Stars
Graph visualization of wireless client and access point relationships
A collection of CTF write-ups, pentesting topics, guides and notes. Notes compiled from multiple sources and my own lab research. Topics also support OSCP, Active Directory, CRTE, eJPT and eCPPT.
Monitorize all the hardware sensors of your PC using Java
Probe for hardware, check operability and find drivers
This repo contains driver samples prepared for use with Microsoft Visual Studio and the Windows Driver Kit (WDK). It contains both Universal Windows Driver and desktop-only driver samples.
lightweight hypervisor SDK written in C++ with support for Windows, Linux and UEFI
Tool for using wireless signals to see if you're being followed.
Some setup scripts for security research tools.
Legion is an open source, easy-to-use, super-extensible and semi-automated network penetration testing tool that aids in discovery, reconnaissance and exploitation of information systems.
A shorter, less intimidating list of infosec resources helpful for anyone trying to learn.
A Go library for implementing command-line interfaces.
Good to know, easy to forget information about binaries and their exploitation!
Instructions on how to create your very own Pwnbox, originally created by HTB
🍯 T-Pot - The All In One Multi Honeypot Platform 🐝
Exploit Development and Reverse Engineering with GDB Made Easy
Pillar - Bootstrap 5 Resume/CV Theme for Developers
Active Directory Group Policy Preferences cpassword cracker/decrypter.
Standalone binaries for Linux/Windows of Impacket's examples
Open Source Repo for Integrated Web Systems blog samples
Sushy is a small Python library to communicate with Redfish based systems. Mirror of code maintained at opendev.org.
Scripted Local Linux Enumeration & Privilege Escalation Checks
Linux post exploitation enumeration and exploit checking tools