Skip to content
View pr0b3r7's full-sized avatar

Highlights

  • Pro

Organizations

@humanaoffsec @HackerHermanos

Block or report pr0b3r7

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

ATLAS Adversarial ML

AI/ML Security: MITRE ATLAS (atlas.mitre.org) + OWASP LLM Top 10 + Google SAIF. Covers prompt injection, model tampering, data poisoning, agent security, privac
28 repositories

TA0001 Initial Access

Initial Access (TA0001): Gaining initial foothold in target networks. Includes phishing, exploiting public-facing apps, supply chain compromise, valid accounts. https://attack.mitre.org/tactics/TA0001
60 repositories

TA0002 Execution

Execution (TA0002): Running malicious code on target systems. Includes command interpreters, scripting, native APIs, exploitation for client execution. https://attack.mitre.org/tactics/TA0002
319 repositories

TA0003 Persistence

Persistence (TA0003): Maintaining access across restarts and credential changes. Includes registry run keys, scheduled tasks, bootkit, implants, account manipulation. https://attack.mitre.org/tactics/TA0003
34 repositories

TA0004 Privilege Escalation

Privilege Escalation (TA0004): Gaining higher-level permissions. Includes exploitation, access token manipulation, UAC bypass, AD escalation, sudo/setuid abuse. https://attack.mitre.org/tactics/TA0004
92 repositories

TA0005 Defense Evasion

Defense Evasion (TA0005): Avoiding detection. Includes obfuscation, disabling security tools, process injection, masquerading, AMSI/ETW bypass, rootkits. https://attack.mitre.org/tactics/TA0005
325 repositories

TA0006 Credential Access

Credential Access (TA0006): Stealing credentials. Includes password dumping, Kerberoasting, credential harvesting, brute force, keylogging, LSASS access. https://attack.mitre.org/tactics/TA0006
135 repositories

TA0007 Discovery

Discovery (TA0007): Understanding target environment. Includes network enumeration, AD recon, system info gathering, account discovery, BloodHound. https://attack.mitre.org/tactics/TA0007
152 repositories

TA0008 Lateral Movement

Lateral Movement (TA0008): Moving through the network. Includes pass-the-hash, RDP, SMB/WMI exec, SSH tunneling, pivoting, proxychains. https://attack.mitre.org/tactics/TA0008
77 repositories

TA0009 Collection

Collection (TA0009): Gathering target data. Includes screen capture, keylogging, email harvesting, clipboard data, memory dumping, secret scanning. https://attack.mitre.org/tactics/TA0009
21 repositories

TA0010 Exfiltration

Exfiltration (TA0010): Stealing data from target. Includes covert channels, DNS tunneling, steganography, encrypted transfers, cloud storage abuse. https://attack.mitre.org/tactics/TA0010
10 repositories

TA0011 Command and Control (C2)

Command and Control (TA0011): Communicating with compromised systems. Includes C2 frameworks (Cobalt Strike, Sliver), domain fronting, protocol tunneling. https://attack.mitre.org/tactics/TA0011
247 repositories

TA0040 Impact

Impact (TA0040): Disrupting availability or integrity. Includes ransomware, data destruction, defacement, resource hijacking, service disruption. https://attack.mitre.org/tactics/TA0040
6 repositories

TA0042 Resource Development

Resource Development (TA0042): Building attack infrastructure. Includes payload development, infrastructure setup, capability acquisition, tool compilation. https://attack.mitre.org/tactics/TA0042
387 repositories

TA0043 Reconnaissance

Reconnaissance (TA0043): Gathering target information. Includes OSINT, subdomain enumeration, network scanning, social engineering research. https://attack.mitre.org/tactics/TA0043
168 repositories

Threat Hunting

Threat Hunting related repositories
123 repositories

Starred repositories

45 stars written in Ruby
Clear filter

Metasploit Framework

Ruby 37,496 14,735 Updated Feb 10, 2026

A curated list of awesome awesomeness

Ruby 33,210 3,587 Updated Jun 2, 2024

🍻 A CLI workflow for the administration of macOS applications distributed as binaries

Ruby 21,817 11,320 Updated Feb 11, 2026

🍻 Default formulae for the missing package manager for macOS (or Linux)

Ruby 15,016 13,356 Updated Feb 11, 2026

Manage complex tmux sessions easily

Ruby 13,402 623 Updated Jan 25, 2026

Next generation web scanner

Ruby 6,406 980 Updated Oct 19, 2025

Config files for vim and tmux.

Ruby 5,711 962 Updated Aug 3, 2025

The ultimate WinRM shell for hacking/pentesting

Ruby 5,243 677 Updated Jan 9, 2026

⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting

Ruby 4,512 755 Updated Feb 8, 2026

Main Website for The Odin Project

Ruby 4,274 2,118 Updated Feb 9, 2026

📙 Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report

Ruby 4,035 819 Updated Jul 30, 2025

InSpec: Auditing and Testing Framework

Ruby 3,046 682 Updated Feb 10, 2026

CeWL is a Custom Word List Generator

Ruby 2,566 313 Updated Oct 21, 2025

Ruby gems for general-purpose AI agent systems: automation, research, data processing, customer support, content creation. SwarmSDK provides single-process orchestration, persistent memory with sem…

Ruby 1,621 115 Updated Feb 11, 2026

Vagrant VirtualBox environment for conducting an internal network penetration test

Ruby 957 178 Updated Jun 5, 2023

DevSec Linux Baseline - InSpec Profile

Ruby 860 192 Updated Oct 29, 2025

Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs

Ruby 728 121 Updated Jan 21, 2020

Pipal, THE password analyser

Ruby 660 121 Updated Aug 27, 2023

Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.

Ruby 659 107 Updated Jul 28, 2025

Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 / CVE-2018-7600 / SA-CORE-2018-002)

Ruby 593 170 Updated Jan 8, 2021

This repository has been combined with mac-tracker project and no longer receives updates.

Ruby 575 36 Updated Jun 22, 2025

network visualization & pentest reporting

Ruby 531 103 Updated May 2, 2023

RSMangler will take a wordlist and perform various manipulations on it similar to those done by John the Ripper with a few extras.

Ruby 231 33 Updated Jul 24, 2019

Cartero - Social Engineering Framework

Ruby 175 32 Updated Jun 23, 2020

A simple tool for offline searching of default credentials for network devices, web applications and more.

Ruby 169 20 Updated Oct 1, 2017

A simple email generator that uses dorks on Bing to generate emails from LinkedIn Profiles.

Ruby 151 23 Updated Oct 19, 2022

Documentation and Tools for Cisco's PSIRT openVuln API

Ruby 116 51 Updated Apr 18, 2025

🔑 A CLI tool to identify the hash type of a given hash.

Ruby 114 16 Updated Aug 26, 2022

Learn Ruby Regexp step-by-step from beginner to advanced levels with plenty of examples and exercises.

Ruby 101 11 Updated Dec 16, 2025

🚩 A CLI tool & library to enhance and speed up script/exploit writing with string conversion/manipulation.

Ruby 90 9 Updated Feb 7, 2026
Next