Lists (1)
Sort Name ascending (A-Z)
Stars
VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data exfiltration techniques used by advanced threat actors, alloβ¦
21 Lessons, Get Started Building with Generative AI π https://microsoft.github.io/generative-ai-for-beginners/
real time face swap and one-click video deepfake with only a single image
C2 Infrastructure Automation
Dissecting and Defeating Ransomware's Evasion Tactics Defcon 32
PowerShell rebuilt in C# for Red Teaming purposes
An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for vulnerabilities.
Evilginx3 Phishlets version (0.2.3 & above) Only For Testing/Learning Purposes
Windows Local Privilege Escalation Cookbook
Scripts to build a trimmed-down Windows 11 image.
A penetration testing playbook that's suitable for CTF challenges, bug bounty hunting and red team assessments.
Awesome secure by default libraries to help you eliminate bug classes!
Pre-Built Vulnerable Environments Based on Docker-Compose
[GITLAB MIRROR] Ludus is a system to build easy to use cyber environments for testing and development.
TCM PEH Course AD Lab Build Script (Hydra-DC, Punisher-Workstation, Spiderman-Workstation)
Chiasmodon is an OSINT tool designed to assist in the process of gathering information about a target domain. Its primary functionality revolves around searching for domain-related data, including β¦
πΈπ¬ - a deep learning toolkit for Text-to-Speech, battle-tested in research and production
eSpeak NG is an open source speech synthesizer that supports more than hundred languages and accents.
A Nemesis powered Retrieval-Augmented Generation (RAG) chatbot proof-of-concept.
Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.
Stand up a simple Elastic container with Kibana, Fleet, and the Detection Engine
A multiprotocol credentials bruteforcer / password sprayer and enumerator. π₯·
Homemade Pwnbox π / Rogue AP π‘ based on Raspberry Pi β WiFi Hacking Cheatsheets + MindMap π‘
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous β¦