Lists (3)
Sort Name ascending (A-Z)
Stars
⚡️⚡️⚡️Self-hosted collaborative bookmark manager to collect, organize, and preserve webpages, articles, and more...
🔥 A highly scalable, offline-first foundation with the best developer experience and a focus on performance and best practices.
Extract and decrypt browser data, supporting multiple data types, runnable on various operating systems (macOS, Windows, Linux).
Create a quick survey with a QR-code link
Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)
Scan for occurances of suspicious string signatures within a powershell script
Spacecow99 / pwndsh
Forked from SafeBreach-Labs/pwndshPost-exploitation framework (and an interactive shell) developed in Bash shell scripting
Common PHP webshells you might need for your Penetration Testing assignments or CTF challenges. Do not host the file(s) on your server!
Le dojo développement de Paris
Information gathering framework for phone numbers
A collection of useful little scripts for database analysis and administration, created by our team at PostgreSQL Experts.
ChatGPT Prompts for Bug Bounty & Pentesting
A list of Google Dorks for Bug Bounty, Web Application Security, and Pentesting
This repository houses some of the small scripts I had used to quickly document throughout my OSCP course. This was referenced on YouTube, and should be made available to others!
Share project code and wiring diagrams in SunFounder TikTok videos.
Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.
Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.
Cheatsheet for the commands learned in Attack and Defense Active Directory Lab
ScareCrow - Payload creation framework designed around EDR bypass.
🤯 Lobe Chat - an open-source, modern-design AI chat framework. Supports Multi AI Providers( OpenAI / Claude 3 / Gemini / Ollama / Qwen / DeepSeek), Knowledge Base (file upload / knowledge managemen…
A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting