Lists (32)
Sort Name ascending (A-Z)
Automation
Automotive
Projects related to automotiveAzure
Blue team
Threat intelligence, security monitoring, SIEM, EDRC2
Cloud
Cloud audit tools, pentest toolsCoding
Containers
Containers, orchestration, KubernetesCTI
CVE
Dorks
fuzzing
Hardware
Linux
Lists
Malware development
Courses, tools for evaison, bulding malware, etc.MCP
Misc
Crypto and other random stuffML/AI
Mobile
Networking
OSINT
Phishing
Purple team
Reconnaissance
Reconnaissance, OSINTRed team
Reporting
Source code analysis
Training
Web
Wifi
Windows
Stars
A modern hardware definition language and toolchain based on Python
RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact
A collection of real world AI/ML exploits for responsibly disclosed vulnerabilities
The SpecterOps project management and reporting engine
Azure Red Team tool for graphing Azure and Azure Active Directory objects
An email spoofing testing tool that aims to bypass SPF/DKIM/DMARC and forge DKIM signatures.π»
Autoswagger by Intruder - detect API auth weaknesses
π Don't know what type of hash it is? Name That Hash will name that hash type! π€ Identify MD5, SHA256 and 300+ other hashes β Comes with a neat web app π₯
Nginxpwner is a simple tool to look for common Nginx misconfigurations and vulnerabilities.
OSINT Tool: Generate username lists for companies on LinkedIn
Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient
SysWhispers on Steroids - AV/EDR evasion via direct system calls.
Run PowerShell command without invoking powershell.exe
LinkedIn enumeration tool to extract valid employee names from an organization through search engine scraping
A pentest reporting tool written in Python. Free yourself from Microsoft Word.
A tool to scan Kubernetes cluster for risky permissions
This tool can be used to brute discover GET and POST parameters
Buttercup finds and patches software vulnerabilities
Active Directory information dumper via LDAP
Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more.
REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications
A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)
Automated Red Team Infrastructure deployement using Docker
Constrain, log and scan your MCP connections for security vulnerabilities.
Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!
Bloodhound Reporting for Blue and Purple Teams
Syscall Shellcode Loader (Work in Progress)
Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling