Lists (1)
Sort Name ascending (A-Z)
Stars
🔍 Cisco Configuration Files Audit Tool – Analyzes and audits Cisco configs for 🔐 security, 🛡️ compliance, and ⚙️ best practices.
Kali Linux Fixes for Newly Imported VM's
ghstridr / Nix-Auditor
Forked from XalfiE/Nix-AuditorNix Audit made easier (RHEL, CentOS) 🔥 🔥 🔥
Break and Elevation of Privilege the API v2 using JSON Web Token (JWT)
crim3hound / BurpSuitePro-2.0.06-beta-Loader-Keygen
Forked from kingsunLIN/BurpSuitePro-2.0.06-beta-Loader-Keygencrim3hound / evilginx2
Forked from kgretzky/evilginx2Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practising GraphQL Security.
Next generation frontend tooling. It's fast!
A deliberately vulnerable banking application designed for practicing Security Testing of Web App, APIs, AI integrated App and secure code reviews. Features common vulnerabilities found in real-wor…
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Quark Agent - Your AI-powered Android APK Analyst
Collection of Notes and CheatSheets used for Red teaming Certs
CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File
Phone: A Mobile Phone Forensic Framework ( Android )
Best practices for segmentation of the corporate network of any company
PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection rules and undertake various security tasks, all accessible …
W1nterFr3ak / NetExec
Forked from Pennyw0rth/NetExecThe Network Execution Tool
zimedev / certipy-merged
Forked from ly4k/CertipyTool for Active Directory Certificate Services enumeration and abuse