-
Ringtail Interactive
Stars
Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)
Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab
This code review checklist helps you be a more effective and efficient code reviewer.
Modern C++ Programming Course (C++03/11/14/17/20/23/26)
Inspect a command's effects before modifying your live system
HeightMap terrain for Godot implemented in GDScript
A wordlist repository with human-curated and reviewed content.
A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for security professionals and CTF players.
Monitor linux processes without root permissions
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Automated All-in-One OS Command Injection Exploitation Tool.
An interactive web UI for gRPC, along the lines of postman
a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
A pentest reporting tool written in Python. Free yourself from Microsoft Word.
Arsenal is just a quick inventory and launcher for hacking programs
The ultimate WinRM shell for hacking/pentesting
BC-SECURITY / Empire
Forked from EmpireProject/EmpireEmpire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.
Wordlists for creating statistically likely username lists for use in password attacks and security testing
A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM.
This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public expl…
Abusing impersonation privileges through the "Printer Bug"
A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assignments.