Starred repositories
Master the command line, in one page
A book-in-progress about the Linux kernel and its insides.
Hunt down social media accounts by username across social networks
Linux, Jenkins, AWS, SRE, Prometheus, Docker, Python, Ansible, Git, Kubernetes, Terraform, OpenStack, SQL, NoSQL, Azure, GCP, DNS, Elastic, Network, Virtualization. DevOps Interview Questions
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
😎 Awesome lists about all kinds of interesting topics
🕵️♂️ Collect a dossier on a person by username from thousands of sites
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
Open Source Intelligence Interface for Deep Web Scraping
Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.
The OSINT project, the main idea of which is to collect all the possible Google dorks search combinations and to find the information about the specific web-site: common admin panels, the widesprea…
Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.
Take control over your live stream video by running it yourself. Streaming + chat out of the box.
Automation for internal Windows Penetrationtest / AD-Security
This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used in Joplin
A source code analyzer built for surfacing features of interest and other characteristics to answer the question 'What's in the code?' quickly using static analysis with a json based rules engine. …
A collection of Red Team focused tools, scripts, and notes
A PowerShell script anti-virus evasion tool
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
This program is designed to demonstrate various process injection techniques
Enumerate all network shares in the current domain. Also, can resolve names to IP addresses.
Adversary Tactics - PowerShell Training