Skip to content
View pr0b3r7's full-sized avatar

Highlights

  • Pro

Organizations

@humanaoffsec @HackerHermanos

Block or report pr0b3r7

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

ATLAS Adversarial ML

AI/ML Security: MITRE ATLAS (atlas.mitre.org) + OWASP LLM Top 10 + Google SAIF. Covers prompt injection, model tampering, data poisoning, agent security, privac
28 repositories

TA0001 Initial Access

Initial Access (TA0001): Gaining initial foothold in target networks. Includes phishing, exploiting public-facing apps, supply chain compromise, valid accounts. https://attack.mitre.org/tactics/TA0001
60 repositories

TA0002 Execution

Execution (TA0002): Running malicious code on target systems. Includes command interpreters, scripting, native APIs, exploitation for client execution. https://attack.mitre.org/tactics/TA0002
319 repositories

TA0003 Persistence

Persistence (TA0003): Maintaining access across restarts and credential changes. Includes registry run keys, scheduled tasks, bootkit, implants, account manipulation. https://attack.mitre.org/tactics/TA0003
34 repositories

TA0004 Privilege Escalation

Privilege Escalation (TA0004): Gaining higher-level permissions. Includes exploitation, access token manipulation, UAC bypass, AD escalation, sudo/setuid abuse. https://attack.mitre.org/tactics/TA0004
92 repositories

TA0005 Defense Evasion

Defense Evasion (TA0005): Avoiding detection. Includes obfuscation, disabling security tools, process injection, masquerading, AMSI/ETW bypass, rootkits. https://attack.mitre.org/tactics/TA0005
325 repositories

TA0006 Credential Access

Credential Access (TA0006): Stealing credentials. Includes password dumping, Kerberoasting, credential harvesting, brute force, keylogging, LSASS access. https://attack.mitre.org/tactics/TA0006
135 repositories

TA0007 Discovery

Discovery (TA0007): Understanding target environment. Includes network enumeration, AD recon, system info gathering, account discovery, BloodHound. https://attack.mitre.org/tactics/TA0007
152 repositories

TA0008 Lateral Movement

Lateral Movement (TA0008): Moving through the network. Includes pass-the-hash, RDP, SMB/WMI exec, SSH tunneling, pivoting, proxychains. https://attack.mitre.org/tactics/TA0008
77 repositories

TA0009 Collection

Collection (TA0009): Gathering target data. Includes screen capture, keylogging, email harvesting, clipboard data, memory dumping, secret scanning. https://attack.mitre.org/tactics/TA0009
21 repositories

TA0010 Exfiltration

Exfiltration (TA0010): Stealing data from target. Includes covert channels, DNS tunneling, steganography, encrypted transfers, cloud storage abuse. https://attack.mitre.org/tactics/TA0010
10 repositories

TA0011 Command and Control (C2)

Command and Control (TA0011): Communicating with compromised systems. Includes C2 frameworks (Cobalt Strike, Sliver), domain fronting, protocol tunneling. https://attack.mitre.org/tactics/TA0011
247 repositories

TA0040 Impact

Impact (TA0040): Disrupting availability or integrity. Includes ransomware, data destruction, defacement, resource hijacking, service disruption. https://attack.mitre.org/tactics/TA0040
6 repositories

TA0042 Resource Development

Resource Development (TA0042): Building attack infrastructure. Includes payload development, infrastructure setup, capability acquisition, tool compilation. https://attack.mitre.org/tactics/TA0042
386 repositories

TA0043 Reconnaissance

Reconnaissance (TA0043): Gathering target information. Includes OSINT, subdomain enumeration, network scanning, social engineering research. https://attack.mitre.org/tactics/TA0043
168 repositories

Threat Hunting

Threat Hunting related repositories
123 repositories

Starred repositories

65 stars written in HTML
Clear filter

A curated list of awesome warez and piracy links

HTML 26,025 2,242 Updated Jun 18, 2023

Mastering Bitcoin 3rd Edition - Programming the Open Blockchain

HTML 25,077 6,220 Updated Dec 26, 2024

🐧 A list of awesome Linux softwares

HTML 24,843 2,165 Updated Jan 2, 2026

A list of public penetration test reports published by several consulting firms and academic security groups.

HTML 9,351 2,131 Updated Nov 24, 2025

Gather and update all available and newest CVEs with their PoC.

HTML 7,531 959 Updated Feb 4, 2026

Jupyter notebooks for teaching/learning Python 3

HTML 6,752 1,839 Updated Jan 4, 2024

Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.

HTML 5,420 1,237 Updated Feb 13, 2025

Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀

HTML 5,392 957 Updated Nov 18, 2025

Official OWASP Top 10 Document Repository

HTML 5,217 1,015 Updated Jan 6, 2026

Automate the creation of a lab environment complete with security tooling and logging best practices

HTML 4,899 1,015 Updated Jul 6, 2024

ChatGPT Jailbreaks, GPT Assistants Prompt Leaks, GPTs Prompt Injection, LLM Prompt Security, Super Prompts, Prompt Hack, Prompt Security, Ai Prompt Engineering, Adversarial Machine Learning.

HTML 3,619 461 Updated Nov 12, 2025

Dirty COW

HTML 3,433 930 Updated Aug 12, 2019

Application Security Verification Standard

HTML 3,329 796 Updated Jan 31, 2026

Windows System Call Tables (NT/2000/XP/2003/Vista/7/8/10/11)

HTML 2,507 356 Updated Dec 30, 2025

Windows Events Attack Samples

HTML 2,501 428 Updated Jan 24, 2023

A curated list for awesome cloud native tools, software and tutorials.

HTML 2,374 390 Updated Nov 6, 2025

HTTPLeaks - All possible ways, a website can leak HTTP requests

HTML 2,091 207 Updated Jan 3, 2026

The OWASP NodeGoat project provides an environment to learn how OWASP Top 10 security risks apply to web applications developed using Node.js and how to effectively address them.

HTML 2,009 2,255 Updated Jun 15, 2024

ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the current state of the target AD environment.

HTML 1,883 298 Updated Jun 15, 2020

Repo for NuGet Client issues

HTML 1,540 266 Updated Jan 28, 2026

A curated list of amazingly awesome WordPress resources, themes, plugins and shiny things. Inspired by awesome-php.

HTML 1,475 203 Updated Jul 4, 2024

A plugin-based scanner that aids security researchers in identifying issues with several CMSs, mainly Drupal & Silverstripe.

HTML 1,396 275 Updated Jan 19, 2024

Course Files for AWS Certified Solutions Architect Certification Course (SAAC02) - Adrian Cantrill

HTML 1,389 927 Updated Jun 29, 2023

A curated list of useful resources that cover Offensive AI.

HTML 1,334 155 Updated Feb 1, 2026

💻 Windows XP All Editions Universal Product Keys Collection

HTML 1,139 139 Updated Feb 3, 2026

*DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM

HTML 1,096 277 Updated Aug 21, 2018

ZAP Add-ons

HTML 914 766 Updated Feb 4, 2026

CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit

HTML 823 169 Updated Oct 11, 2023

All releases of the security research group (a.k.a. hackers) The Hacker's Choice

HTML 749 191 Updated Sep 3, 2025
Next