Stars
Cloud replacement for vacuum robots enabling local-only operation
Find, verify, and analyze leaked credentials
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
An open source, online threat modelling tool from OWASP
Repository for Azure Resource Policy built-in definitions and samples
Linux privilege escalation auditing tool
OWASP based Web Application Security Testing Checklist is an Excel based checklist which helps you to track the status of completed and pending test cases.
Small and highly portable detection tests based on MITRE's ATT&CK.
Learning Penetration Testing of Android Applications
The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.
Automate creating resilient, disposable, secure and agile infrastructure for Red Teams.
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique present…
Empire is a PowerShell and Python post-exploitation agent.
PowerShell Runspace Post Exploitation Toolkit
A curated list of awesome Hacking tutorials, tools and resources
UNIX-like reverse engineering framework and command-line toolset