Highlights
- Pro
Starred repositories
Python tool for converting files and office documents to Markdown.
Linux, Jenkins, AWS, SRE, Prometheus, Docker, Python, Ansible, Git, Kubernetes, Terraform, OpenStack, SQL, NoSQL, Azure, GCP, DNS, Elastic, Network, Virtualization. DevOps Interview Questions
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Automatic SQL injection and database takeover tool
Instant voice cloning by MIT and MyShell. Audio foundation model.
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
DeepFaceLab is the leading software for creating deepfakes.
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
The recursive internet scanner for hackers. 🧡
Qwen-Image is a powerful image generation foundation model capable of complex text rendering and precise image editing.
Infection Monkey - An open-source adversary emulation platform
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wis…
Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authenticat…
This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public expl…
💀 Generate malicious PDF test files for testing phone-home callbacks, SSRF, XSS, NTLM credential theft, and data exfiltration in PDF viewers, converters, and web applications. Can be used with Burp…
Tool for Active Directory Certificate Services enumeration and abuse
A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.
Zero shot vulnerability discovery using LLMs
Offensive Software Exploitation Course
Please no pull requests for this repository. Thanks!
Stealing Signatures and Making One Invalid Signature at a Time
MUCH Improved version of the Python Chasing Your Tail Tool to help you determine if you're being followed
Extract credentials from lsass remotely
Open-source security research tool for identifying origin IP exposure of websites protected by Cloudflare and similar reverse proxy services.