Stars
Ready-compiled kernel with Kali Nethunter additions for Samsung Galaxy A71
Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and share th…
DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will automatically generate the userlist from the domain. BE VERY CAR…
OSINT Tool: Generate username lists for companies on LinkedIn
A tool to perform Kerberos pre-auth bruteforcing
Wordlists for creating statistically likely username lists for use in password attacks and security testing
Mirror of the socat source code with pre-built releases for Linux (x64 and x86), Windows (x64 and x86), and MacOS (x64)
A UDF library with functions to interact with the operating system. These functions allow you to interact with the execution environment in which MySQL runs.
Bjorn is a powerful network scanning and offensive security tool for the Raspberry Pi with a 2.13-inch e-Paper HAT. It discovers network targets, identifies open ports, exposed services, and potent…
Welcome to Page where you will find all kind free and premium cyber security/hacking/pentesting related ebooks
A lightweight, customizable single-page personal portfolio website template built with JavaScript and Sass
150+ HTML5 Website Templates
Materials for the workshop "Red Team Ops: Havoc 101"
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
A curated list of delightful Bash scripts and resources.
Linux Driver for USB WiFi Adapters that are based on the RTL8814AU Chipset
A list of public penetration test reports published by several consulting firms and academic security groups.
A general guide for using USB network cards under WSL
Collection of various malicious functionality to aid in malware development
Collection of malware source code for a variety of platforms in an array of different programming languages.
Collection of handy online tools for developers, with great UX.
A collection of tips and tricks for various tech related topics :)
A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.
MSB and LSB steganography and detection
A collection of CoreWar warriors found on different hills