Skip to content
View nullbind's full-sized avatar

Block or report nullbind

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
31 stars written in Shell
Clear filter

Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.

Shell 15,167 1,574 Updated Jan 28, 2026

Prevents you from committing secrets and credentials into git repositories

Shell 13,135 1,238 Updated Sep 17, 2025

 Swiss Army Knife for macOS

Shell 9,817 317 Updated Jan 16, 2026

List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.

Shell 9,390 1,576 Updated Oct 16, 2025

Attack Surface Management Platform

Shell 9,357 2,018 Updated Jan 12, 2026

Scripted Local Linux Enumeration & Privilege Escalation Checks

Shell 7,805 2,028 Updated Sep 6, 2023

An awesome & curated list of best LLMOps tools for developers

Shell 5,582 558 Updated Dec 30, 2025

Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload creation using Metasploit. For use with Kali Linux.

Shell 3,808 876 Updated Jan 28, 2026

ipsets dynamically updated with firehol's update-ipsets.sh script

Shell 3,724 417 Updated Jan 28, 2026

An ArchLinux based distribution for penetration testers and security researchers.

Shell 3,211 627 Updated Jan 24, 2026

A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileg…

Shell 2,419 263 Updated Oct 3, 2025

Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting

Shell 2,310 408 Updated Jun 27, 2024

This script is intended to automate your reconnaissance process in an organized fashion

Shell 2,005 583 Updated Aug 19, 2021

Linux Malware Detection (LMD)

Shell 1,362 247 Updated Feb 26, 2025

Cloud Security Suite - One stop tool for auditing the security posture of AWS/GCP/Azure infrastructure.

Shell 1,165 213 Updated Dec 8, 2022

A open contribute bootcamp to develop DevSecOps skills...

Shell 776 362 Updated Sep 18, 2023

Automatically Launch Google Hacking Queries Against A Target Domain

Shell 740 182 Updated Mar 5, 2024

The CryptoParty Handbook

Shell 532 129 Updated Oct 30, 2020

A Bash script that downloads and unzips scripts that will aid with privilege escalation on a Linux system.

Shell 506 199 Updated Jul 28, 2021

Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer Overflow

Shell 441 119 Updated Jul 11, 2017

Swift binary that will change a local administrator password to a random generated password. Similar behavior to LAPS for Windows

Shell 423 61 Updated Feb 26, 2025

Easy 802.1Q VLAN Hopping

Shell 388 98 Updated Feb 24, 2016

AutoSUID application is the Open-Source project, the main idea of which is to automate harvesting the SUID executable files and to find a way for further escalating the privileges.

Shell 386 78 Updated Apr 29, 2024

Scans for accessibility tools backdoors via RDP

Shell 340 71 Updated Mar 16, 2018

Dockerfile to build a PXE server in a Docker container

Shell 264 75 Updated Apr 9, 2019

Metasploit AV Evasion Tool

Shell 256 82 Updated Dec 22, 2015

Mainframe security auditing and scripts

Shell 140 32 Updated Jul 30, 2018

🔥 Scripts used to augment the penetration testing process of Drupal web applications.

Shell 95 29 Updated Apr 18, 2017

Detects Cisco DTP modes for VLAN Hopping (passive detection)

Shell 77 19 Updated Jul 7, 2014

Data Exfiltration and Command Execution via AAAA Records

Shell 68 24 Updated Jul 26, 2016
Next