Highlights
- Pro
Lists (2)
Sort Name ascending (A-Z)
Stars
Learn how to design large-scale systems. Prep for the system design interview. Includes Anki flashcards.
All Algorithms implemented in Python
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Rich is a Python library for rich text and beautiful formatting in the terminal.
Impacket is a collection of Python classes for working with network protocols.
Ansible for DevOps examples.
An open-source post-exploitation framework for students, researchers and developers.
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
A powerful and user-friendly binary analysis platform!
One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️
The FLARE team's open-source tool to identify capabilities in executable files.
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wis…
GRR Rapid Response: remote live forensics for incident response
A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more efficient.
This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public expl…
Cartography is a Python tool that consolidates infrastructure assets and the relationships between them in an intuitive graph view powered by a Neo4j database.
PENTEST-WIKI is a free online security knowledge library for pentesters / researchers. If you have a good idea, please share it with others.
Run Windows Applications on Linux as if they are native, Use linux applications to launch files files located in windows vm without needing to install applications on vm. With easy to use configura…
Tool for Active Directory Certificate Services enumeration and abuse
Neo-reGeorg is a project that seeks to aggressively refactor reGeorg
A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
A Python based ingestor for BloodHound
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues i…