Stars
Constrain, log and scan your MCP connections for security vulnerabilities.
Bug Bounty Hunting Framework Designed to Help Beginners Compete w/ the Pros
Python decompiler for modern Python versions.
Study materials for the Certified Red Team Expert (CRTE) exam, covering essential concepts in red teaming and penetration testing.
List of tools and resources for pentesting Microsoft Active Directory
Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
Exploit for CyberPanel Pre-Auth RCE via Command Injection
vpnc-script replacement for easy and secure split-tunnel VPN setup
A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)
A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
Sysmon configuration file template with default high-quality event tracing
Official writeups for Business CTF 2024: The Vault Of Hope
Enumerate the permissions associated with AWS credential set
Course code & attachments for our "React Native - The Practical Guide" (https://acad.link/react-native) course.
Explain complex systems using visuals and simple terms. Help you prepare for system design interviews.
A toy compiler that can convert Python scripts 🐍 to pickle bytecode 🥒
Official writeups for Cyber Apocalypse CTF 2024: Hacker Royale
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller
A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.