Lists (24)
Sort Name ascending (A-Z)
AV/EDR evasion
BurpSuite
CheatSheet
Hardware
Learning Resources
MalwareDev
MCU_Devs
FW / MCU development resourcesMisc
OSINT
Pentest - External
Pentest - Internal
Pentest - Misc
Pentest - Mobile
Pentest - Web
Pentest - Workstation
RedTeam
Research/paper
Resources
Reverse
RustDev
SAST
Static application security testing - Static Code AnalysisScanner
WiFi
Work utilities
Stars
XBOX 360 advanced glitching - Reverse Engineered using a logic analyzer.
Open Breach and Attack Simulation & Security Validation Platform
A delicious, but malicious SSL-VPN server 🌮
WhisperX: Automatic Speech Recognition with Word-level Timestamps (& Diarization)
xforcered / SoaPy
Forked from logangoins/SoaPySoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.
🎞️ Subtitles generation tool (Web-UI + CLI + Python package) powered by OpenAI's Whisper and its variants 🎞️
BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for custom keywords as well as Regular Expressions from publicly-…
Misconfiguration Manager is a central knowledge base for all known Microsoft Configuration Manager tradecraft and associated defensive and hardening guidance.
An LLM extension for Ghidra to enable AI assistance in RE.
Intercepting MitM proxy with flexible security scanner power
User-friendly AI Interface (Supports Ollama, OpenAI API, ...)
A python module to explore the object tree to extract paths to interesting objects in memory.
Secure Code Review AI Agent (SeCoRA) - AI SAST
Recon scripts for Red Team and Web blackbox auditing
Swiss-army tool for scraping and extracting data from online assets, made for hackers
Monitors ETW for security relevant syscalls maintaining the set called by each unique process
HardeningKitty and Windows Hardening Settings
Program for determining types of files for Windows, Linux and MacOS.
A OWASP Based Checklist With 80+ Test Cases
sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment
Proof of Concept (PoC) .NET tool for remotely killing EDR with WDAC
Browser extension that leverages TruffleHog and Native Messaging Hosts to scan web traffic in real-time for exposed secrets
Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird + Spawns a sacrificial Process as target process + (ACG+Bloc…
Example for booting multiple firmware versions in FLASH