Highlights
- Pro
Lists (1)
Sort Name ascending (A-Z)
Starred repositories
Python tool for converting files and office documents to Markdown.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
JumpServer is an open-source Privileged Access Management (PAM) platform that provides DevOps and IT teams with on-demand and secure access to SSH, RDP, Kubernetes, Database and RemoteApp endpoints…
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
Impacket is a collection of Python classes for working with network protocols.
ChatGLM3 series: Open Bilingual Chat LLMs | 开源双语对话语言模型
Exploitation Framework for Embedded Devices
Ansible for DevOps examples.
📱 objection - runtime mobile exploration
RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data
Cowrie SSH/Telnet Honeypot https://docs.cowrie.org/
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
Automated All-in-One OS Command Injection Exploitation Tool.
"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
A tool used to obfuscate python scripts, bind obfuscated scripts to fixed machine or expire obfuscated scripts.
HexStrike AI MCP Agents is an advanced MCP server that lets AI agents (Claude, GPT, Copilot, etc.) autonomously run 150+ cybersecurity tools for automated pentesting, vulnerability discovery, bug b…
An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws
Tool for Active Directory Certificate Services enumeration and abuse
OpenStack Compute (Nova). Mirror of code maintained at opendev.org.
Powerful framework for rogue access point attack.
SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript files
A Python based ingestor for BloodHound
A customizable and powerful penetration testing reporting platform for offensive security professionals. Simplify, customize, and automate your pentest reports with ease.
A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.