Stars
ICS Incident Response Automation Framework Python framework for executing automated incident response playbooks in ICS/SCADA environments. Supports network isolation, forensic preservation, logic r…
AsyncIO Scanner & Exploitation Framework for CVE-2026-24061 (Telnet NEW_ENVIRON Auth Bypass). Features high-concurrency discovery, passive fingerprinting, and authorized root shell escalation
PDFScalpel is a forensic PDF analysis and CTF toolkit for security researchers, digital forensics analysts, and penetration testers, providing deep insight into PDF structure, encryption, malware, …
Protocol-aware ICS/OT fuzzer for Modbus, DNP3, S7comm, IEC 104, and OPC UA. Designed for fuzzing industrial protocols in lab/testbed environments using mutation strategies and PCAP replay.
Modular OT/ICS protocol fuzzer with plugin support, PCAP replay, and anomaly detection
GhostGraph-C2: Async, stealthy, modular C2 framework for red teaming and CTFs. Multi-channel fallback, encryption, obfuscation, and basic anti-analysis included.
Security scanner for local LLMs scanning LLM vulnerabilities including jailbreaks, prompt injection, training data leakage, and adversarial abuse
Satellite security research platform integrating C2 tasking with orbital intel, RF/protocol analysis, and evidence and first mission workflows
Offline Jenkins credential decryption tool for post-exploitation, red team operations, and CTFs. Decrypts credentials.xml using master.key and hudson.util.Secret without a running Jenkins instance.…
JenkinsBreaker: Offensive CI/CD security research framework focused on Jenkins exploitation, CVE chaining, and pipeline compromise scenarios.
A red team–oriented scripting language for exploits, shellcode, fuzzing, and reverse engineering.
Matrix Breach is a gamified offensive security lab focused on teaching game hacking, reverse engineering, and memory exploitation concepts through a visual, narrative driven simulation environment.
All-in-one ICS/SCADA hacking, red teaming, malware analysis, detection, and lab architecture cheat sheet
Zerowidthstego: Invisible data. Unforgettable power. A full-spectrum zero-width steganography engine for cyber defense, ctf teams, and digital minimalists.
Modern WinRM shell for red teams and CTFs with automated tool staging, AV bypass, recon, and credential/loot extraction
Comprehensive Game Hacking Cheat Sheet for security researchers, reverse engineers, and CTF participants. Covers memory analysis, anti-cheat evasion, exploit development, and game engine reverse en…
Ultimate DOM Clobbering Cheat Sheet - 100+ exploitation vectors for XSS, CSP bypass, and client-side attacks. Covers browser compatibility, framework evasion, and real-world exploit chains for secu…
Authenticated Modbus FC23 Writer for OmniPLC 3000
ScadaFlare Authenticated RCE Exploit Framework for ScadaBR (CVE-2021-26828) OpenPLC ScadaBR
Like a blaster cannon for Modbus: accurate, configurable, devastating, and adaptive.
Multi-Tool Offensive Security Arsenal for Red Teaming, CTF, Exploit Development, and Malware Research
Physical-layer surveillance detection. Scans for BLE trackers, EMF anomalies, rogue Wi-Fi, and hidden devices.
Offensive simulation engine for RF, logs, and deception ops.