Lists (32)
Sort Name ascending (A-Z)
🤖 AI
⛓️ Blockchain
🔵 Blue Team
📺 CLI
⚙️ Config
🏗️ DevOps
🦹🏼♂️ DevSecOps
🕵🏻♂️ Forensics
📃 Lists
🍏 macOS
🌍 OSINT
🔪 Pentesting
🔪 Pentesting / AD
🔪 Pentesting / Bruteforce
🔪 Pentesting / Bypass
🔪 Pentesting / Cloud
🔪 Pentesting / Exploits
🔪 Pentesting / Kubernetes
🔪 Pentesting / Mobile
🔪 Pentesting / PrivEsc
🔪 Pentesting / Secret scanners
🔪 Pentesting / Tunneling
🔪 Pentesting / Vuln scanners
🔪 Pentesting / Web fuzzing
🔪 Pentesting / Web scanners
🔪 Pentesting / Wireless
🔪 Pentesting / Wordlists
Rare
🔴 Red Team
📈 Reporting
☕️ Software Development
🔌 SysAdmin
Stars
Recovers passwords from pixelized screenshots
Automatic SSRF fuzzer and exploitation tool
Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit
Scripted Local Linux Enumeration & Privilege Escalation Checks
Monitor linux processes without root permissions
Track the GPS location of the user's smartphone or PC and capture a picture of the target, along with IP and device information.
Starkiller is a Frontend for PowerShell Empire.
Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing
Chat with your data - AI data analysis and visualization on CSV, Postgres, MySQL, Snowflake, SQLite...
A curated list of awesome applications, softwares, tools and shiny things for macOS.
Now we have become very big, Different from the original idea. Collect premium software in various categories.
A curated list of awesome software for Apple's macOS.
AWS Attack Path Management Tool - Walking on the Moon
Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized report.
A tool for quickly evaluating IAM permissions in AWS.
A resource containing all the tools each ransomware gangs uses
Automation to assess the state of your M365 tenant against CISA's baselines
Entropy is a CLI tool that will scan your codebase for high entropy lines, which are often secrets.
App to bypass censorship on Android
🐍 🔍 GuardDog is a CLI tool to Identify malicious PyPI and npm packages
Repository containing source code of MixewayFlow service that is Swiss army knife for DevSecOps Teams
Self-hostable clone of lazydocker for the web. Manage your Docker fleet with ease
A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, function hooking or Import Address Table (IAT) modification.
Tunnel all your traffic over Websocket or HTTP2 - Bypass firewalls/DPI - Static binary available
A list of open source web security scanners