Lists (1)
Sort Name ascending (A-Z)
Stars
📚 Freely available programming books
A fancy self-hosted monitoring tool
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Hunt down social media accounts by username across social networks
Fabric is an open-source framework for augmenting humans using AI. It provides a modular system for solving specific problems using a crowdsourced set of AI prompts that can be used anywhere.
A set of best practices for JavaScript projects
Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabling collaboration to tackle trending vulnerabilities on the …
E-mails, subdomains and names Harvester - OSINT
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
Prowler is the Open Cloud Security for AWS, Azure, GCP, Kubernetes, M365 and more. As agent-less, it helps for continuous monitoring, security assessments & audits, incident response, compliance, h…
Lightweight, open-source control tool for ASUS laptops and ROG Ally. Manage performance modes, fans, GPU, battery, and RGB lighting across Zephyrus, Flow, TUF, Strix, Scar, and other models.
Small and highly portable detection tests based on MITRE's ATT&CK.
Six Degrees of Domain Admin
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
The recursive internet scanner for hackers. 🧡
A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM.
Tools and Techniques for Red Team / Penetration Testing
🐬 Feature-rich, stable and customizable Flipper Firmware
RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data
Reconnaissance tool for GitHub organizations
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.
The ultimate WinRM shell for hacking/pentesting
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.