Skip to content
View royharoush's full-sized avatar

Block or report royharoush

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

38 stars written in HTML
Clear filter

GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems

HTML 12,404 1,465 Updated Sep 17, 2025

A list of public penetration test reports published by several consulting firms and academic security groups.

HTML 9,288 2,123 Updated Nov 24, 2025

Automagically reverse-engineer REST APIs via capturing traffic

HTML 9,176 339 Updated Dec 15, 2025

Compilation of public failure/horror stories related to Kubernetes

HTML 6,212 307 Updated Aug 23, 2020

Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀

HTML 5,320 934 Updated Nov 18, 2025

Automate the creation of a lab environment complete with security tooling and logging best practices

HTML 4,878 1,017 Updated Jul 6, 2024

Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)

HTML 3,720 795 Updated Jun 14, 2025

Active Directory and Internal Pentest Cheatsheets

HTML 1,922 358 Updated Nov 27, 2025

Tools, tips, tricks, and more for exploring ICS Security.

HTML 1,884 476 Updated Apr 15, 2025

ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the current state of the target AD environment.

HTML 1,879 296 Updated Jun 15, 2020

Configuration guidance for implementing the Windows 10 and Windows Server 2016 DoD Secure Host Baseline settings. #nsacyber

HTML 1,584 290 Updated Dec 24, 2022

Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.

HTML 1,388 629 Updated Jun 6, 2021

CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA tokens.

HTML 1,380 303 Updated May 22, 2020

*DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM

HTML 1,099 278 Updated Aug 21, 2018

Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI

HTML 990 118 Updated May 10, 2025

A Nmap XSL implementation with Bootstrap.

HTML 961 184 Updated Nov 13, 2023

Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attributes. This all includes tools to work with anything in gener…

HTML 948 99 Updated Nov 27, 2023

Open-source pentesting management and automation platform by Salesforce Product Security

HTML 602 150 Updated Feb 12, 2022

Post Exploitation Wiki

HTML 527 112 Updated Dec 18, 2019

A library of pretexts to use on offensive phishing engagements.

HTML 380 82 Updated Aug 9, 2019

A crossplatform mDNS enumeration tool.

HTML 362 21 Updated Sep 25, 2022

Tool Analysis Result Sheet

HTML 356 72 Updated Dec 4, 2017

A simple web app with a XXE vulnerability.

HTML 229 70 Updated Nov 10, 2021

The official Wiki for the Bash Bunny

HTML 209 72 Updated Sep 8, 2020

Kubernetes Auto Analyzer

HTML 191 23 Updated Dec 11, 2019

Tool for tunnel (Version 2)

HTML 190 64 Updated Sep 9, 2021

Neet - Network Enumeration and Exploitation Tool

HTML 167 31 Updated Nov 30, 2016

Brian's Pentesting and Technical Tips for You

HTML 120 35 Updated Aug 2, 2024

scan & visualize subnets

HTML 73 26 Updated Jun 25, 2017

Code repository for Mastering Modern Web Penetration Testing, published by Packt

HTML 72 36 Updated Jan 30, 2023
Next