Lists (32)
Sort Name ascending (A-Z)
Automation
Automotive
Projects related to automotiveAzure
Blue team
Threat intelligence, security monitoring, SIEM, EDRC2
Cloud
Cloud audit tools, pentest toolsCoding
Containers
Containers, orchestration, KubernetesCTI
CVE
Dorks
fuzzing
Hardware
Linux
Lists
Malware development
Courses, tools for evaison, bulding malware, etc.MCP
Misc
Crypto and other random stuffML/AI
Mobile
Networking
OSINT
Phishing
Purple team
Reconnaissance
Reconnaissance, OSINTRed team
Reporting
Source code analysis
Training
Web
Wifi
Windows
Stars
Real fucking shellcode encryptor & obfuscator tool
A tool for generating fake code signing certificates or signing real ones
fiatjaf / jiq
Forked from simeji/jidjid on jq - interactive JSON query tool using jq expressions
Show who has RBAC permissions to perform actions on different resources in Kubernetes
EXOCET - AV-evading, undetectable, payload delivery tool
APKHunt is a comprehensive static code analysis tool for Android apps that is based on the OWASP MASVS framework. Although APKHunt is intended primarily for mobile app developers and security teste…
kube-scan: Octarine k8s cluster risk assessment tool
framework to rapidly implement custom droppers for all three major operating systems
A command-line utility designed to discover URLs for a given domain in a simple, efficient way. It works by gathering information from a variety of passive sources, meaning it doesn't interact dire…
GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsoft SharePoint List and exfiltrate files using Google Drive or…
🦫 | GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Go programming language, all is made for educati…
shellz is a small utility to manage your ssh, telnet, kubernetes, winrm, web or any custom shell in a single place.
Golang client for querying SecurityTrails API data
Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agent
Tool and policy library for reviewing Google Kubernetes Engine clusters against best practices
Tool to remotely dump secrets from the Windows registry
Discover new target domains using Content Security Policy