Lists (12)
Sort Name ascending (A-Z)
Blockchain
CVE-Collections
Collecting CVE repo of researchersCybersec Certification
💻 💻 💻 💻 💻 💻 💻 💻 💻 💻🖥 Cybersecurity
Generative Transformator
IndoXXi Company
LearnMacos
Malvares
Detonate'em all!- All languages
- AGS Script
- Assembly
- Astro
- AutoIt
- Batchfile
- C
- C#
- C++
- CSS
- Dart
- Dockerfile
- EJS
- Go
- Groff
- HCL
- HTML
- Hack
- Inno Setup
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- MDX
- Makefile
- Markdown
- Nim
- Objective-C
- PHP
- Pascal
- PowerShell
- Python
- REXX
- Rich Text Format
- Roff
- Ruby
- Rust
- SCSS
- Shell
- Solidity
- Svelte
- Swift
- TypeScript
- VBScript
- Verilog
- Vue
- XSLT
- YAML
- YARA
- Zig
Starred repositories
A cloudflare verification bypass script for webscraping
Agentic LLM Vulnerability Scanner / AI red teaming kit 🧪
Codebase to generate an msdt-follina payload
Checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain names
Quark Agent - Your AI-powered Android APK Analyst
Tiny status page generated by a Python script
Nginxpwner is a simple tool to look for common Nginx misconfigurations and vulnerabilities.
Web vulnerability scanner written in Python3
Katana - Automatic CTF Challenge Solver in Python3
A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Automatic SSTI detection tool with interactive interface
A list of disposable/temporary email address domains
Burp Suite Certified Practitioner Exam Study
Damn Vulnerable MCP Server
AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE ATT&CK framework. The tool generates tailored incident resp…
Digital Forensics artifact repository
Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems
HostHunter a recon tool for discovering hostnames using OSINT techniques.
Automatic authorization enforcement detection extension for burp suite written in Jython developed by Barak Tawily in order to ease application security people work and allow them perform an automa…
A VBA parser and emulation engine to analyze malicious macros.
Exploits written by the Rhino Security Labs team
A Game of Hackers (CTF Scoreboard & Game Manager)
Create tar/zip archives that can exploit directory traversal vulnerabilities
Your target's phone's front and back cameras📸 can be accessed by sending a link🔗.
Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.