Stars
A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.
Blockoli is a high-performance tool for code indexing, embedding generation and semantic search tool for use with LLMs.
Universal language-agnostic AST walking and accurate call stack generation with tree-sitter.
Offensive Software Exploitation Course
Now, the Host is Mine! - Super Fast Sub-domain Takeover Detection!
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
Vulnerable REST API with OWASP top 10 vulnerabilities for security testing
Pre-Built Vulnerable Environments Based on Docker-Compose
This repo contains some Amsi Bypass methods i found on different Blog Posts.
Vajra is a UI-based tool with multiple techniques for attacking and enumerating in the target's Azure and AWS environment. It features an intuitive web-based user interface built with the Python Fl…
🐛 A list of writeups from the Google VRP Bug Bounty program
A Course on Intermediate Level Linux Exploitation
A not so awesome list of malware gems for aspiring malware analysts
🛡️ Awesome Cloud Security Resources ⚔️
Cisco Anyconnect VPN unauth RCE (rwx stack)
How to call Windows DLL using LoadLibrary in Golang
vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.
Basics on commands/tools/info on how to assess the security of mobile applications
cryptozomebie lesson code
A collection of various awesome lists for hackers, pentesters and security researchers
Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practising GraphQL Security.
Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)