Lists (8)
Sort Name ascending (A-Z)
Starred repositories
Automatic SSTI detection tool with interactive interface
To learn common smart contract vulnerabilities using Foundry!
A python interface for interacting with the Ethereum blockchain and ecosystem.
Examples of Solidity security issues
🚀 Try the Learn EVM Explorer we just launched!!!
🔪 Dumper & ripper for Telegram bots by token
Some scripts to abuse kerberos using Powershell
Hide your P/Invoke signatures through other people's signed assemblies
The Leading Security Assessment Framework for Android.
sorted russian names/surnames wordlists
BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world.…
Pre-Built Vulnerable Environments Based on Docker-Compose
Behave! A monitoring browser extension for pages acting as "bad boi"
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
Ultimate Burp Suite Exam and PortSwigger Labs Guide.
Convolutional neural network for analyzing pentest screenshots
Linux, Jenkins, AWS, SRE, Prometheus, Docker, Python, Ansible, Git, Kubernetes, Terraform, OpenStack, SQL, NoSQL, Azure, GCP, DNS, Elastic, Network, Virtualization. DevOps Interview Questions