Stars
Language
Sort by: Recently starred
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
Zuul is a gateway service that provides dynamic routing, monitoring, resiliency, security, and more.
IAM Least Privilege Policy Generator
Free, libre, effective, and data-driven wordlists for all!
A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
Active Directory and Internal Pentest Cheatsheets
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
match command-line arguments to their help text
Powerline is a statusline plugin for vim, and provides statuslines and prompts for several other applications, including zsh, bash, tmux, IPython, Awesome and Qtile.
😎 Awesome lists about all kinds of interesting topics
Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories, installed services and each service binaries metadata, inst…
Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories, installed services, the registry and running drivers for th…
Customize your Bash Prompt by setting the PS1 variable.
Powerful yet simple to use screenshot software 🖥️ 📸
Simple animated GIF screen recorder with an easy to use interface
The SpecterOps project management and reporting engine
Protect and discover secrets using Gitleaks 🔑
A suite of WiFi/Bluetooth offensive and defensive tools for the ESP32
Flipper Zero WiFi Marauder companion app
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique present…
MouseJack device discovery and research tools
Guía definitiva para Windows Subsystem for Linux
Flipper Zero Unleashed Firmware
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
Various webshells. We accept pull requests for additions to this collection.