Stars
A curated list of GPT agents for cybersecurity
A CLI tool to convert your codebase into a single LLM prompt with source tree, prompt templating, and token counting.
AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,
Complete Practical Study Plan to become a successful cybersecurity engineer based on roles like Pentest, AppSec, Cloud Security, DevSecOps and so on...
IoT Digital Forensics Course with hands-on labs
SecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to create informational content in multiple formats and share with …
Repo deals with the Authenticated command Injection vulnerability found in The EAP350 Access Point devices
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.
A firewall reverse proxy for preventing Log4J (Log4Shell aka CVE-2021-44228) attacks.
A minimal and flexible blog generator based on GitHub Gist.
A API scanner written in GOLANG to scan files recursively and look for API keys and IDs.
My last 12 year's material collection on offensive & defensive security, GRC, risk management, technical security guidelines and much more.
A list of SaaS, PaaS and IaaS offerings that have free tiers of interest to devops and infradev
CTF challenges designed and implemented in machine learning applications
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Collection of methodology and test case for various web vulnerabilities.
A fast production-ready static web server with TLS (HTTPS), routing, hot reloading, caching, templating, and security in a single-binary you can set up with zero code.
Python library and CLI for the Bug Bounty Recon API
A fast tool to scan CRLF vulnerability written in Go
GoFingerprint is a Go tool for taking a list of target web servers and matching their HTTP responses against a user defined list of fingerprints.
GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic, interesting Subs) parameters grep
Secret and/or credential patterns used for gf.
A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
Master programming by recreating your favorite technologies from scratch.
Offensive Software Exploitation Course