Lists (1)
Sort Name ascending (A-Z)
Starred repositories
CTF exercise to be installed in any android mpos device
Simple & Powerful PowerShell Script Obfuscator
A feature-rich command-line audio/video downloader
Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. [email protected]
Tips and tricks for working with Large Language Models like OpenAI's GPT-4.
An Awesome ReadME Generator To Jumpstart Your Projects!
A fast, clean, responsive Hugo theme.
A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.
Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and share th…
A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..etc. It could be used as a part of web content discovery, to …
Fully featured and community-driven hacking environment
A small tool built to find and fix common misconfigurations in Active Directory Certificate Services.
hax0rgb / InsecureShop
Forked from optiv/InsecureShopAn Intentionally designed Vulnerable Android Application built in Kotlin.
Updog is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S, can set ad hoc SSL certificates and use http basic auth.
A tool Stack to automatically reverse proxy Jellyfin
Free and open source image board browser
Shows how the CFT modules can be composed to build a secure cloud foundation
Automatically install all Kali linux tools
Mastering Ethereum: 2nd Edition, by Andreas M. Antonopoulos, Gavin Wood, Carlo Parisi, Alessandro Mazza, Niccolò Pozzolini
Abusing impersonation privileges through the "Printer Bug"
a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )
Windows Privilege Escalation from User to Domain Admin.
