Skip to content
View royharoush's full-sized avatar

Block or report royharoush

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

36 stars written in HTML
Clear filter

A list of public penetration test reports published by several consulting firms and academic security groups.

HTML 9,473 2,150 Updated Mar 22, 2026

Automagically reverse-engineer REST APIs via capturing traffic

HTML 9,280 347 Updated Mar 16, 2026

Compilation of public failure/horror stories related to Kubernetes

HTML 6,212 309 Updated Aug 23, 2020

Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀

HTML 5,460 970 Updated Mar 25, 2026

Automate the creation of a lab environment complete with security tooling and logging best practices

HTML 4,930 1,014 Updated Jul 6, 2024

Active Directory and Internal Pentest Cheatsheets

HTML 2,114 397 Updated Feb 23, 2026

Tools, tips, tricks, and more for exploring ICS Security.

HTML 1,938 481 Updated Apr 15, 2025

ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the current state of the target AD environment.

HTML 1,896 299 Updated Jun 15, 2020

Configuration guidance for implementing the Windows 10 and Windows Server 2016 DoD Secure Host Baseline settings. #nsacyber

HTML 1,593 291 Updated Dec 24, 2022

Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.

HTML 1,392 625 Updated Jun 6, 2021

CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA tokens.

HTML 1,382 305 Updated May 22, 2020

Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI

HTML 1,233 155 Updated Dec 31, 2025

*DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM

HTML 1,096 277 Updated Aug 21, 2018

Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attributes. This all includes tools to work with anything in gener…

HTML 984 102 Updated Nov 27, 2023

A Nmap XSL implementation with Bootstrap.

HTML 968 187 Updated Nov 13, 2023

Open-source pentesting management and automation platform by Salesforce Product Security

HTML 599 149 Updated Feb 12, 2022

Post Exploitation Wiki

HTML 524 111 Updated Dec 18, 2019

A library of pretexts to use on offensive phishing engagements.

HTML 387 83 Updated Aug 9, 2019

A crossplatform mDNS enumeration tool.

HTML 362 21 Updated Sep 25, 2022

Tool Analysis Result Sheet

HTML 358 72 Updated Dec 4, 2017

A simple web app with a XXE vulnerability.

HTML 232 72 Updated Nov 10, 2021

The official Wiki for the Bash Bunny

HTML 212 72 Updated Sep 8, 2020

Kubernetes Auto Analyzer

HTML 191 23 Updated Dec 11, 2019

Tool for tunnel (Version 2)

HTML 191 65 Updated Sep 9, 2021

Neet - Network Enumeration and Exploitation Tool

HTML 168 30 Updated Nov 30, 2016

Brian's Pentesting and Technical Tips for You

HTML 118 32 Updated Aug 2, 2024

scan & visualize subnets

HTML 73 24 Updated Jun 25, 2017

Code repository for Mastering Modern Web Penetration Testing, published by Packt

HTML 72 36 Updated Jan 30, 2023

Transform NMap Scans to an D3.js HTML Table

HTML 59 20 Updated Sep 21, 2017

Web based code browser using clang to provide basic code analysis.

HTML 46 6 Updated Jul 20, 2017
Next