Lists (2)
Sort Name ascending (A-Z)
Stars
☁️ ⚡ Granular, Actionable Adversary Emulation for the Cloud
Tools & Resources for Cyber Security Operations
A complete browser-based reverse engineering platform built on Rizin, running entirely client-side via WebAssembly.
Adversary simulation and Red teaming platform with AI
Tool to enumerate privileged Scheduled Tasks on Remote Systems
Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.
Advanced Active Directory network topology analyzer with SMB validation, multiple authentication methods (password/NTLM/Kerberos), and comprehensive network discovery. Export results as BloodHound‑…
Open-source AI hackers to find and fix your app’s vulnerabilities.
Just another Powerview alternative but on steroids
Enterprise AD CS Compromise Assessment tool for threat hunting, certificate template vulnerability detection, exploitation tracking, and historical attack hunting.
Digital Forensics Investigation Platform
Penetration Testing For - Web | Mobile | API | Thick Client | Source Code Review | DevSecOps | Wireless | Network Pentesting, etc...
🛡 I2P: End-to-End encrypted and anonymous Internet
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network i…
Official repository of OnionCat, the VPN adapter for Tor and I2P.
unofficial git repo -- report bugs/issues/pull requests on https://gitlab.torproject.org/ --
security assessment platform designed for enterprise environments to identify vulnerabilities, misconfigurations, and security weaknesses in Active Directory infrastructures.
A collection of useful commands, scripts and resources for the OSWA (WEB-200) exam of Offensive Security
Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI
AI Red Teaming playground labs to run AI Red Teaming trainings including infrastructure.