Starred repositories
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
The official gpt4free repository | various collection of powerful language models | o4, o3 and deepseek r1, gpt-4.1, gemini 2.5
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
Impacket is a collection of Python classes for working with network protocols.
Mail-in-a-Box helps individuals take back control of their email by defining a one-click, easy-to-deploy SMTP+everything else server: a mail server in a box.
Infection Monkey - An open-source adversary emulation platform
Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and share th…
An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws
Updog is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S, can set ad hoc SSL certificates and use http basic auth.
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
awesome game security [Welcome to PR]
Tools & Interesting Things for RedTeam Ops
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.
Tool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Lists of .NET Obfuscator (Free, Freemium, Paid and Open Source )
Syscall Shellcode Loader (Work in Progress)
SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.
C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.
Using Socks4/5 or http proxies to make a multithreading Http-flood/Https-flood (cc) attack.
A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file formats. Supports: ZIP, 7zip, PDF, ISO, IMG, CAB, VHD, VHDX
Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation
SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty
A simple python packer to easily bypass Windows Defender
Proof-of-concept obfuscation toolkit for C# post-exploitation tools