Lists (2)
Sort Name ascending (A-Z)
Stars
Small offensive network toolkit for Raspberry Pi (+ Waveshare 1.44″ LCD HAT) inspired by sharkjack fonctionnalities. For redteam and educational purposes only.
With IHA089 Labs, you can practice a wide range of cybersecurity techniques, such as account takeovers, SQL injection, cross-site scripting (XSS), brute force attacks, and more. The labs are catego…
The goal of this guide is very simple - to teach anyone interested in cyber security, regardless of their knowledge level, how to make the most of Netlas.io.
LSASS memory dumper using only NTAPIs, creating a minimal minidump. It can be compiled as shellcode (PIC), supports XOR encryption, and remote file transmission.
A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server.
A collection of slides and presentations from BSides Ahmedabad 2024, held on October 12th and 13th. This repository features key insights and topics in cybersecurity, showcasing sessions and worksh…
📜 A Cheat-Sheet Collection from the WWW
ChatGPT Jailbreaks, GPT Assistants Prompt Leaks, GPTs Prompt Injection, LLM Prompt Security, Super Prompts, Prompt Hack, Prompt Security, Ai Prompt Engineering, Adversarial Machine Learning.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Tib3rius / Active-Directory-Exploitation-Cheat-Sheet
Forked from S1ckB0y1337/Active-Directory-Exploitation-Cheat-SheetA cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Projects for security students and professionals
PEN-300 collection to help you on your exam.
Tools and Techniques for Blue Team / Incident Response
Tools and Techniques for Red Team / Penetration Testing
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
List of Awesome Red Teaming Resources
This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.
Git with a cup of tea! Painless self-hosted all-in-one software development service, including Git hosting, code review, team collaboration, package registry and CI/CD
🚀 Curated list of open-source, self-hosted projects deployable with Docker and docker-compose. Your go-to resource for amazing self-hostable software.
AI-Powered Penetration Testing Assistant
PIP-INTEL is an OSINT (Open Source Intelligence) tool designed using various open-source tools and pip packages.