Highlights
Stars
🔖 The Ultimate Markdown Cheatsheet
Collection of CTF Web challenges I made
专为CTF设计的Jinja2 SSTI全自动绕WAF脚本 | A Jinja2 SSTI cracker for bypassing WAF, designed for CTF
An advanced memory forensics framework
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Top disclosed reports from HackerOne
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
Six Degrees of Domain Admin
debauchee / barrier
Forked from deskflow/deskflowOpen-source KVM software
This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format on x86, x64, ARM, ARM64, PowerPC, SPARC, MIPS, RISC-V 64, a…
Statically-linked ssh server with reverse shell functionality for CTFs and such
Linux, Jenkins, AWS, SRE, Prometheus, Docker, Python, Ansible, Git, Kubernetes, Terraform, OpenStack, SQL, NoSQL, Azure, GCP, DNS, Elastic, Network, Virtualization. DevOps Interview Questions
Multiple samples showing the best practices in the user interface on Android.
A roadmap to learn Kubernetes from scratch (Beginner to Advanced level)
Tools and Techniques for Red Team / Penetration Testing
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
A curated list of software and architecture related design patterns.
Docker Mastery Udemy course to build, compose, deploy, and manage containers from local development to high-availability in the cloud
SVG icons for popular brands
The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, ffuf, masscan, nuclei, meg and many more!