Lists (27)
Sort Name ascending (A-Z)
Active Directory
Tools for hacking Active Directory networksAerospace
Aerospace (hacking) resourcesCloud
Repositories related to cloud hackingCommand & Control
Command & Control (C2) tools and frameworksCredentials
Tools to work with all sorts of credentialsCryptography
Tools highlighting cryptographic attacksCVE
Proof-of-concept programs associated with Common Vulnerabilities and Exposures (CVE)Evasion
Tools & Resources for evading Antivirus, EDR, IDS, etc.Forensics
Tools for forensic operations / CTFsHardware
Collection of repositories related to hardware (hacking)IoT
Tools for testing Internet of Things (IoT) devicesLinux
Tools related to hacking all things LinuxMobile
Resources related to hacking or reversing mobile devices or mobile apps.Network
Tools for general network hackingOperational Technology
Resources related to (hacking) Operational Technology (OT) systemsOSINT
Resources for open source intelligence (OSINT)Other
Unsorted stars / other stuffPivoting
Tools to pivot through internal networksPost exploitation
Repositories with post-exploitation toolingPrivilege Escalation
Resources for privilege escalation, usually on an OS-basisPwn
Tools for binary exploitation (AKA pwn)Reporting
Tools for writing pentest / red team reportsReversing
All things digital reverse engineeringSocial Engineering
Repositories that highlight attacks that deal with victim interaction (phishing, general tomfoolery)Web
Tools & resources for hacking web applicationsWindows
Tools related to (hacking) Microsoft Windows OSWireless
Wireless hacking (WiFi, Bluetooth, BLE, ...)Starred repositories
A reverse engineering tool for decompiling and disassembling the React Native Hermes bytecode
Git with a cup of tea! Painless self-hosted all-in-one software development service, including Git hosting, code review, team collaboration, package registry and CI/CD
Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection
Go library for handling IP addresses and subnets, both IPv4 and IPv6
Tool for viewing and extracting files from an UBIFS image
HTTPLeaks - All possible ways, a website can leak HTTP requests
A simple, reliable and reasonably fast network capture analyzer.
OWASP dependency-check is a software composition analysis utility that detects publicly disclosed vulnerabilities in application dependencies.
Language server for Dockerfiles, Compose files, and Bake files
A tool for identifying and exploiting vulnerable Viewstate implementations in ASP.NET
An open source, portable, easy to use, readable and flexible TLS library, and reference implementation of the PSA Cryptography API. Releases are on a varying cadence, typically around 3 - 6 months …
ASP.NET Core Data Protection in Python
World's fastest and most advanced password recovery utility
ivision-research / hashcat
Forked from hashcat/hashcatWorld's fastest and most advanced password recovery utility
A GitHub Actions Supply Chain CTF / Goat
A Qemu Proxmox Template builder project using Packer
A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.
Utility for downloading and mounting EBS snapshots using the EBS Direct API's
Power-line communication (PLC) carries data on a conductor that is also used simultaneously for AC/DC electric power transmission.
NeoVim dark colorscheme inspired by the colors of the famous painting by Katsushika Hokusai.
Because just a dark theme wasn't enough!