Starred repositories
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
A collection of various awesome lists for hackers, pentesters and security researchers
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
The Python micro framework for building web applications.
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.
E-mails, subdomains and names Harvester - OSINT
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Small and highly portable detection tests based on MITRE's ATT&CK.
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
Collection of methodology and test case for various web vulnerabilities.
All about bug bounty (bypasses, payloads, and etc)
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
The FLARE team's open-source tool to identify capabilities in executable files.
A curated list of various bug bounty tools
Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.
Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
All the deals for InfoSec related software/tools this Black Friday
Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload creation using Metasploit. For use with Kali Linux.
A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the community.
File upload vulnerability scanner and exploitation tool.