Stars
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
CloudMapper helps you analyze your Amazon Web Services (AWS) environments.
A forensics tool to convert the data in the Windows srum (System Resource Usage Monitor) database to an xlsx spreadsheet.
Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.
AWS API Gateway management tool for creating on the fly HTTP pass-through proxies for unique IP rotation
A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compiled for educational purposes. The contents of this repository…
💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types
🎓 Path to a free self-taught education in Computer Science!
A tool to analyze the network flow during attack/defence Capture the Flag competitions
Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure DevOps release pipelines.
Fastest filesystem scanner for log4shell (CVE-2021-44228, CVE-2021-45046) and other vulnerable (CVE-2017-5645, CVE-2019-17571, CVE-2022-23305, CVE-2022-23307 ... ) instances of log4j library. Excel…
A Picamera2 application to take a picture every time a movement is detected. It then uploads the image to a backend server you can setup at https://github.com/mastrolinux/raspberry-pi-security-came…
NCC Group Open Source RF Security Testing Methodology
A fast enumeration tool for Windows Active Directory Pentesting written in Go
⭐ ⭐ ⭐ Build your own IP Attack Maps with SOUND!
PEDA - Python Exploit Development Assistance for GDB
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis