cyberstars
cyberstars / purpose / research

Tools for research

Vulnerability and malware research.

166 tools indexed

Open-source phishing toolkit.

AutomateExploitEndpointsWeb apps
GoMIT

HELK

The Hunting ELK stack.

MonitorAnalyzeEndpointsNetworks
Jupyter NotebookGPL-3.0

Modern, malleable C2 framework.

ExploitAutomateEndpoints
C++AGPL-3.0

Open-source HTTP toolkit for sec research.

InterceptScanWeb apps
GoMIT

MCP bridge between IDA Pro and LLMs.

AnalyzeAutomateBinaries
PythonMIT

Hex editor for reverse engineers.

AnalyzeBinaries
C++GPL-2.0

Manage threat intel at scale.

AnalyzeAutomateNetworksEndpoints
PythonAGPL-3.0

JADX

Dex-to-Java decompiler.

AnalyzeMobile appsBinaries
JavaApache-2.0

Standalone Java decompiler GUI.

AnalyzeBinariesMobile apps
JavaGPL-3.0

Coverage-guided fuzzer (Win/macOS/Linux/Android).

FuzzBinaries
C++Apache-2.0

Java decompiler and assembler.

AnalyzeBinaries
RustGPL-3.0

MISP

Threat intelligence sharing platform.

AutomateAnalyzeNetworksEndpoints
PHPAGPL-3.0

Automated adversary emulation.

AutomateExploitEndpointsNetworks
PythonApache-2.0

Microsoft Threat Intelligence in Python.

AnalyzeAutomateCloudEndpoints
PythonMIT

Username OSINT across 3000+ sites.

ReconWeb apps
PythonMIT

iOS and macOS decompiler.

AnalyzeMobile appsBinaries
JavaApache-2.0

Graph-based OSINT and link analysis.

ReconAnalyzeWeb appsNetworks
JavaProprietary

Symbolic execution for binaries and smart contracts.

AnalyzeExploitBinaries
PythonAGPL-3.0

Mass IP port scanner.

ScanReconNetworks
CAGPL-3.0

Memory forensics as a filesystem.

AnalyzeEndpointsBinaries
CAGPL-3.0

Exploit development and delivery platform.

ExploitAutomateNetworksEndpoints
RubyBSD-3-Clause

Multi-platform C2 framework.

AutomateExploitEndpoints
GoBSD-3-Clause