Lists (9)
Sort Name ascending (A-Z)
Stars
Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments
My CTF journey since 2015. Stats, writeups, code snippets, notes, challenges.
Implementation of hashids (http://hashids.org) in Python. Compatible with Python 2 and Python 3
AWS API Gateway management tool for creating on the fly HTTP pass-through proxies for unique IP rotation
Docker - Ubuntu with a bunch of PenTesting tools and wordlists
A curated list of useful resources for gRPC
Useful C2 techniques and cheatsheets learned from engagements
A list of resources for those interested in getting started in bug bounties
Transparent proxy through Tor for Kali Linux OS
Weekly updated list of missing CVEs in nuclei templates official repository. Mainly built for bug bounty, but useful for penetration tests and vulnerability assessments too.
Nuclei templates for honeypots detection.
The EXCLUSIVE Collection of 45,000+ Nuclei templates based on Wordfence intel. Daily updates for bulletproof WordPress security.
This repo contains some solved python hacker codes
Live Feed of C2 servers, tools, and botnets
This repository contains fully disclosed accepted reports for the null Ahmedabad's Bug Bounty CTF.
Utility program to perform multiple operations for a given subnet/CIDR ranges.
HTTP/2 Single Packet Attack low Level Library / Tool based on Scapy + Exploit Timing Attacks
Community curated list of templates for the nuclei engine to find security vulnerabilities.
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
Penetration-List: A comprehensive resource for testers, covering all types of vulnerabilities and materials used in Penetration Testing. Includes payloads, dorks, fuzzing materials, and offers in-d…
LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities
RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data
A community-powered collection of all known bug bounty platforms, vulnerability disclosure platforms, and crowdsourced security platforms currently active on the Internet.
A tool which is uses to remove Windows Defender in Windows 8.x, Windows 10 (every version) and Windows 11.