Lists (1)
Sort Name ascending (A-Z)
Stars
🛡️ Open-source and next-generation Web Application Firewall (WAF)
CLI tool that will automate Pentesting for the most common vulnerabilties on a website. For anyone intereted in grayhats come join my discord
A tool for folks who `git clone` first and ask questions later
Sliver CheatSheet for OSEP
CSPBypass.com, a tool designed to help ethical hackers bypass restrictive Content Security Policies (CSP) and exploit XSS (Cross-Site Scripting) vulnerabilities on sites where injections are blocke…
This repository is a mirror of https://git.openwrt.org/openwrt/openwrt.git It is for reference only and is not active for check-ins. We will continue to accept Pull Requests here. They will be merg…
Run Windows apps on 🐧 Linux with ✨ seamless integration
Your own self-hosted infra for lightweight VM sandboxes to safely execute untrusted code. CLI, API, Python SDK. ⭐ Star it if you like it! ⭐
📚 All-in-one domain name intelligence tool
Educational Linux privilege escalation script for CTFs/OSCP. Explains WHAT/WHY/HOW for every vulnerability found. Highlights critical findings with red alerts. Extended mode default: cloud metadata…
WAHA - WhatsApp HTTP API (REST API) that you can configure in a click! 3 engines: WEBJS (browser based), NOWEB (websocket nodejs), GOWS (websocket go)
CTF challenge (mostly pwn) files, scripts etc
Full-throttle, wire-speed hardware implementation of Wireguard VPN, using low-cost Artix7 FPGA with opensource toolchain. If you seek security and privacy, nothing is private in our codebase. Our d…
The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.
A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM.
Anthropic's Interactive Prompt Engineering Tutorial
A modular vulnerability scanner with automatic report generation capabilities.
UNIX-like reverse engineering framework and command-line toolset
Intercept Windows Named Pipes communication using Burp or similar HTTP proxy tools
An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
Local Privilege Escalation to Root via Sudo chroot in Linux
A collection of Powershell scripts that will help automate the build process for a Marvel domain.
Remote debugging AWS Lambda functions