Lists (7)
Sort Name ascending (A-Z)
🔐 Crypto
Cryptographic primitives, protocols, and utils Forensics
Forensics tools and techniques🏰 Hardening / Telemetry
OS and browser hardening, telemetry removal🪪 Identity
Authentication and authorization tools/protocols🚧 Infrastructure
General infrastructure🌐 Network / Observability
Tools and libraries for networking functionality as well as NIDS/network forensics😈 Red Teaming
Red Team tools and techniquesStars
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Privilege Escalation Enumeration Script for Windows
BloodyAD is an Active Directory Privilege Escalation Framework
signal-cli provides an unofficial commandline, JSON-RPC and dbus interface for the Signal messenger.
Provides SPQR, a chunked post-quantum ratchet usable in parallel with DH ratchets for the libsignal protocol.
Cobalt Strike module x loader x profile x wike / A public collection of open resources for Cobalt Strike (only legal use in Red Team and penetration testing
A curated compilation of extensive resources dedicated to bootkit and rootkit development.
Intel® Cryptography Primitives Library is a secure, fast and lightweight library of building blocks for cryptography, highly-optimized for various Intel® CPUs
A secure, fast, and adaptable OS based on the seL4 microkernel
C library for prototyping and experimenting with quantum-resistant cryptography
Brave browser for Android, iOS, Linux, macOS, Windows.
Headless cloud-native authentication and identity management written in Go. Scales to a billion+ users. Replace Homegrown, Auth0, Okta, Firebase with better UX and DX. Passkeys, Social Sign In, OID…
A security-focused desktop and server linux operating system.
Portable C implementations of the AEGIS family of high-performance authenticated encryption algorithms.
The AEGIS family of authenticated encryption algorithms for Go.
The parent project for OpenZiti. Here you will find the executables for a fully zero trust, application embedded, programmable network @OpenZiti
A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM.
A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWHF 2018 security conference
Modular Enumeration and Password Spraying Framework
Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The built-in execution plan features options that attempt to by…