Lists (3)
Sort Name ascending (A-Z)
Stars
This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.
This custom component for Home Assistant will add crucial features to your climate-controlling TRV (Thermostatic Radiator Valves) to save you the work of creating automations to make it smart. It c…
TECH Controllers integration for Home Assistant
21 Lessons, Get Started Building with Generative AI 🔗 https://microsoft.github.io/generative-ai-for-beginners/
Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application
A CNI meta-plugin for multi-homed pods in Kubernetes
🎯 Cross Site Scripting ( XSS ) Vulnerability Payload List
proxychains - a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy. Supported auth-types: "user/pass" fo…
A highly experimental exploration of integrating Tailscale and Caddy.
Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
The FLARE team's open-source tool to identify capabilities in executable files.
A Windows API wrapper package for the Go Programming Language
Easy & Flexible Alerting With ElasticSearch
Making it easy to write shell-like scripts in Go
The API traffic analyzer for Kubernetes providing real-time K8s protocol-level visibility, capturing and monitoring all traffic and payloads going in, out and across containers, pods, nodes and clu…
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
A little tool to play with Windows security
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
A modern alternative to the watch command, records the differences in execution results and can check this differences at after.
The ultimate WinRM shell for hacking/pentesting