Lists (18)
Sort Name ascending (A-Z)
Stars
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
Beacon Object File (BOF) for Windows Session Hijacking via IHxHelpPaneServer COM
🚀 Discover and explore a curated list of MCP servers, tools, and resources for AI assistants, enhancing your development and productivity.
A curated list of awesome social engineering resources.
Password cracking rules for Hashcat based on statistics and industry patterns
Everything about Web Application Firewalls (WAFs) from Security Standpoint! 🔥
Proof of concept for Kerberos Armoring abuse.
PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.
Phantom Keylogger is an advanced, stealth-enabled keystroke and visual intelligence gathering system.
C projects: algorithms, games, and networking
A cross-platform, collaborative C2 for red-teaming. Agents are cross-compilable (e.g, you can generate Windows DLLs on Linux), cross-compatible, and built with evasion, anti-analysis and stability …
A list of free and open forensics analysis tools and other resources
Awesome EDR Bypass Resources For Ethical Hacking
AV/EDR Evasion Lab for Training & Learning Purposes
Custom certification report templates created with SysReptor.
An improvised version of Sysreptor's default install script; specially made for debian linux distros like Kali linux to avoid installation errors.
Red Team Arsenal - a comprehensive collection of tools, scripts, and techniques for conducting red team operations and adversary simulations, including custom beacons, malleable C2 profiles, aggres…
All the deals for InfoSec related software/tools this Black Friday
All the deals for InfoSec related software/tools this Black Friday
Snap Calculator provides data-driven insights and visual analytics to optimize your Marvel Snap game strategy.
A PowerShell-based malware designed to completely disable all Windows security features, featuring UAC bypass and advanced anti-virtualization techniques. Built to operate both as a standalone Powe…
Hunt down social media accounts by username across social networks using httpx