Lists (8)
Sort Name ascending (A-Z)
cyberpunk
move anonymously, move freelyFun stuff!
General tools for fun or quality of life <3Malware Analysis Lab
Repositories that will help me build a lab for running malware, reverse engineering it, emulating adversaries, and testing my own custom code.Offensive Security
Automate reconnaissance and exploitation - Vulnerability detection - Post exploitation clean up - Specific attack vector guidesProfile README Dynamic Visuals
Dynamic typing and visual examples for cool READMEs.Reconnaisance / OSINT
Tools for reconnaisanceSecurity Analyst
SysAdmin; Microservices
Executables and tools for system operations and controls. Control your system's settings, set up pre-made services like invoicingStars
A toolset to make a system look as if it was the victim of an APT attack
An automatic, multi-threaded mass sample (malware) execution based on that used by the PC Security Channel (YouTube)
GitHub repository for the SecureDrop whistleblower platform. Do not submit tips here!
GlobaLeaks is a free and open-source whistleblowing software enabling anyone to easily set up and maintain a secure reporting platform.
automated censorship evasion for the client-side and server-side
Prowler is an Open Source Security tool for AWS, Azure, GCP and Kubernetes to do security assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readines…
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
📧🔀 A simple Cypherpunk message preprocessor that makes it easy to chain Type I anonymous remailers together.
This is a compilation of some scripts I've written to assist pen-testers and red-teamers. it takes out the need to memorize syntaxes of most commonly used one-liners in Kali Linux. I'll be updating…
An OSINT CLI tool desgined to fast track IP Reputation and Geo-locaton look up for Security Analysts.
A custom MMDB database, helping detect country, ASN and hosting.
A list of awesome Tor related projects, articles, papers, etc
A library for efficient similarity search and clustering of dense vectors.
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
Small and highly portable detection tests based on MITRE's ATT&CK.
A collection of hacking tools, resources and references to practice ethical hacking.
Bloodhound Reporting for Blue and Purple Teams
Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.