Lists (23)
Sort Name ascending (A-Z)
AI
Bjorn
Bmorcelli
BRUCE
Bruce firmwareCameras
Capybara
Chameleon
Cool stuff
DIY
ESP32
ESP32 Bus Pirate
Firmware
Flipper
Ghost_ESP
Guide
Hack tricks
Hackbat
Infiltra
Marauder
Tools
USB
USEFULL
WIFI
Stars
a simple ESP32 NAT Router with some additional features
Collection of malware source code for a variety of platforms in an array of different programming languages.
CrowdSec Documentation: Comprehensive guides, tutorials, and references for installing, configuring, and using CrowdSec, an open-source cybersecurity platform. Contributions welcome!
CrowdSec - the open-source and participative security solution offering crowdsourced protection against malicious IPs and access to the most advanced real-world CTI.
A curated list of awesome embedded and IoT security resources.
CSIRT Forensics Automation Tool - Lilygo T-Dongle S3 - First Responder Forensics Dongle (FRFD)
OSINT360 ⌁ Cyber Intelligence – GPT-5 powered assistant for OSINT, DFIR, ethical hacking, red teaming, privacy & compliance. 🚀
Use any web browser or WebView as GUI, with your preferred language in the backend and modern web technologies in the frontend, all in a lightweight portable library.
A collection of tools created for computer security research purposes.
SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and update processes.
exploits and proof-of-concept vulnerability demonstration files from the team at Hacker House
VirtualBox VM System Information Modifier
A full setup guide for scam-baiting with Oracle's VirtualBox.
Open Source Linux Frontend to the ClamAV Antivirus Engine
A Bypass Anti-virus Software Lateral Movement Command Execution Tool
This tool will generate a virus that can only destroy Windows computer. You can also configure to auto run in usb drive
ScrapPY is a Python utility for scraping manuals, documents, and other sensitive PDFs to generate wordlists that can be utilized by offensive security tools to perform brute force, forced browsing,…
Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!
During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Here is a simple way to evade anti-virus …
A Collection of Cute But Deadly Viruses