Lists (4)
Sort Name ascending (A-Z)
Stars
All Algorithms implemented in Python
AutoGPT is the vision of accessible AI for everyone, to use and to build on. Our mission is to provide the tools, so that you can focus on what matters.
Hunt down social media accounts by username across social networks
The OWASP Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes technical processes for verifying the OWA…
A GPT-empowered penetration testing tool
Prevent cloud misconfigurations and find vulnerabilities during build-time in infrastructure as code, container images and open source packages with Checkov by Bridgecrew.
Adding guardrails to large language models.
Scanning APK file for URIs, endpoints & secrets.
The FLARE team's open-source tool to identify capabilities in executable files.
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference
Server-Side Template Injection and Code Injection Detection and Exploitation Tool
A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.
Open source vulnerability DB and triage service.
Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal & Intelligence X!
Tools & Interesting Things for RedTeam Ops
A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.
FakeNet-NG - Next Generation Dynamic Network Analysis Tool
🆕 The Multi-Tool Web Vulnerability Scanner.
Get IP address on other side audio call in Telegram.
Agentic LLM Vulnerability Scanner / AI red teaming kit 🧪
Codebase to generate an msdt-follina payload
A tool for quickly evaluating IAM permissions in AWS.
Toolkit to emulate firmware and analyse it for security vulnerabilities