💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
翻译 - 生成一堆带有回拨功能的恶意 pdf 文件。可以与 Burp Collaborator 一起使用
All knowledge I gained from CTFs, real life penetration testing and learning by myself.
ClatsCracker is a versatile Python password-cracking tool supporting over 15 hash algorithms. It offers dictionary or brute-force attacks, adjustable threads, salted hash verification, a user-friendly...
Penetration Testing AI Assistant based on open source LLMs.
A guide to using Kali Linux tools for web penetration testing, ethical hacking, forensics, and bug bounty. Covers setup, key tools, methodologies, and best practices. Optimized for security profession...
Just like a ghost, Ghost_Dir is capable of detecting hidden subdirectories that other scanning tools may not be able to find. It acts silently, without leaving any traces, and is able to penetrate int...
Python tool for detecting subdomain takeover vulnerabilities by resolving CNAME records and checking for known error messages. It supports bulk domain scanning and logs detailed results for analysis.
Offensive Security Scripts (OSS) - Repository of random scripts I've written for offensive purposes.
This have 150+ books for start your career in the Penetration testing or cybersecurity
This repository is all about the POC and Tools that can be leveraged down for initial access in red teaming engagements.
🕒 This repository contains the core source code and configuration files for the website. Feel free to modify, extend, and contribute to its development to improve functionality, add new features, and...
THM DESCRIPTION: Get started with Cyber Security in 24 Days - Learn the basics by doing a new, beginner friendly security challenge every day leading up to Christmas.
All-in-One Master ASN Processing with 0x ASN Processor | CIDR, DNS, IP & Port Scanning Made Easy!
Pages documenting my Pentesting journey.
LSASSExtractor is a lightweight tool designed to capture memory dumps of the LSASS process on Windows systems. By leveraging the Windows API, it locates the target process and creates a memory dump, w...
Your Ultimate Companion for Security Testing and Vulnerability Tracking
Offensive Security Research, Corporate Espionage Investigation
My Private Website Pentesting Tool
A keylogger designed for stealthy keystroke capture & analysis.