Highlights
- Pro
Lists (9)
Sort Name ascending (A-Z)
Stars
Prevent merging of malicious code in pull requests
sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment
Are you sick and tired of people from various countries taking your hard earned work from your website? Right-click and pasting or scraping your content and then bootlegging it like they did it? We…
Check subdomains for subdomain takeovers and other DNS tomfoolery
Open-source Windows and Office activator featuring HWID, Ohook, TSforge, KMS38, and Online KMS activation methods, along with advanced troubleshooting.
Homemade Aggressor scripts kit for Cobalt Strike
Real fucking shellcode encryptor & obfuscator tool
Most Responder's configuration power in your hand.
An OOB interaction gathering server and client library
The Bluesky Social application for Web, iOS, and Android
The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics.
NocteDefensor / offsec-tools
Forked from Syslifters/offsec-toolsoffsec-tools by Syslifters with custom additions such as offensive-pipeline integration.
Tools and Resources for Physical Security Red Teaming
PoC collection of Atlassian(Jira, Confluence, Bitbucket) products and Jenkins, Solr, Nexus
Open-source platform for IT, security, and infrastructure teams. (Linux, macOS, Chrome, Windows, cloud, data center)
Quickly generate every payload type for each listener and optionally host via HTTP.
IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applications.
A collection of random bits of information common to many individual penetration tests, red teams, and other assessments
ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of scripts, lived as a rolling virtual machine, existed as code…
😎 Awesome lists about all kinds of interesting topics
An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails configured in it.