Stars
Cmd.exe Command Obfuscation Generator & Detection Test Harness
A tool to detect command injection vulnerabilities in web applications. It identifies insecure user input handling that could allow attackers to execute arbitrary commands. Designed for penetration…
A collection of awesome penetration testing resources, tools and other shiny things
PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection rules, simulate logs, and undertake various security tasks,…
Tabler is free and open-source HTML Dashboard UI Kit built on Bootstrap
Compiled Binaries for Ghostpack
The lazier way to manage everything docker
Ready-compiled kernel with Kali Nethunter additions for Samsung Galaxy A71
Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and share th…
DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will automatically generate the userlist from the domain. BE VERY CAR…
OSINT Tool: Generate username lists for companies on LinkedIn
A tool to perform Kerberos pre-auth bruteforcing
Wordlists for creating statistically likely username lists for use in password attacks and security testing
Mirror of the socat source code with pre-built releases for Linux (x64 and x86), Windows (x64 and x86), and MacOS (x64)
A UDF library with functions to interact with the operating system. These functions allow you to interact with the execution environment in which MySQL runs.
Bjorn is a powerful network scanning and offensive security tool for the Raspberry Pi with a 2.13-inch e-Paper HAT. It discovers network targets, identifies open ports, exposed services, and potent…
Welcome to Page where you will find all kind free and premium cyber security/hacking/pentesting related ebooks
A lightweight, customizable single-page personal portfolio website template built with JavaScript and Sass
150+ HTML5 Website Templates
Materials for the workshop "Red Team Ops: Havoc 101"
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
A curated list of delightful Bash scripts and resources.
Linux Driver for USB WiFi Adapters that are based on the RTL8814AU Chipset
A list of public penetration test reports published by several consulting firms and academic security groups.