-
Gov
- Abu Dhabi
-
20:31
(UTC +04:00) - https://adriaanbosch.com/
- in/adriaan-bosch-80175b236
Lists (1)
Sort Name ascending (A-Z)
Stars
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
PingCastle - Get Active Directory Security at 80% in 20% of the time
Fully autonomous AI Agents system capable of performing complex penetration testing tasks
Trail of Bits Claude Code skills for security research, vulnerability detection, and audit workflows
Automated Pass-the-Ticket (PtT) attack. Standalone alternative to Rubeus and Mimikatz for this attack. Implemented in C#, C++, Crystal, Python and Rust
Go alternative of python SimpleHTTPServer
Nuclei plugin for BurpSuite
Fast passive subdomain enumeration tool.
A high performance go implementation of Wappalyzer Technology Detection Library
Xcode iPhoneOS (iOS) DeviceSupport files (6.0 - 17.0)
Jailbreak for A8 through A11, T2 devices, on iOS/iPadOS/tvOS 15.0, bridgeOS 5.0 and higher.
Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.
dnSpyEx / dnSpy
Forked from dnSpy/dnSpyUnofficial revival of the well known .NET debugger and assembly editor, dnSpy
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static a…
Proof-of-Concept for CVE-2025-31324: Unauthenticated upload in SAP NetWeaver Visual Composer Metadata Uploader
An OOB interaction gathering server and client library
latest version of scanners for IIS short filename (8.3) disclosure vulnerability
Community curated list of templates for the nuclei engine to find security vulnerabilities.
Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabling collaboration to tackle trending vulnerabilities on the …
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Prowler is the world’s most widely used open-source cloud security platform that automates security and compliance across any cloud environment.
Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.