Stars
HID attack payload generator for Arduinos
Six Degrees of Domain Admin
A post-exploitation OS X/Linux agent written in Python 2.7
A collection of code snippets used in blog posts.
A curated list of tools for incident response
A collected list of awesome security talks
Wiki-like CTF write-ups repository, maintained by the community. 2015
Wiki-like CTF write-ups repository, maintained by the community. 2014
A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network
PowerSploit - A PowerShell Post-Exploitation Framework
PowerShell Module with Security cmdlets for security work