Stars
A comprehensive toolkit for mastering jq, featuring a collection of useful commands, a cheatsheet, and sample JSON data for hands-on learning.
A Small Collection of Very Basic Bash Scripts That I Use Regularly. 🪙💲💰
Whimsical yet powerful collection of fun, quirky, and sometimes downright bizarre Linux tools and commands. 🤡
The LLVM Project is a collection of modular and reusable compiler and toolchain technologies.
Client for PPP+TLS VPN tunnel services
Modified version of the passing-the-hash tool collection made to work straight out of the box
The tiny programs and scripts that don't deserve a project, but I still want to share.
Tool to parse the Group Policy Preferences XML file which extracts the username and decrypts the cpassword attribute.
lgandx / Responder
Forked from SpiderLabs/ResponderResponder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authenticat…
Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure DevOps release pipelines.
A command line tool and library for transferring data with URL syntax, supporting DICT, FILE, FTP, FTPS, GOPHER, GOPHERS, HTTP, HTTPS, IMAP, IMAPS, LDAP, LDAPS, MQTT, POP3, POP3S, RTMP, RTMPS, RTSP…
Find the password of protected ZIP files.
Hard Drive S.M.A.R.T Monitoring, Historical Trends & Real World Failure Thresholds
This repo contains some Amsi Bypass methods i found on different Blog Posts.
A swiss army knife for pentesting networks
Active Directory and Internal Pentest Cheatsheets
Automatic SQL injection and database takeover tool
A plugin-based scanner that aids security researchers in identifying issues with several CMSs, mainly Drupal & Silverstripe.
OWASP Joomla Vulnerability Scanner Project https://www.secologist.com/
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…