Lists (1)
Sort Name ascending (A-Z)
Stars
🙃 A delightful community-driven (with 2,400+ contributors) framework for managing your zsh configuration. Includes 300+ optional plugins (rails, git, macOS, hub, docker, homebrew, node, php, python…
MBCProject / capa-rules-1
Forked from mandiant/capa-rulesStandard collection of rules for capa: the tool for enumerating the capabilities of programs
Python package for managing Linksys Smart Wi-Fi router with HNAP/JNAP
Jupyter metapackage for installation and documentation
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark
A forensics tool to convert the data in the Windows srum (System Resource Usage Monitor) database to an xlsx spreadsheet.
Prototype Pollution and useful Script Gadgets
A fast tool to scan client-side prototype pollution vulnerability written in Rust. 🦀
nodejsscan is a static security code scanner for Node.js applications.
A swiss army knife for pentesting networks
OneDriveExplorer is a command line and GUI based application for reconstructing the folder structure of OneDrive from the <UserCid>.dat and <UserCid>.dat.previous file.
A forensic open-source parser module for Autopsy that allows extracting the messages, comments, posts, contacts, calendar entries and reactions from a Microsoft Teams IndexedDB LevelDB database.
Xst Reader is an open source viewer for Microsoft Outlook’s .ost and .pst files, written entirely in C#. To download an executable of the current version, go to the releases tab.
Web browser forensics for Google Chrome/Chromium
Exploits for the TryHackMe room hackerNote
Small utilities that are useful in advanced password cracking
Proof of Concept for CVE-2019-18634
A vulnerability scanner for container images and filesystems
This repository presents a proof-of-concept of CVE-2023-7028
"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Develo…