Stars
Inject RDPThief into memory with PowerShell.
"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.
CEH Practical
💻 Certified ethical hacker summary in bullet points
A multi-platform bug bounty toolkit that can be installed on Debian/Ubuntu or set up with Docker.
The Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.
Small but effective wordlist for brute-forcing and discovering hidden things.
Chart-Of-Wordlist helps to create your own custom wordlist. Also in one repository, you can find a list of awesome wordlist.
OWASP Community Pages are a place where OWASP can accept community contributions for security-related content.
The official BlackArch Linux installer
Automate the process of brute forcing the My Eyes Only pin code on Snapchat
A temporary email right from your terminal written in POSIX sh
Video discussing this curriculum: