Stars
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
Microsoft Entra ID Security Assessment Tool
An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.
This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".
This application represents the data of COVID-19 pandemic of all the countries in the world. It is built with React Hooks, Material UI and Chart.JS.
A best practices guide for day 2 operations, including operational excellence, security, reliability, performance efficiency, and cost optimization.
Firefox webInjector capable of injecting codes into webpages using a mitmproxy.
Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users
Top disclosed reports from HackerOne
Analyzes CloudTrail data of a given AWS account and generates a summary of recently active IAM principals, API calls they made, as well as regions, IP addresses and user agents they used.
MAAD Attack Framework - An attack tool for simple, fast & effective security testing of M365 & Entra ID (Azure AD).
Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.
A GPT-empowered penetration testing tool
ChatGPT Prompts for Bug Bounty & Pentesting
"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
alaanasser00 / reconftw
Forked from six2dez/reconftwreconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
A tool to assess the compliance of a VMware vSphere environment against the CIS Benchmark.
RedEye is a visual analytic tool supporting Red & Blue Team operations
Sample pentest report provided by TCM Security
Focalboard is an open source, self-hosted alternative to Trello, Notion, and Asana.
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flow…
A daily updated summary of the most frequent types of security advisories currently being reported from different sources.