Stars
Yet another doom clone (in 13kb of JavaScript)
Robust evasion attacks against neural network to find adversarial examples
An AI-powered threat modeling tool that leverages OpenAI's GPT models to generate threat models for a given application based on the STRIDE methodology.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.
Prompt, run, edit, and deploy full-stack web applications
OWASP VulnerableApp Project: For Security Enthusiasts by Security Enthusiasts.
Unit and Integration Test generation for Developers. Generate tests and stubs for your application that actually work!
This repo contains the code for my secure code review challenges
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
Master programming by recreating your favorite technologies from scratch.
A curated list of CTF frameworks, libraries, resources and softwares
Virtual whiteboard for sketching hand-drawn like diagrams
🕵️♂️ All-in-one OSINT tool for analysing any website
Hunt down social media accounts by username across social networks
This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks, …
Tools and Techniques for Red Team / Penetration Testing
A curated list of tools for incident response
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), ar…
API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websites
🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2024
A curated list of various bug bounty tools
A collection of hacking tools, resources and references to practice ethical hacking.
Deskreen turns any device with a web browser into a secondary screen for your computer. ⭐️ Star to support our work!