Highlights
- Pro
Lists (3)
Sort Name ascending (A-Z)
Stars
VulnRisk - Open Source Vulnerability Risk Assessment Platform
ksnip the cross-platform screenshot and annotation tool
Python tool for converting files and office documents to Markdown.
Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.
myADMonitor is an open-source Active Directory changes tracking tool
Make beautiful isometric infrastructure diagrams
Metlo is an open-source API security platform.
Dependency-Track is an intelligent Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain.
Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure.
Kubescape is an open-source Kubernetes security platform for your IDE, CI/CD pipelines, and clusters. It includes risk analysis, security, compliance, and misconfiguration scanning, saving Kubernet…
Uncover the true IP address of websites safeguarded by Cloudflare & Others
A Modular Penetration Testing Framework
Model Context Protocol Servers
Multi functional app to find duplicates, empty folders, similar images etc.
Post-exploitation tool for hiding processes from monitoring applications
The Github project for The Defender's Guide by Luke Paine and Jonathan Johnson
Allows viewing, editing, and even deleting individual items within the Windows clipboard
Comprehensive Toolkit for Boosting and Fostering Cybersecurity Compliance
Open source templates you can use to bootstrap your security programs
CISO Assistant is a one-stop-shop for GRC, covering Risk, AppSec, Compliance/Audit Management, Privacy and supporting +100 frameworks worldwide with auto-mapping: NIST CSF, ISO 27001, SOC2, CIS, PC…
Kali Linux Fixes for Newly Imported VM's
Open Cyber Threat Intelligence Platform
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any misuse of this toolkit !
List of tools and resources for pentesting Microsoft Active Directory
Use a Fake image.jpg to exploit targets (hide known file extensions)