Stars
V2 of the fantastic Raspberry Pi NOAA setup
AT-AT (Attack Tree Analysis Tool) is a application that allows users to develop and analyze attack trees. The overall goal is to automatically generate a set of possible attack scenarios that can b…
🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2024
An open-source post-exploitation framework for students, researchers and developers.
Invoke-AtomicRedTeam is a PowerShell module to execute tests as defined in the [atomics folder](https://github.com/redcanaryco/atomic-red-team/tree/master/atomics) of Red Canary's Atomic Red Team p…
An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM
vanity address generator for tor onion v3 (ed25519) hidden services
Cloud Security Posture Management (CSPM)
Tiny SHell - An open-source UNIX backdoor (I'm not the author!)
WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.
IntelOwl: manage your Threat Intelligence at scale
A Python tool used to automate the execution of the following tools : Nmap , Nikto and Dirsearch but also to automate the report generation during a Web Penetration Testing
Defences against Cobalt Strike
Juts a dumping ground for interesting files.
The ultimate WinRM shell for hacking/pentesting
A tool for checking if MFA is enabled on multiple Microsoft Services
📍 generate heatmaps of wifi coverage with Python
A swiss army knife for pentesting networks
Container and files for a beginners workshop on writing Linux x86_64