15-stage Windows malware development & analysis course in Rust. Red team builds it, blue team detects it. All 15 binaries achieved 0/76 on V…
Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.
GooFuzz is a tool to perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without leav…
Custom Google search engine dedicated to IT security & hacking stuff. Over 240 high-quality sources.
Notification webhook for GoPhish
GoPhish Templates that I have retired and/or templates I've recreated.
A toy CTF Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface
🔍 Search anyone's digital footprint across 300+ websites
High-performance SQL parser, formatter, linter & security scanner for Go - 1.5M+ ops/sec, multi-dialect, zero-copy, race-free
Go Web Application Penetration Test
gpoParser is a tool designed to extract and analyze configurations applied through Group Policy Objects (GPOs) in an Active Directory enviro…
A exploit tool for Grafana Unauthorized arbitrary file reading vulnerability (CVE-2021-43798), it can burst plugins / extract secret_key / d…
Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit
Security Auditor Utility for GraphQL APIs
Search for Unix binaries that can be exploited to bypass system security restrictions.
GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
This repository is maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, dig…
######################################################################## …
A python flask app that is purposefully vulnerable to SQL injection and XSS attacks. To be used for demonstrating attacks
This tool is used for encrypt backdoor,shellcode,socks5 proxy generation,Information retrieval and POC arrangement for various architecture …
A detailed plan to achieve proficiency in hacking and penetration testing, with pathways including obtaining a degree in cybersecurity or ea…
Source code for Hacker101.com - a free online web and mobile security class.
Top disclosed reports from HackerOne