Lists (12)
Sort Name ascending (A-Z)
Blockchain
CVE-Collections
Collecting CVE repo of researchersCybersec Certification
💻 💻 💻 💻 💻 💻 💻 💻 💻 💻🖥 Cybersecurity
Generative Transformator
IndoXXi Company
LearnMacos
Malvares
Detonate'em all!- All languages
- AGS Script
- Assembly
- Astro
- AutoIt
- Batchfile
- C
- C#
- C++
- CSS
- Dart
- Dockerfile
- EJS
- Go
- Groff
- HCL
- HTML
- Hack
- Inno Setup
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- MDX
- Makefile
- Markdown
- Nim
- Objective-C
- PHP
- Pascal
- PowerShell
- Python
- REXX
- Rich Text Format
- Roff
- Ruby
- Rust
- SCSS
- Shell
- Solidity
- Svelte
- Swift
- TypeScript
- VBScript
- Verilog
- Vue
- XSLT
- YAML
- YARA
- Zig
Starred repositories
Open Source Vulnerability Management Platform
Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course
Reverse engineering and pentesting for Android applications
Scanning APK file for URIs, endpoints & secrets.
A True Instrumentable Binary Emulation Framework
EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.
"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
A python interface for interacting with the Ethereum blockchain and ecosystem.
Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.
Cybersecurity AI (CAI), the framework for AI Security
A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more efficient.
Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and share th…
FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.
🎉🌩️ Dynamic DNS (DDNS) service based on Cloudflare! Access your home network remotely via a custom domain name without a static IP!
Automatic SSRF fuzzer and exploitation tool
A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.
This tool generates gopher link for exploiting SSRF and gaining RCE in various servers
The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.
JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool
A tool to dump a git repository from a website
Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal & Intelligence X!
A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.
Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner
This tool gives information about the phone number that you entered.