Stars
Linux, Jenkins, AWS, SRE, Prometheus, Docker, Python, Ansible, Git, Kubernetes, Terraform, OpenStack, SQL, NoSQL, Azure, GCP, DNS, Elastic, Network, Virtualization. DevOps Interview Questions
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Hunt down social media accounts by username across social networks
An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
🐧 A list of awesome Linux softwares
The best and simplest free open source web page change detection, website watcher, restock monitor and notification service. Restock Monitor, change detection. Designed for simplicity - Simply moni…
Impacket is a collection of Python classes for working with network protocols.
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Transparent proxy server that works as a poor man's VPN. Forwards over ssh. Doesn't require admin. Works with Linux and MacOS. Supports DNS tunneling.
E-mails, subdomains and names Harvester - OSINT
A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.
Prowler is an Open Cloud Security tool for AWS, Azure, GCP and Kubernetes. It helps for continuos monitoring, security assessments and audits, incident response, compliance, hardening and forensics…
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
an awesome list of honeypot resources
Anomaly detection related books, papers, videos, and toolboxes
Easy & Flexible Alerting With ElasticSearch
Exploit Development and Reverse Engineering with GDB Made Easy
📱 objection - runtime mobile exploration
An advanced memory forensics framework
🔥 Web-application firewalls (WAFs) from security standpoint.