Lists (1)
Sort Name ascending (A-Z)
Stars
The FLARE team's open-source tool to identify capabilities in executable files.
A (hopefully) actively maintained activity-based-autosorted list of InfoSec Streamers
CTF framework and exploit development library
Not The Hidden Wiki - The largest repository of links related to cybersecurity
Vulnerable app with examples showing how to not use secrets
Open-source Windows and Office activator featuring HWID, Ohook, TSforge, KMS38, and Online KMS activation methods, along with advanced troubleshooting.
Capstone disassembly/disassembler framework for ARM, ARM64 (ARMv8), Alpha, BPF, Ethereum VM, HPPA, LoongArch, M68K, M680X, Mips, MOS65XX, PPC, RISC-V(rv32G/rv64G), SH, Sparc, SystemZ, TMS320C64X, T…
A customizable and powerful penetration testing reporting platform for offensive security professionals. Simplify, customize, and automate your pentest reports with ease.
Collection of Cyber Threat Intelligence sources from the deep and dark web
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more. With repository stars⭐ and forks🍴
Repository containing all training and tutorials completed in preparation for the OSEE in conjunction with the AWE course.
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Build an environment to begin Ethical Hacking journey
Chepy is a python lib/cli equivalent of the awesome CyberChef tool.
A collection of sources of documentation, as well as field best practices, to build/run a SOC
Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀
The easiest way to achieve a reverse shell bypassing Windows Defender. Windows Evasion | Windows Defender Evasion | Windows Defender Bypass | Windows AV evasion
A curated list of Rust code and resources.
A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.
Active Directory and Internal Pentest Cheatsheets
An OOB interaction gathering server and client library
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.