Starred repositories
🔪 Shorten links with Bitly in your terminal!
Six Degrees of Domain Admin
The SpotBugs plugin for security audits of Java web applications and Android applications. (Also work with Kotlin, Groovy and Scala projects)
Maven Mojo Plug-In to generate reports based on the SpotBugs Analyzer
This is an offensive guide to securing AWS infrastructures. The hope is that by knowing how to take advantage of various types of AWS weaknesses you will be verse enough to provide the correct coun…
Security Guide for Developers
Prevents you from committing secrets and credentials into git repositories
devsecops / git-secrets
Forked from awslabs/git-secretsPrevents you from committing secrets and credentials into git repositories
A open contribute bootcamp to develop DevSecOps skills...
Script samples from the book Pentesting Azure Applications (2018, No Starch Press)
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
This repository is maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), AI security,…
The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.
A curated list of awesome infosec courses and training resources.
A little tool to play with Windows security
A collection of scripts for assessing Microsoft Azure security
List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
A tool geared towards pentesting APIs using OpenAPI definitions.
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Beehive is an open-source vulnerability detection framework based on Beebeeto-framework. Security researcher can use it to find vulnerability, exploits, subsequent attacks, etc.
A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study material. Commands in 'Usefulcommands' Keepnote. Bookmarks and re…
🐶 A curated list of Web Security materials and resources.
Automated NoSQL database enumeration and web application exploitation tool.