Blog about hacking things I've learned
-
Updated
Aug 20, 2022 - HTML
Blog about hacking things I've learned
Offensive Security Cheatsheet
A CTF challenge we put together for Ekoparty's 2023 main CTF
A dynamic cross-site scripting (XSS) payload delivery system with team server abilities.
Simple API for storing all incoming XSS requests and various XSS templates.
Most realistic social media phishing page for Instagram and facebook
This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offers valuable resources for those focused on analyzing and understanding different types of malware.
Public Portfolio Website
NetSentinel is a Python-based red team reconnaissance framework designed for stealthy internal enumeration, service discovery, and lateral movement preparation.
SVG XSS Exploiter is a web tool built with Python and Flask that lets users inject JavaScript payloads into SVG images to simulate XSS attacks. Made for ethical hackers and security researchers, it offers a simple UI to upload and test malicious SVGs safely in a local environment. Built strictly for educational and authorized testing purposes only.
Educational deserialization attack on a hydroelectric plant simulator (HydroFlow Console)
🔐 A powerful Node.js-based offensive security toolbox for security testing, subdomain/content discovery, SSL and header checks, and Tor proxying — all in one dashboard.
This repo is intended for capture the flag tasks and its write ups
CyberMoriarty is a research-driven prototype for an "AI-assisted offensive security framework". The vision is to build an "AI-powered Metasploit alternative" that can assist red teamers and penetration testers.
Sploit -- All-in-one, AI-powered cybersecurity toolkit for web, network, and phishing tests. Modular, cross-platform, Docker-ready, with GUI & CLI. Open source by AUX-441 Team.
Educational pentesting lab – Red Team exercises with Kali Linux, Metasploitable2, Nessus, Burp Suit, Wireshark, tcpdump, Nmap, Metasploit Framework, SET, Hydra, sqlmap, aircrack-ng and vulnerable apps. Step-by-step reports, commands, and captures.
Site where I publish my articles and writeups.
Personal technical guide to offensive cybersecurity and pentesting. Documentation of tools, commands, labs, and best practices.
Another random blog about security
Add a description, image, and links to the offensive-security topic page so that developers can more easily learn about it.
To associate your repository with the offensive-security topic, visit your repo's landing page and select "manage topics."