Stars
RAT And C&C Resources. 250+ Open Source Projects, 1200+ RAT/C&C blog/video.
For educational purposes only, exhaustive samples of 500+ classic/modern trojan builders including screenshots.
Easy per application transparent proxy built on cgroup.
A flexible tool for redirecting a given program's TCP traffic to SOCKS5 or HTTP proxy.
Original and improved variants of a protocol for decentralized syntactic privacy by Mohammed et al. (TKDD10).
Exchange your privileges for Domain Admin privs by abusing Exchange
A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for security professionals and CTF players.
Scripts to build a trimmed-down Windows 11 image.
A fast reverse proxy to help you expose a local server behind a NAT or firewall to the internet.
List of ngrok/Cloudflare Tunnel alternatives and other tunneling software and services. Focus on self-hosting.
Exiting VIM is hard; sometimes we need to take drastic measures
Usage of enabled-by-default hardening-related compiler flags across Linux distributions
Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments
Prowler is the world’s most widely used open-source cloud security platform that automates security and compliance across any cloud environment.
telco.wtf is a DNS zone, web service and command line tool for looking up the many acronyms and abbreviations in use in the telecommunications industry.
Monitor linux processes without root permissions
A tool for running an application in an isolated network namespace, with external network access only through a SOCKS proxy.
libstring is a lightweight C library designed to simplify common string operations while ensuring memory safety and preventing common pitfalls.
Demonstrators and explanatory material for several client-side web development mistakes
Live tcpbin dashboard to debug tcp and udp connections. Checkout https://tcpbin.net to see and test submitting devices.
A toolset to make a system look as if it was the victim of an APT attack