Lists (21)
Sort Name ascending (A-Z)
Active Directory Pwnage
AI / LLM
Cloud Pwnage
Cracking
Defending / Blue Team
Evasion
Hacking Labs
Honeypots
Infrastructure Pwnage
Linux Pwnage
Mobile Pwnage
OSINT / Enumeration
Phishing & Awareness
Privilege Escalation / Looting
Red Teaming
Reporting
SAP Hacking
SAST / DAST
Selfhosting / DevOPS
Web Pwnage
Wireless Hacking
Stars
claude-red is a curated library of offensive security skills designed for the Claude skills system. Each skill is a structured SKILL.md file that primes Claude with expert-level methodology for a s…
GromHacks Labs -- The payload lists they don't want you to have. 1,324 injection probes beamed down from the mothership to detect what's injectable across 20 vuln classes. We don't exploit, we just…
Blue Hammer by Nightmare-Eclipse Vulnerability Documentation & Reimplementation.
Project N.O.M.A.D, is a self-contained, offline survival computer packed with critical tools, knowledge, and AI to keep you informed and empowered—anytime, anywhere.
Open-source fuel & EV route planner. Real-time prices across enabled countries. Self-hostable.
A BloodHound OpenGraph collector that models Windows local privilege escalation as interconnected attack paths.
PCILeech module to exploit Windows 10 from UEFI when OS DMA protection is enabled
Disable Kernel DMA Protection on Windows 11 via pre-boot DMA attack
Real-time global intelligence dashboard. AI-powered news aggregation, geopolitical monitoring, and infrastructure tracking in a unified situational awareness interface
Open-source AI hackers to find and fix your app’s vulnerabilities.
A Beacon Object File (BOF) that talks directly to Windows authentication packages through the LSA untrusted/trusted client interface, without touching LSASS process memory.
Grafana scanner with all public CVEs that I collected in one script to make grafana testing easier
High-performance secrets scanner. CLI, Go library, Burp Suite extension, and Chrome extension. 487 detection rules with live credential validation.
xforcered / SoaPy
Forked from logangoins/SOAPySoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.
An implementation of PyADRecon using ADWS instead of LDAP. Generates individual CSV files and a single XSLX + HTML report about your AD domain. Evades EDR detections through ADWS.
Active Directory information dumper via ADWS for evasion purposes.
A lightweight self-hosted bot in a single binary, written in Go.
Drone Log analyzer: A high-performance universal dashboard application for organizing and analyzing DJI/Litchi flight logs privately in one place. Supports plugin for custom flight log formats. Bui…
Python3 implementation of ADRecon with support for NTLM and Kerberos authentication querying LDAP. Generates individual CSV files and a single XSLX + HTML report about your AD domain.
A self-hosted dashboard and organizer for Excalidraw with multi-user collaboration and scoped sharing.
A modern GoPhish fork with improved tracking accuracy and smarter detection.
A self-hosted dead man's switch for delivering encrypted messages (E2EE) to your loved ones — when you're gone or unresponsive.
10-20x more blocks for your CrowdSec bouncers — 120k+ IPs from 36 free threat feeds
Open-source tool for network discovery, visualization, and monitoring. Built with Go, FastAPI, and React, supports Docker host scanning.
CVE-2026-22200: Arbitrary file read + CNEXT RCE in osTicket