Lists (1)
Sort Name ascending (A-Z)
Stars
here all of Blackhat2023 challenges with the description except ( Warm it up, Hardy ) because there is no files provided for it.
Configuration files for desktop environment
WAPTLab - Web Application Penetration Testing Lab
Open-source AI agents for penetration testing
📦 Make security testing of K8s, Docker, and Containerd easier.
Advanced Domain Controller attack and credential analysis tool leveraging DonPAPI database
Not The Hidden Wiki - The largest repository of links related to cybersecurity
All about bug bounty (bypasses, payloads, and etc)
A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.
Aliases and scripts to make common tasks easier.
AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with kerberos.
RCEPayloadGen is an advanced payload library with 100,000+ curated Remote Code Execution (RCE) payloads. Categorized by vector, language, and exploitation technique; designed for automated testing,…
A small collection of vulnerable code snippets
MSDAT: Microsoft SQL Database Attacking Tool
This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.
Automated multi-engine framework for unpacking, analyzing, and devirtualizing binaries protected by commercial and custom Virtual Machine based protectors. Combines Dynamic Taint Tracking, Symbolic…
This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structure.
Documenting the Xilinx 7-series bit-stream format.
Automatic CPU speed & power optimizer for Linux
Omeka S is a web publication system for universities, galleries, libraries, archives, and museums. It consists of a local network of independently curated exhibits sharing a collaboratively built p…
CodeScanAI is an open source tool that utilizes powerful AI models (OpenAI, Gemini, and even self-hosted servers) to scan your codebase for possible security vulnerabilities.