Highlights
Lists (3)
Sort Name ascending (A-Z)
Stars
Get IP address on other side audio call in Telegram.
CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool
A small collection of vulnerable code snippets
A simple, modern and secure encryption tool (and Go library) with small explicit keys, no config options, and UNIX-style composability.
a game to learn (or teach) how to use standard commands in a Unix shell
TFHE-rs: A Pure Rust implementation of the TFHE Scheme for Boolean and Integer Arithmetics Over Encrypted Data.
This repository contains some resources for ethical hackers penetration tester 😊 This may contain some files, tools, books, and links that need to be used for good purposes only. Do not do any ille…
Good-lookin' diffs. Actually… nah… The best-lookin' diffs. 🎉
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
List of Awesome Red Teaming Resources
Docker image containing an Asciidoc + Microsoft rules aware version of the `vale` tool
A curated list of awesome Zero-Knowledge Proofs (ZKP) resources.
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Official Twitter/X account @PersistSniper. Made w…
For pentesters who don't wanna leave their terminals.
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
Tink is a multi-language, cross-platform, open source library that provides cryptographic APIs that are secure, easy to use correctly, and hard(er) to misuse.
Hunt for security weaknesses in Kubernetes clusters
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
Simple building of RPMs & Debian packages from git repos
A tool for generating reverse shell payloads on the fly.
Split your patch similarly to `git add -p` but supporting multiple buckets