Stars
📚 Biblioteca de livros essenciais da área da programação. (Confira o meu novo projeto `SendScriptWhatsapp`)
Probabilistic Context Free Grammar (PCFG) password guess generator
The world's simplest facial recognition api for Python and the command line
A static analysis tool for securing Go code
Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.
A collection of Powershell scripts that will help automate the build process for a Marvel domain.
StandIn is a small .NET35/45 AD post-exploitation toolkit
List of Dockers compiled from various CTFs
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
CTF challenge (mostly pwn) files, scripts etc
tothi / SharpStay
Forked from 0xthirteen/SharpStay.NET project for installing Persistence
Proof-of-concept obfuscation toolkit for C# post-exploitation tools
The OSINT project, the main idea of which is to collect all the possible Google dorks search combinations and to find the information about the specific web-site: common admin panels, the widesprea…
A script that helps you understand why your E-Mail ended up in Spam
My experiments in weaponizing Nim (https://nim-lang.org/)
Preparation guide for Offensive Security's PEN-300 course and OSEP certification exam
RedLizard Rust TCP Reverse Shell Server/Client
A plugin to introduce interactive symbols into your debugger from your decompiler
Rust Weaponization for Red Team Engagements.
A command line tool and library for transferring data with URL syntax, supporting DICT, FILE, FTP, FTPS, GOPHER, GOPHERS, HTTP, HTTPS, IMAP, IMAPS, LDAP, LDAPS, MQTT, POP3, POP3S, RTMP, RTMPS, RTSP…
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wis…
HardeningKitty and Windows Hardening Settings