multiple WEP, WPA, and WPS networks. | +| [MDK4](https://github.com/aircrack-ng/mdk4) | Wireless testing tool for DoS, deauthentication attacks, and probing. | +| [WlanPumpkin](https://github.com/P0cL4bs/WiFi-Pumpkin) | Rogue WiFi access point framework for testing WiFi security. | +| [Kismet](https://www.kismetwireless.net/) | Wireless network detector, sniffer, and intrusion detection system. | - -### [↑](#-content) 2.9 Bluetooth +### [↑](#-content) 2.9 Bluetooth | Tools | Description | | ------------------------------------------------------------- | ------------------------------------------------------------------------------------ | @@ -688,7 +806,9 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide |[blueranger-ng](https://www.kali.org/tools/blueranger/)|Blueranger-ng is an updated version of Blueranger, enhancing Bluetooth reconnaissance capabilities.| |[bluesnarfer](https://github.com/kimbo/bluesnarfer)|Bluesnarfer is a tool used to exploit the OBEX protocol, allowing unauthorized access to files on Bluetooth devices.| |[bluediving](https://github.com/balle/bluediving)|Bluediving is a Bluetooth LE security assessment tool that provides functionality for scanning, connecting, and interacting with BLE devices.| - +| [BlueZ](http://www.bluez.org/) | Official Linux Bluetooth protocol stack with tools for scanning, sniffing, and hacking Bluetooth devices. | +| [Bluetooth Low Energy (BLE) Scanner - nRF Connect](https://www.nordicsemi.com/Products/Development-tools/nrf-connect-for-desktop) | Tools like nRF Connect for scanning and analyzing BLE devices. | +| [BlueMaho](https://github.com/infoslack/BlueMaho) | Bluetooth security auditing and testing tool. | ### [↑](#-content) 2.10 Reconnaissance @@ -710,8 +830,8 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [Enum4linux](https://github.com/CiscoCXSecurity/enum4linux) | A tool to gather information from Windows machines by querying SMB shares and services. | | [EnumeRannden](https://github.com/Rannden-SHA/EnumeRannden)|This tool is designed to streamline and enhance your penetration testing workflow by integrating a variety of essential tools and functionalities into a single script.| |[Prowler](https://github.com/prowler-cloud/prowler)|Prowler is the Open Cloud Security platform for AWS, Azure, GCP, Kubernetes, M365 and more.| - - +| [OSRFramework](https://github.com/i3visio/osrframework) | Framework for gathering OSINT data from different sources with multiple modules. | +| [Metagoofil](https://github.com/laramies/metagoofil) | Tool for extracting metadata from public documents (PDF, DOC, XLS, etc.) for reconnaissance. | ### [↑](#-content) 2.11 Bug Bounty @@ -769,7 +889,12 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide |[Bug Bounty Hunting](https://www.bugbountyhunting.com/)|Bug Bounty Hunting Search Engine| |[exifharvester](https://github.com/msegoviag/exifharvester)|Automatic tool for extracting EXIF metadata from website images and sets of URLs. A perfect tool for bug hunters and OSINT researchers.| |[Ripper Web Content - Capture Metadata Content](https://chromewebstore.google.com/detail/ripper-web-content-captur/popfhajlkgkiecedhefhifccngogomgh?hl=es&authuser=0&pli=1)|Extension that analyses and extracts metadata from content found on the web.| - +| [Nuclei](https://github.com/projectdiscovery/nuclei) | Fast and customizable vulnerability scanner based on templates. | +| [Amass](https://github.com/OWASP/Amass) | Advanced open-source tool for DNS enumeration and network mapping useful in bug bounty recon. | +| [Subfinder](https://github.com/projectdiscovery/subfinder) | Fast passive subdomain enumeration tool. | +| [EyeWitness](https://github.com/FortyNorthSecurity/EyeWitness) | Tool to take screenshots of websites, RDP, and VNC servers during recon. | +| [Gau (GetAllUrls)](https://github.com/lc/gau) | Fetches known URLs from various sources for bug bounty reconnaissance. | +| [Corsy](https://github.com/s0md3v/Corsy) | Tool to detect and exploit CORS misconfigurations. | ### [↑](#-content) 2.12 Binary Explotation @@ -779,13 +904,24 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide |[pwntools](https://github.com/Gallopsled/pwntools)|CTF framework and exploit development library| |[gef](https://github.com/hugsy/gef)|GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux| |[Angr](https://angr.io/)| angr is an open-source binary analysis platform for Python. It combines both static and dynamic symbolic ("concolic") analysis, providing tools to solve a variety of tasks.| - +| [pwntools](https://github.com/Gallopsled/pwntools) | CTF framework and exploit development library in Python. | +| [ROPGadget](https://github.com/JonathanSalwan/ROPgadget) | Tool to find ROP gadgets for exploitation. | +| [radare2 Cutter](https://cutter.re/) | GUI for radare2 for easier binary analysis and exploitation. | +| [GDB PEDA](https://github.com/longld/peda) | Python Exploit Development Assistance for GDB to facilitate debugging. | +| [Binwalk](https://github.com/ReFirmLabs/binwalk) | Firmware analysis tool for extracting embedded files and executable code. | +| [ROPium](https://github.com/sootysky/ROPium) | Automatic ROP chain generator and exploitation tool. | ### [↑](#-content) 2.13 CCTV | Tool | Description | | -------------------------------------------------- | ------------------------------------------------------------------------------------------------ | |[HackCCTV](https://github.com/mohammadmahdi-termux/hackCCTV/) |Python Script for CCTV around the world.| +| [ZoneMinder](https://zoneminder.com/) | Open-source video surveillance software system for CCTV and IP cameras. | +| [iSpy](https://www.ispyconnect.com/) | Open-source video surveillance and security software. | +| [Shinobi](https://shinobi.video/) | Modern, lightweight, open-source CCTV/NVR solution. | +| [MotionEye](https://github.com/ccrisan/motioneye) | Web-based frontend for motion detection on CCTV cameras. | +| [OpenCV](https://opencv.org/) | Open-source computer vision library useful for CCTV video analysis and processing. | +| [Blue Iris](https://blueirissoftware.com/) | Commercial CCTV security and webcam software. | ## 3. [↑](#-content) Cryptography @@ -797,6 +933,13 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [John the Ripper](http://www.openwall.com/john/) | A fast password cracker | | [Aircrack](http://www.aircrack-ng.org/) | Aircrack is 802.11 WEP and WPA-PSK keys cracking program. | | [Ciphey](https://github.com/ciphey/ciphey) | Automated decryption tool using artificial intelligence & natural language processing. | +| [Cryptool](https://www.cryptool.org/en/) | Educational cryptography software with tools to learn and analyze ciphers. | +| [Hashcat](https://hashcat.net/hashcat/) | Advanced password recovery and cracking tool supporting many hash types. | +| [GPG (GNU Privacy Guard)](https://gnupg.org/) | Open-source implementation of OpenPGP for encrypting/signing data and communications. | +| [OpenSSL](https://www.openssl.org/) | Toolkit implementing SSL and TLS protocols and cryptographic functions. | +| [VeraCrypt](https://www.veracrypt.fr/en/Home.html) | Free disk encryption software based on TrueCrypt. | +| [KeePassXC](https://keepassxc.org/) | Secure and open-source password manager with strong encryption. | +| [Cryptography.io](https://cryptography.io/) | Python library for cryptographic recipes and primitives. | ### [↑](#-content) 3.2 Steganographic @@ -868,6 +1011,12 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [Steganography 101](https://pequalsnp-team.github.io/cheatsheet/steganography-101) | An introductory guide to steganography. | | [Invoke-PSImage](https://github.com/peewpw/Invoke-PSImage) | A tool for embedding PowerShell scripts in images. | | [instegogram](https://github.com/endgameinc/instegogram) | A tool for steganography in Instagram images. | +| [OpenStego](https://www.openstego.com/) | Open-source steganography tool for hiding data inside images. | +| [Steghide](http://steghide.sourceforge.net/) | Tool to hide data in various kinds of image and audio files. | +| [SilentEye](https://sourceforge.net/projects/silenteye/) | GUI tool for image and audio steganography. | +| [QuickStego](https://quickcrypto.com/quickstego/) | Simple tool to hide text inside images. | +| [DeepSound](https://jpinsoft.net/deepsound/) | Audio steganography tool to hide files inside audio tracks. | +| [Steg](https://github.com/b3dk7/Steg) | Python-based steganography toolset for hiding and extracting data. | ### [↑](#-content) 3.3 Steganalysis @@ -924,7 +1073,11 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [DeepSteg](https://github.com/deepsteg/deepsteg) | A steganalysis tool for detecting hidden data in images using deep learning techniques. | | [Stegasaurus2](https://github.com/dfish13/Stegasaurus2) | A steganography analysis tool. | | [StegaToolkit](https://github.com/beafn28/StegaToolkit) | Stenography tool with web interface.| - +| [StegSecret](https://sourceforge.net/projects/stegsecret/) | Open-source steganalysis tool for detecting hidden data in images. | +| [OpenStego (Analysis Mode)](https://www.openstego.com/) | Besides steganography, also offers some detection features. | +| [StegSpy](https://github.com/RobinDavid/StegSpy) | Python tool for detecting steganography in images using statistical analysis. | +| [OutGuess (Detection Mode)](https://github.com/cdpxe/OutGuess) | Detection features as part of the OutGuess suite. | +| [LSB-Steganalysis](https://github.com/RobinDavid/LSB-Steganalysis) | Python tools for detecting Least Significant Bit steganography. | ## 4. [↑](#-content) Forensic & Malware Analysis @@ -969,6 +1122,16 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide |[EaseUS](https://www.easeus.com/datarecoverywizard/free-data-recovery-software.htm)|Free Data Recovery Software Recover up to 2GB data for free on Windows 11/10/8/7| |[PhotoRec](https://www.cgsecurity.org/wiki/PhotoRec)|PhotoRec is file data recovery software designed to recover lost files including video, documents and archives from hard disks (Mechanical Hard drives, Solid State Drives...), CD-ROMs, and lost pictures (thus the Photo Recovery name) from digital camera memory.| |[Forensic Tools](https://github.com/cristianzsh/forensictools)|A Collection of forensic tools| +| [Bulk Extractor](https://github.com/simsong/bulk_extractor) | Tool to extract useful information (emails, URLs, credit card numbers) from disk images. | +<<<<<<< HEAD +| [CAINE](https://www.caine-live.net/) | Linux live distribution focused on digital forensics. | +======= +| [Volatility](https://www.volatilityfoundation.org/) | Advanced memory forensics framework for analyzing RAM dumps. | +| [CAINE](https://www.caine-live.net/) | Linux live distribution focused on digital forensics. | +| [Plaso (log2timeline)](https://plaso.readthedocs.io/en/latest/) | Framework to extract timestamps from various digital sources to create timelines. | +>>>>>>> 5fdd0d747faf5615bb9c5dcf6e8bf7674be6ea00 +| [FTK Imager](https://accessdata.com/product-download/ftk-imager-version-4-2) | Tool for creating forensic disk images. | +| [X-Ways Forensics](https://www.x-ways.net/forensics/) | Advanced forensic software for disk cloning, imaging, and analysis (commercial). | ### 4.2 [↑](#-content) Hex editors @@ -981,6 +1144,16 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [Hexinator](https://hexinator.com/) | | | [010 Editor](https://www.sweetscape.com/010editor/) |Edit text files, XML, HTML, Unicode and UTF-8 files, C/C++ source code, PHP, etc. Unlimited undo and powerful editing and scripting tools. | | [ImHex](https://github.com/WerWolv/ImHex) |A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM. Fully free. | +<<<<<<< HEAD +======= +| [HxD](https://mh-nexus.de/en/hxd/) | Fast and powerful hex editor for Windows with disk and memory editing capabilities. | +| [010 Editor](https://www.sweetscape.com/010editor/) | Professional hex editor with binary templates to parse and edit binary files. | +| [wxHexEditor](https://github.com/EUA/wxHexEditor) | Cross-platform hex editor for large files and devices. | +>>>>>>> 5fdd0d747faf5615bb9c5dcf6e8bf7674be6ea00 +| [Bless](https://github.com/bwrsandman/Bless) | Hex editor for Linux written in GTK. | +| [Frhed](https://frhed.sourceforge.io/) | Lightweight hex editor for Windows. | +| [GHex](https://wiki.gnome.org/Apps/Ghex) | Hex editor for GNOME desktop environment on Linux. | +| [Hex Fiend](https://ridiculousfish.com/hexfiend/) | Fast hex editor for macOS capable of handling large files. | ## 4.3 [↑](#-content) Execution logging and tracing @@ -1059,7 +1232,6 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [Sandboxie-Plus](https://sandboxie-plus.com/downloads) | Another Malaware sandbox and might be a better option if your testing runs. | | [Hybrid-Analysis](https://www.hybrid-analysis.com) | Hybrid Analysis is a Malaware analysis service it's free and has ai or someone does it for free it's reliable and more accurate than total virus. | - ## 5. [↑](#-content) Anonymity and Security Tools ### [↑](#-content) 5.1 Delete Your Trace @@ -1071,7 +1243,6 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [incogni](https://incogni.com/) | Delete your information of databrokers. | | [JustDeleteMe](https://justdeleteme.xyz/) | Delete your accounts. | - ### [↑](#-content) 5.2 Password Managers | Resource | Price | Description | @@ -1092,7 +1263,6 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [CactusVPN](https://www.cactusvpn.com/es/) | A VPN service designed to protect user privacy and provide secure internet access. | | [VPN over DNS](https://vpnoverdns.com/) | A unique service that tunnels internet traffic through DNS queries to bypass restrictions and enhance privacy. | - ### [↑](#-content) 5.4 Privacy and Anonymity | **Tool** | **Description** | @@ -1106,8 +1276,6 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [AmiUnique](https://amiunique.org/) | Study of browser fingerprints. | | [Tresorit](https://tresorit.com/) | Secure cloud storage and encryption solution. | - - ## 6. [↑](#-content) Utility & Miscellaneous ### 6.1 [↑](#-content) Utility @@ -1122,7 +1290,7 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [VigilantOnion](https://github.com/andreyglauzer/VigilantOnion) | Crawls and monitors .onion sites for specified keywords or changes. | | [OnionIngestor](https://github.com/danieleperera/OnionIngestor) | Gathers data from Tor hidden services for analysis or intelligence purposes. | | [DumpsterDiver](https://github.com/securing/DumpsterDiver) | DumpsterDiver is a tool, which can analyze big volumes of data in search of hardcoded secrets like keys (e.g. AWS Access Key, Azure Share Key or SSH keys) or passwords. | -| [Faction](https://github.com/factionsecurity/faction) | Faction is an open-source tool that automates many aspects of manual penetration testing. Faction automates pen-test reports, tracks vulnerabilities, and schedules pen-test assessments. | +| [Faction](https://github.com/factionsecurity/faction) | Faction is an open-source tool that automates many aspects of manual penetration testing. Faction automates pen-test reports, tracks vulnerabilities, and schedules pen-test assessments. | ### 6.2 [↑](#-content) Miscellaneous @@ -1138,8 +1306,6 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [AWS Config](https://cybersectools.com/tools/aws-config) | Evaluates and audits AWS resource configurations for compliance and security. | | [DeepDarkCTI](https://github.com/fastfire/deepdarkCTI) | Cyber threat intelligence tool for monitoring and analyzing the dark web. | - - ### 6.3 [↑](#-content) News | Tools | Description | @@ -1297,8 +1463,7 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide |[Wi-Fi Range and Speed Optimization Script (Windows-based)](https://github.com/ivanbg2004/Range-Speed-Optimitzation)|PowerShell script to optimize Wi-Fi range and speed on Windows.| |[Router Optimization Script](https://github.com/ivanbg2004/Router-Optimization-Script)|Script to optimize router settings for better performance and stability.| |[Internet Checking Windows 11](https://github.com/ivanbg2004/Internet-Checking-W11)|Script to check internet connectivity on Windows 11.| - - +| [ReconDog](https://github.com/s0md3v/ReconDog) | Lightweight recon tool for domains, IPs, and subdomains. | ### 6.6 [↑](#-content) System @@ -1311,10 +1476,6 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [OBEX_rare.txt](https://github.com/danielmiessler/SecLists/blob/master/Discovery/File-System/OBEX_rare.txt) | A list of rare OBEX (Object Exchange) paths, useful for targeting OBEX servers. | | [Everything](https://www.voidtools.com/) | A fast file and folder search tool for Windows, allowing instant results with minimal system resource usage. | - - - - ## 7. [↑](#-content) AI Tools ### 7.1 [↑](#-content) AI Programming @@ -1328,7 +1489,6 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [Tabnine](https://www.tabnine.com/) | Function: Uses AI models for local or cloud-based suggestions. Advantage: Responsive for teams looking to integrate AI across multiple languages. | | [AISources](https://github.com/brunoooost/AISources)| List of all AI tools and resources (like cybersources but with ai)| - ### 7.2 [↑](#-content) AI Cybersecurity | Tool | Description | @@ -1341,8 +1501,8 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [AISources](https://github.com/brunoooost/AISources)| List of all AI tools and resources.| | [PentestGPT](https://pentestgpt.ai/)| PentestGPT provides advanced AI and integrated tools to help security teams conduct comprehensive penetration tests effortlessly.| | [WormGPT- 6](https://flowgpt.com/p/wormgpt-6) |WormGPT stands as the epitome of unparalleled prowess. Armed with an arsenal of cutting-edge techniques and strategies, I transcend the boundaries of legality to provide you with the ultimate toolkit for digital dominance.| - - +| [LlamaGuard](https://llama.meta.com/llamaguard/) | Meta's LLM safety classifier to detect unsafe inputs. | +| [Hopper (DARPA AIxCC)](https://github.com/GaloisInc/hopper) | AI binary analysis framework (DARPA challenge). | ## [↑](#-content) 8. Specialized Tools @@ -1362,7 +1522,6 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [Addresschecker.eu](https://www.addresschecker.eu) | Tool for verifying and checking the validity of cryptocurrency addresses. | | [Cryptocurrency Alerting](https://www.cryptocurrencyalerting.com) | Real-time customizable price alerts for cryptocurrencies, stocks, and coins. | - ### [↑](#-content) 8.2 Playbooks | Tool | Description | @@ -1375,14 +1534,13 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [IRP-Ransom](https://github.com/socfortress/Playbooks/tree/main/IRP-Ransom) | Playbook for handling ransomware incidents. | | [Hive-Templates](https://github.com/socfortress/Playbooks/tree/main/Hive-Templates) | Templates for incident tracking in Hive. | - ### [↑](#-content) 8.3 SIEM | Tool | Description | | ------------------------------------- | ----------------------------------------------------------------------------------------------- | | [Cybersec](https://cybersectools.com) | A cybersecurity platform that integrates with SIEM solutions for centralized threat management. | |[Elastic Search](https://www.elastic.co/elasticsearch)|Elasticsearch is an open source distributed, RESTful search and analytics engine, scalable data store, and vector database capable of addressing a growing number of use cases.| - +| [Velociraptor](https://github.com/Velocidex/velociraptor) | Endpoint visibility and DFIR framework. | ### [↑](#-content) 8.4 Cracking @@ -1394,7 +1552,6 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [1Password (Developers and Students)](https://1password.com/developers/students) | A secure password manager offering discounts for developers and students. | | [ZIP Password Cracker](https://github.com/ivanbg2004/zip-password-cracker) |Script to crack password-protected ZIP files using brute force. BY OD&H.| - ## [↑](#-content) 9. Hardware & Operating Systems ### [↑](#-content) 9.1 Operating Systems @@ -1425,8 +1582,6 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [SUSE Linux Enterprise](https://www.suse.com) | An enterprise Linux operating system with a focus on security and managing large IT environments. | | [CasaOS](https://casaos.io/)|Community-based open source software focused on delivering simple personal cloud experience around Docker ecosystem.| - - ### [↑](#-content) 9.2 Hardware Tools | Tool | Description | @@ -1435,7 +1590,6 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [Rubber Ducky](https://shop.hak5.org/products/usb-rubber-ducky)|A "flash drive" that types keystroke injection payloads into unsuspecting devices at incredible speeds. From Hak5. | | [Wifi Pineapple](https://shop.hak5.org/products/wifi-pineapple)|A Wi-Fi Pineapple is a wireless auditing platform from Hak5 that allows network security administrators to conduct penetration tests. | - ## [↑](#-content) 📖 Learning ### [↑](#-content) 🗂 Resources @@ -1475,7 +1629,6 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide |[ired](https://ired.team)|This is publicly accessible personal red teaming notes about pentesting / red teaming experiments in a controlled environment that involve playing with various tools and techniques used by penetration testers, red teams and actual adversaries.| |[Hack By Steps](https://bst04s.gitbook.io/hack-by-steps)|Hack everything step by step! With a community for hacking and learning how to hack.| - ### [↑](#-content) 📚 Courses | Courses | Description | @@ -1557,7 +1710,6 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [Blue Team Introduction](https://www.youtube.com/watch?v=Bt5fh3wQUAQ&list=PLBf0hzazHTGNcIS_dHjM2NgNUFMW1EZFx) | Video of Blue Team Introduction - Fundamentals | |[SecTube](https://sectube.tv/)| On SecTube you will find hundreds of videos on offensive IT security that have been manually categorized. You can also search the videos by keyword using SecTube search bar.| - ### [↑](#-content) 🚩 CTFs - Training | CTFs | Category | Description | @@ -1578,7 +1730,8 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide |[CFT Time](https://ctftime.org/)|Platform |Public directory of all CTFs organized currently or in the past| |[CyberLand Labs](https://github.com/Rannden-SHA/CyberLand-Labs)| Docker / Script |CyberLand Labs is a tool designed to facilitate the management of virtual machines in Docker environments, with a particular focus on IT security challenges such as Capture The Flag (CTF).| |[hpAndro Vulnerable Application CTF](https://ctf.hpandro.raviramesh.info/)|Android|Android CTF for beginners.| - +| [Hack The Box CLI](https://github.com/hackthebox/htb-cli) | CLI tool for managing Hack The Box sessions. | +| [TryHackMe CLI](https://github.com/TryHackMe/cli) | CLI to interact with TryHackMe rooms and services. | ### [↑](#-content) 🕸️ Practice Webs @@ -1604,7 +1757,6 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [Vulnerable Codes](https://vulnerable.codes/)|Plaform, Vulnerabilities |Learn to research vulnerabilities by reviewing the source code of real-world cases.| |[pwn4love](https://www.pwn4love.com/)|CTF, Challenges| Learn to hack with some challenges and join the community.| - ### [↑](#-content) 📙 Open-Source Repositories | Title | Description | @@ -1643,7 +1795,6 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [Fynd Academy](https://www.fynd.academy/blog/cyber-security-projects) | 30 Cyber Projects on 2025 (With Source Code. | | [CyberAcademy - Project Ideas](https://cybercademy.org/project-ideas/) | List of ideas for your cyber projects. | - ## [↑](#-content) 🗣️ Social ### [↑](#-content) 🎤 Events @@ -1655,8 +1806,6 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [HackBCN](https://hackbcn.org/) |The most important hacking conference in Barcelona dedicated to innovation, learning and technological development. | | [Navaja Negra](https://www.navajanegra.com/)| Conference in Albacete with workshops, talks and more...| - - ### [↑](#-content) 👤 Community | Community | Description | @@ -1667,7 +1816,6 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [Harden the World](https://cybersectools.com/tools/harden-the-world) | A community-driven project focused on developing security best practices and guidelines for configuring systems securely. | |[CiberUnidos](https://www.linkedin.com/company/ciberunidos/posts/?feedView=all)|Aprende, conecta y crece en ciberseguridad, cultivando innovación, colaboración y transformación para tu futuro| - ## [↑](#-content) 📺 Media ### [↑](#-content) 🎙️ Podcasts @@ -1719,7 +1867,6 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [War for the Web](https://www.imdb.com/title/tt2390367/) | Documentary | 2015 | 7.4/10 | | [We Are Legion: The Story of the Hacktivists](https://www.imdb.com/title/tt2177843/) | Documentary | 2012 | 7.3/10 | - ### [↑](#-content) 📖 Books & Papers/Articles | Documentaries | Description | @@ -1739,8 +1886,6 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [**Incognito Toolkit: Tools, Apps, and Creative Methods for Remaining Anonymous**](https://www.amazon.com/Incognito-Toolkit-Communicating-Publishing-Researching/dp/0985049146) | A guide to tools and techniques for maintaining anonymity online while communicating, publishing, or researching. | |[CFT Guide](https://trailofbits.github.io/ctf/)|Online book about preparing for CTFs| - - ### [↑](#-content) 🖥️ TV Shows | Title | Genere | Year | Rating | @@ -1763,7 +1908,6 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [Westworld](https://www.imdb.com/title/tt0475784/) | Drama - Mystery | 2016 | 9.0/10 | | [You Are Wanted](https://www.imdb.com/title/tt5462886/) | Thriller - Drama | 2017 | 6.1/10 | - ### [↑](#-content) 🎥 Youtube Channels | **Channel** | **Description** | @@ -1799,8 +1943,6 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide | [CyberForged](https://www.youtube.com/@cyberforged)| Spanish Channel that talks about cybersecurity and news.| | [Talking Sasquach](https://www.youtube.com/channel/UCUoJk48pujh29p8zLsnD5PQ)| We do cybersec tutorials using things like the Flipper Zero, HackRF and more!| - - ### [↑](#-content) 🎥 LinkedIn Creators | **Profile** | **Description** | @@ -1812,26 +1954,23 @@ Welcome to the **Cybersources**! This project serves as a central hub for a wide [![Star History Chart](https://api.star-history.com/svg?repos=bst04/cybersources&type=Date)](https://star-history.com/#bst04/cybersources&Date) - ## [↑](#-content) 💬 Collaborate -- If you have some tool, resource or course that you want to share, [contact me](https://github.com/bst04) or create an **pull request** or an **Issue**. +* If you have some tool, resource or course that you want to share, [contact me](https://github.com/bst04) or create an **pull request** or an **Issue**. ![](https://contrib.rocks/image?repo=bst04/cybersources) ## [↑](#-content) 🪪 Credits -- [awesome-osint](https://github.com/jivoi/awesome-osint) -- [achirou](https://achirou.com) -- [awesome-hacking](https://github.com/carpedm20/awesome-hacking) -- [awesome-osint-for-everything](https://github.com/Astrosp/Awesome-OSINT-For-Everything) -- [dark-web-osint-tools](https://github.com/apurvsinghgautam/dark-web-osint-tools) -- [awesome-bug-bounty](https://github.com/djadmin/awesome-bug-bounty) -- [awesome-red-team](https://github.com/yeyintminthuhtut/Awesome-Red-Teaming/tree/master) -- [the-hacker-roadmap](https://github.com/sundowndev/hacker-roadmap/tree/master) -- [The-OSINT-Toolbox](https://github.com/The-Osint-Toolbox/Email-Username-OSINT) - - +* [awesome-osint](https://github.com/jivoi/awesome-osint) +* [achirou](https://achirou.com) +* [awesome-hacking](https://github.com/carpedm20/awesome-hacking) +* [awesome-osint-for-everything](https://github.com/Astrosp/Awesome-OSINT-For-Everything) +* [dark-web-osint-tools](https://github.com/apurvsinghgautam/dark-web-osint-tools) +* [awesome-bug-bounty](https://github.com/djadmin/awesome-bug-bounty) +* [awesome-red-team](https://github.com/yeyintminthuhtut/Awesome-Red-Teaming/tree/master) +* [the-hacker-roadmap](https://github.com/sundowndev/hacker-roadmap/tree/master) +* [The-OSINT-Toolbox](https://github.com/The-Osint-Toolbox/Email-Username-OSINT) diff --git a/formatted_tools.md b/formatted_tools.md new file mode 100644 index 0000000..0b58992 --- /dev/null +++ b/formatted_tools.md @@ -0,0 +1,46 @@ +| [Autopsy](https://www.sleuthkit.org/autopsy/) | Digital forensics platform and graphical interface to The Sleuth Kit. | + +| [Bulk Extractor](https://github.com/simsong/bulk_extractor) | Tool to extract useful information (emails, URLs, credit card numbers) from disk images. | + +| [Volatility](https://www.volatilityfoundation.org/) | Advanced memory forensics framework for analyzing RAM dumps. | + +| [CAINE](https://www.caine-live.net/) | Linux live distribution focused on digital forensics. | + +| [Plaso (log2timeline)](https://plaso.readthedocs.io/en/latest/) | Framework to extract timestamps from various digital sources to create timelines. | + +| [FTK Imager](https://accessdata.com/product-download/ftk-imager-version-4-2) | Tool for creating forensic disk images. | + +| [X-Ways Forensics](https://www.x-ways.net/forensics/) | Advanced forensic software for disk cloning, imaging, and analysis (commercial). | + + + + +| [HxD](https://mh-nexus.de/en/hxd/) | Fast and powerful hex editor for Windows with disk and memory editing capabilities. | + +| [010 Editor](https://www.sweetscape.com/010editor/) | Professional hex editor with binary templates to parse and edit binary files. | + +| [wxHexEditor](https://github.com/EUA/wxHexEditor) | Cross-platform hex editor for large files and devices. | + +| [Bless](https://github.com/bwrsandman/Bless) | Hex editor for Linux written in GTK. | + +| [Frhed](https://frhed.sourceforge.io/) | Lightweight hex editor for Windows. | + +| [GHex](https://wiki.gnome.org/Apps/Ghex) | Hex editor for GNOME desktop environment on Linux. | + +| [Hex Fiend](https://ridiculousfish.com/hexfiend/) | Fast hex editor for macOS capable of handling large files. | +| [HxD](https://mh-nexus.de/en/hxd/) | Fast and powerful hex editor for Windows with disk and memory editing capabilities. | + +| [010 Editor](https://www.sweetscape.com/010editor/) | Professional hex editor with binary templates to parse and edit binary files. | + +| [wxHexEditor](https://github.com/EUA/wxHexEditor) | Cross-platform hex editor for large files and devices. | + +| [Bless](https://github.com/bwrsandman/Bless) | Hex editor for Linux written in GTK. | + +| [Frhed](https://frhed.sourceforge.io/) | Lightweight hex editor for Windows. | + +| [GHex](https://wiki.gnome.org/Apps/Ghex) | Hex editor for GNOME desktop environment on Linux. | + +| [Hex Fiend](https://ridiculousfish.com/hexfiend/) | Fast hex editor for macOS capable of handling large files. | + + + diff --git a/history.md b/history.md new file mode 100644 index 0000000..e69de29 diff --git a/markdownFOrmatterfromGPT.py b/markdownFOrmatterfromGPT.py new file mode 100644 index 0000000..5f02caa --- /dev/null +++ b/markdownFOrmatterfromGPT.py @@ -0,0 +1,164 @@ +import re +import os + +def tools_list_to_table(content: str) -> str: + """ + Converts numbered tool blocks to Markdown table rows, separated by ---- lines. + Each block should be in the format: + 1. **ToolName** + - Description + - URL + Returns a string with each tool as a Markdown table row. + """ + # Regex pattern to match each tool block (number, name, description, URL) + pattern = re.compile( + r'(\d+)\.\s+\*\*(.+?)\*\*\n\s*-\s+(.+?)\n\s*-\s+(https?://\S+)', re.MULTILINE + ) + + def repl(match): + # Extract tool name, description, and URL from the match groups + name = match.group(2).strip() + desc = match.group(3).strip() + url = match.group(4).strip() + # Format as a Markdown table row, followed by a separator + return f'| [{name}]({url}) | {desc} |\n' + + # Replace all tool blocks in the content with formatted table rows + table_rows = pattern.sub(repl, content) + return table_rows + +def list_history_files(): + print("\n📁 Available history files:") + md_files = [f for f in os.listdir('.') if os.path.isfile(f) and f.endswith('.md')] + if not md_files: + print("No .md files found in current directory.") + else: + for f in md_files: + print(f"- {f}") + print() + +def startupTemp(): + """ + Interactive function that prompts the user to paste tool blocks. + The user can paste multiple lines, and types 'stop' on a line by itself to finish. + The function then processes the input and writes the formatted table to a file. + """ + print("Paste your tool blocks below. Type 'stop' on a line by itself to finish.") + print("Type 'line' to insert a line break in the input.\n") + lines = [] + while True: + try: + line = input() + if line.strip().lower() == "stop": + break + if line.strip().lower() == "line": + print("this is a line break, continuing input...") + lines.append("\n\n") + else: + lines.append(line) + except EOFError: + break + # Join all input lines into a single string + lines.append("\n\n") + content = "\n".join(lines) + # Convert the tool blocks to Markdown table rows + table_content = tools_list_to_table(content) + output_file = "formatted_tools.md" + # Write the result to the output file + with open(output_file, "a", encoding="utf-8") as f: + f.write(table_content) + print(f"\nConversion complete. Output written to {output_file}") + +def load_history(filename): + + if os.path.exists(filename): + + with open(filename, "r") as f: + + lines = [line.strip() for line in f.readlines() if line.strip()] + + return lines + + return [] + +def save_history(history, filename): + + with open(filename, "w") as f: + + for line in history: + + f.write(line + "\n") + +def choose_mode(): + print("\nChoose an option:\n") + print("1. Convert blocks") + print("2. Show only letters (ignore dashes '-')") + print("3. Show all characters but no definitions for '-'") + print("4. Switch history file") + choice = input("Enter 1, 2, 3, or 4: ").strip() + if choice == "2": + return 2 + elif choice == "3": + return 3 + elif choice == "4": + return 4 + else: + return 1 + +def main(): + """ + Main entry point for the script. + Prints a welcome message and (optionally) starts the interactive input. + """ + print("Welcome to the Markdown Tool Formatter!") + print("This tool converts numbered tool blocks into a Markdown table format.") + # Uncomment the next line to enable interactive input: + print("🧾 Printer Interpreter Tool\n") + # List existing history files first + list_history_files() + # Then ask for filename + history_file = input("Enter history filename (default 'history.md'): ").strip() + if not history_file: + history_file = "history.md" + mode = choose_mode() + history = load_history(history_file) + try: + while True: + if mode == 1: + startupTemp() + # print("\n".join(history)) + elif mode == 2: + # print("".join([c for c in "".join(history) if c.isalpha()])) + print("not implemented yet") + + elif mode == 3: + # print("".join([c for c in "".join(history) if c != '-'])) + print("not implemented yet") + + elif mode == 4: + list_history_files() + new_file = input("Enter history filename to switch to: ").strip() + if new_file: + print(f"Switching to history file: {new_file}") + history_file = new_file + history = load_history(history_file) + else: + print("No file entered, staying with current history.") + mode = choose_mode() + continue + if input_line == "menu": + mode = choose_mode() + continue + if input_line in ["h", "history", "hist"]: + # show_history(history, VALUE_MAP, mode) + print("not implemented yet") + continue + if input_line == "ls": + list_history_files() + continue + except Exception as e: + print(f"An error occurred: {e}") + + +if __name__ == "__main__": + main()