Lists (32)
Sort Name ascending (A-Z)
Automation
6 repositories
Automotive
Projects related to automotive1 repository
Azure
30 repositories
Blue team
Threat intelligence, security monitoring, SIEM, EDR68 repositories
C2
16 repositories
Cloud
Cloud audit tools, pentest tools46 repositories
Coding
1 repository
Containers
Containers, orchestration, Kubernetes31 repositories
CTI
9 repositories
CVE
20 repositories
Dorks
3 repositories
fuzzing
7 repositories
Hardware
3 repositories
Linux
16 repositories
Lists
10 repositories
Malware development
Courses, tools for evaison, bulding malware, etc.66 repositories
MCP
6 repositories
Misc
Crypto and other random stuff16 repositories
ML/AI
32 repositories
Mobile
5 repositories
Networking
15 repositories
OSINT
1 repository
Phishing
15 repositories
Purple team
5 repositories
Reconnaissance
Reconnaissance, OSINT44 repositories
Red team
240 repositories
Reporting
2 repositories
Source code analysis
17 repositories
Training
7 repositories
Web
36 repositories
Wifi
4 repositories
Windows
238 repositories
Stars
39
stars
written in Shell
Clear filter
A sock, with a wire, so you can tunnel all you desire.
SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accuracy!
linikatz is a tool to attack AD on UNIX
Enumerate Subdomains Through Google Dorks (Bypassed Page Filter)
Exploit a vulnerable Spring application with the Spring4Shell (CVE-2022-22965) Vulnerability.
Tips, Tricks, and Scripts for Linux Post Exploitation