Skip to content
View royharoush's full-sized avatar

Block or report royharoush

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

38 stars written in HTML
Clear filter

GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems

HTML 11,001 1,343 Updated Oct 28, 2024

A list of public penetration test reports published by several consulting firms and academic security groups.

HTML 8,571 1,967 Updated Jun 6, 2024

Compilation of public failure/horror stories related to Kubernetes

HTML 6,232 309 Updated Aug 23, 2020

Automagically reverse-engineer REST APIs via capturing traffic

HTML 5,129 224 Updated Dec 12, 2024

Automate the creation of a lab environment complete with security tooling and logging best practices

HTML 4,668 994 Updated Jul 6, 2024

Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀

HTML 4,542 728 Updated Dec 7, 2024

ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the current state of the target AD environment.

HTML 1,730 285 Updated Jun 15, 2020

Tools, tips, tricks, and more for exploring ICS Security.

HTML 1,653 443 Updated Aug 2, 2024

Configuration guidance for implementing the Windows 10 and Windows Server 2016 DoD Secure Host Baseline settings. #nsacyber

HTML 1,557 286 Updated Dec 24, 2022

Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.

HTML 1,361 626 Updated Jun 6, 2021

CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA tokens.

HTML 1,335 295 Updated May 22, 2020

*DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM

HTML 1,088 274 Updated Aug 21, 2018

Active Directory and Internal Pentest Cheatsheets

HTML 1,087 210 Updated Dec 11, 2024

A Nmap XSL implementation with Bootstrap.

HTML 926 176 Updated Nov 13, 2023

Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attributes. This all includes tools to work with anything in gener…

HTML 795 90 Updated Nov 27, 2023

World’s single largest Internet domains dataset

HTML 723 112 Updated Dec 7, 2024

Open-source pentesting management and automation platform by Salesforce Product Security

HTML 593 152 Updated Feb 12, 2022

Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI

HTML 552 60 Updated Jul 28, 2024

Post Exploitation Wiki

HTML 515 112 Updated Dec 18, 2019

A crossplatform mDNS enumeration tool.

HTML 345 15 Updated Sep 25, 2022

Tool Analysis Result Sheet

HTML 345 70 Updated Dec 4, 2017

A library of pretexts to use on offensive phishing engagements.

HTML 332 76 Updated Aug 9, 2019

A simple web app with a XXE vulnerability.

HTML 225 65 Updated Nov 10, 2021

The official Wiki for the Bash Bunny

HTML 201 69 Updated Sep 8, 2020

Kubernetes Auto Analyzer

HTML 191 23 Updated Dec 11, 2019

Tool for tunnel (Version 2)

HTML 187 64 Updated Sep 9, 2021

Neet - Network Enumeration and Exploitation Tool

HTML 167 31 Updated Nov 30, 2016

Brian's Pentesting and Technical Tips for You

HTML 120 35 Updated Aug 2, 2024

Code repository for Mastering Modern Web Penetration Testing, published by Packt

HTML 73 36 Updated Jan 30, 2023

scan & visualize subnets

HTML 67 26 Updated Jun 25, 2017
Next