OffSec OSINT Pentest/RedTeam Tools
A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed as…
A Huge Learning Resources with Labs For Offensive Security Players
Collection of reverse shells for red team operations.
Tricks the target into enabling content (macros) with fake messages. Once enabled, uses macros to reduce the risk of suspision from target u…
oFx是一个开源的、开箱即用的漏洞批量验证框架。无需任何编程基础,只需一条命令即可快速验证、扫描漏洞
IP Rotation from different providers - Like FireProx but for GCP, Azure, Alibaba and CloudFlare
The best tool for finding one gadget RCE in libc.so.6
Gives you one-liners that aids in penetration testing operations, privilege escalation and more
An insane list of all dorks taken from everywhere from various different sources.
C2 writen in Rust & Go powered by Tor network.
A powerful Go-based multi-shell handler for managing multiple reverse shell connections simultaneously with features like shell type detecti…
Vulnerability Intelligence Platform
OSINT cheat sheet, list OSINT tools, wiki, dataset, article, book , red team OSINT for hackers and OSINT tips and OSINT branch. This reposit…
OSINT GPT ⌁ Cyber Intelligence – Advanced AI assistant for OSINT, DFIR, ethical hacking, red teaming, privacy & compliance. 🚀
The OSTE meta scanner is a comprehensive web vulnerability scanner that combines multiple DAST scanners, including Nikto Scanner, ZAP, Nucle…
Open source vulnerability DB and triage service.
Overlord - Red Teaming Infrastructure Automation
Packj stops :zap: Solarwinds-, ESLint-, and PyTorch-like attacks by flagging malicious/vulnerable open-source dependencies ("weak links") in…
Blazing fast, advanced Padding Oracle exploit
Wii U sdboot1 / devkit dual/sdio boot1 coldboot exploit.
A WIP shellcode loader tool which bypasses AV/EDR, coded in C++, and equipped with a minimal builder.
A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.
Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read