Lists (32)
Sort Name ascending (A-Z)
Automation
Automotive
Projects related to automotiveAzure
Blue team
Threat intelligence, security monitoring, SIEM, EDRC2
Cloud
Cloud audit tools, pentest toolsCoding
Containers
Containers, orchestration, KubernetesCTI
CVE
Dorks
fuzzing
Hardware
Linux
Lists
Malware development
Courses, tools for evaison, bulding malware, etc.MCP
Misc
Crypto and other random stuffML/AI
Mobile
Networking
OSINT
Phishing
Purple team
Reconnaissance
Reconnaissance, OSINTRed team
Reporting
Source code analysis
Training
Web
Wifi
Windows
Stars
kubeaudit helps you audit your Kubernetes clusters against common security controls
Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/
Fetch many paths for many hosts - without killing the hosts
Small, fast tool for performing reverse DNS lookups en masse.
Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods
Peirates - Kubernetes Penetration Testing tool
Review Access - kubectl plugin to show an access matrix for k8s server resources
🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast. Precise. Effective.
ToolHive makes deploying MCP servers easy, secure and fun
Fast GitHub recon tool. Scans for leaked secrets across all of GitHub, not just known repos and orgs. Support for GitHub dorks.
A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.
Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs
Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.
cyberark / kubesploit
Forked from Ne0nd0g/merlinKubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.
Utility program to perform multiple operations for a given subnet/CIDR ranges.
A toolkit to attack Office365
Rapid7 | insightCloudSec | Kubernetes RBAC Power Toys - Visualize, Analyze, Generate & Query
Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (cLDAP)
Fast and configurable TLS grabber focused on TLS based data collection.
A unique technique to execute binaries from a password protected zip
Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.
Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one place
Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, and Benchmarks.
Cloudlist is a tool for listing Assets from multiple Cloud Providers.