Lists (1)
Sort Name ascending (A-Z)
Stars
ignorant allows you to check if a phone number is used on different sites like snapchat, instagram.
Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails, phone numbers and more
Fetch information about a public Google document.
Repository for the LOCK STAR initiative. This includes guidance and any supporting files for writeups.
Educational cybersecurity tool that visualizes network attacks on a 3D ASCII globe. Real-time firewall log analysis with IP geolocation, threat intelligence, and interactive terminal dashboard. 100…
The Python Risk Identification Tool for generative AI (PyRIT) is an open source framework built to empower security professionals and engineers to proactively identify risks in generative AI systems.
A list of Google Dorks for Bug Bounty, Web Application Security, and Pentesting
Intelligent web vulnerability analysis suite leveraging Generative AI for developers, pentesters, and security researchers.
Phishing Domains, urls websites and threats database. We use the PyFunceble testing tool to validate the status of all known Phishing domains and provide stats to reveal how many unique domains use…
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
Blockchain dark forest selfguard handbook. Master these, master the security of your cryptocurrency.
Security, compliance, and operational resilience resources applicable to VMware Cloud Foundation and VMware vSphere. This repository is an official VMware repository managed by Broadcom staff.
Collection of Cyber Threat Intelligence sources from the deep and dark web
APT & CyberCriminal Campaign Collection
This repository contains indicators of compromise (IOCs) of our various investigations.
Tracking and documenting monthly insights about hacktivist coalitions.
A repository dedicated to sharing Indicators of Compromise (IOCs) from production systems experiencing security incidents and OSINT feeds.
A collection of links related to VMware escape exploits
A collection of links related to Linux kernel security and exploitation
This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom tools, C2 servers, backdoors, exploitation techniques, stage…
An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz
Cobalt Strike - Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike https://www.cobaltstrike.com/.