E-mails, subdomains and names
Tool to simulate attacks and collect the data
CLI tool that triggers Amazon EC2 Spot Interruption Notifications
A tool that allows you to create vulnerable environments
Public malware techniques used in the wild: Virtual Machine, Emulation
Bleeding edge django template focused on code quality and security
Security auditing tool for Linux, macOS, and UNIX-based system
Passive & Aggressive WiFi attack distro
Stake Crash Predictor is a toolkit for stake mines predictor & Plinko.
Solving the Satoshi Puzzle
Enterprise-level Go language combat project
A Gradle plugin for printing beautiful logs on the console
Manual for mobile app security testing and reverse engineering
The most common techniques to bypass AppLocker
Kernel privilege escalation vulnerability collection
Automating Host Exploitation with AI
Kubesploit is a cross-platform post-exploitation HTTP/2 Command
OpenSK is an open-source implementation for security keys
Python web scanner for OSINT gathering and OWASP vulnerability fuzzing
Expands a passphrase into several variations
Kubernetes multi-cluster management and publishing platform
Offensive Web Testing Framework (OWTF), is a framework
Idiomatic Golang Restful Starter Kit
Firing Range is a test bed for web application security scanners
Squeezer framework, build serverless dApps