Stars
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
a collection of north korean apt articles, analysis and heists attributed to lazarus / bluenoroff / apt38.
Complete tutorial materials for building MCP servers with Docker - from NetworkChuck's video
Automatically install all Kali linux tools
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs
World's fastest and most advanced password recovery utility
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
A tool to perform Kerberos pre-auth bruteforcing
Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren't popular!
A powerful and useful hacker dictionary builder for a brute-force attack
Wordlists for creating statistically likely username lists for use in password attacks and security testing
Username tools for penetration testing
Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure DevOps release pipelines.
A swiss army knife for pentesting networks
The A2A x402 Extension brings cryptocurrency payments to the Agent-to-Agent (A2A) protocol, enabling agents to monetize their services through on-chain payments. This extension revives the spirit o…
This Bash script calculates the Safe transaction hashes by retrieving transaction details from the Safe transaction service API and computing both the domain and message hashes using the EIP-712 st…
Official writeups for Cyber Apocalypse CTF 2025: Tales from Eldoria
Performs shared code analysis on malware samples and outputs a graph.
pefile is a Python module to read and work with PE (Portable Executable) files