Lists (9)
Sort Name ascending (A-Z)
Bug Bounty
CTF
Digital Forensics
Ethical Hacking
All resource of Ethical HackingMalware Analysis
Malware analysis meterialOSCP
All about OSCP preparation.OSINT
Programming
Stars
📚 Freely available programming books
An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any misuse of this toolkit !
A list of public penetration test reports published by several consulting firms and academic security groups.
Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.
Tools, tips, tricks, and more for exploring ICS Security.
WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.
Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)
Trace Labs OSINT Linux Distribution based on Kali.
OWASP Foundation Web Respository
Bug Bounty Guide is a launchpad for bug bounty programs and bug bounty hunters.
Weaponized Browser-in-the-Middle (BitM) for Penetration Testers
CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability
Digital Forensics and Incident Response (DFIR)