Lists (29)
Sort Name ascending (A-Z)
AI & LLM
APT
Asset Discovery
Backdoor & Rookit
Brute Force
C2
Cloud Security
Code Audit
Coding
Defense Evasion
Detection & Response
Discovery & Collection
Domain
Forensic Analysis
ICS & IOT
Infrastructure
Lateral Movement
Misc & Note
OSINT
Persistence
Pishing
Post Exploitation
Privilege Escalation
Proxy & Pivot
Reverse Engineering
Shell
Vulnerability
Web Security
Wireless
Stars
DigitalPlat FreeDomain: Free Domain For Everyone
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous …
微信公众号文章批量下载工具,支持评论、合集下载,支持保存html/mhtml/md/pdf/docx文件,保存文章内图片、视频、音频文件
A complete web-based remote monitoring and management web site. Once setup you can install agents and perform remote desktop session to devices on the local network or over the Internet.
A Security Tool for Bug Bounty, Pentest and Red Teaming.
Evil-M5Project is an innovative tool developed for ethical hacking and exploration of WiFi networks. It's compatible with Cardputer, Atoms3, Fire, core2. You can scan, monitor, and interact with Wi…
Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into categories for ease of searching and understanding. Also provi…
exec BashCommand with only ! # $ ' ( ) < \ { } just 10 charset used in Bypass or CTF
A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office365 users.
Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools, logging configuration and best practices, event log refere…