Stars
A powerful tool for automated LLM fuzzing. It is designed to help developers and security researchers identify and mitigate potential jailbreaks in their LLM APIs.
A OWASP Based Checklist With 500+ Test Cases
Interview questions to screen offensive (red team/pentest) candidates
A Tunnel which Turns UDP Traffic into Encrypted UDP/FakeTCP/ICMP Traffic by using Raw Socket,helps you Bypass UDP FireWalls(or Unstable UDP Environment)
Port WiFi Pineapple NANO/TETRA in generic hardware
Want to make Flipper Animations? This is the place! Also, this is where I store some of my own creations!
5GHz + 2.4GHz wifi deauther device using RTL8720DN (BW16).
Find, verify, and analyze leaked credentials
A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for security professionals and CTF players.
📙 Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report
A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresses, and more.
Collection of Payloads BadUSB for Flipper Zero with DuckyScript 1.0
tweathers-sec / doppelganger
Forked from optiv/doppelgangerDoppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of capturing access control card data while performing physical s…
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
A repository of sysmon configuration modules
A list of tools and clients available for the Bluesky platform
Tools and Techniques for Red Team / Penetration Testing
Frequently asked questions about augmentation, biohacking, grinding, implants, and related topics.
A collection of Azure AD/Entra tools for offensive and defensive security purposes
Python 3 script to dump/scrape/extract company employees from LinkedIn API
The official exploit for Froxlor Remote Code Execution CVE-2023-0315
Command line interface to JMESPath - http://jmespath.org
An automotive capture the flag game for educational purposes.