Lists (5)
Sort Name ascending (A-Z)
Stars
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Hunt down social media accounts by username across social networks
🐙 Guides, papers, lessons, notebooks and resources for prompt engineering, context engineering, RAG, and AI Agents.
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
Impacket is a collection of Python classes for working with network protocols.
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
A curated list of tools for incident response
Scripted Local Linux Enumeration & Privilege Escalation Checks
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
⭐️ A curated list of awesome forensic analysis tools and resources
A cross-version Python bytecode decompiler
A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.
Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loading of a library from memory into a host process.
This map lists the essential techniques to bypass anti-virus and EDR
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Malware Configuration And Payload Extraction
The Official Bash Bunny Payload Repository
My musings with PowerShell