0x1-project
Tuto
Access-point
Aircrack
Analyse
Analysis
Android
Angular
Anonymous
Anti-forensic
Api
Apk
Application-inspector
Arp
Attack
Attack-surface
Attack-vector
Attacker
Auth
Auto
Automate
Automation
Azure
Backconnect
Binary
Bind-shell
Blind-injection
Blind-xss
Block
Bluetooth
Book
Browser
Bugbounty
Burp
Burp-suite
Burpsuite
Bypass
C
C2
C3
Chat
Cloudsecurity
Cms
Cobaltstrike
Code-cource
Code-injection
Command-and-control
Command-generator
Computer-security
Container
Containers
Conti
Cplusplus
Crack
Cracking
Crawler
Crlf
Crypted
Csharp
Csrf
Css
Ctf
Cve
Cve2exploit
Dashboard
Decompiler
Defcon
Defence
Defense
Deobfuscator
Detection
Disassembler
Disk-cleanup
Dns
Dns-over-https
Dnscrypt
Docker
Domain
Dotnet
Elasticsearch
Electron
Email
Empire
Enumeration
Escalation
Ethical
Evenlog
Exfiltration
Exploit
Exploitation
Exploiting
Extension
Externalc2
Fakebin
Fakesu
Fakesudo
File-sharing
Firewall
Fluid
Follina
Forensic
Forensics
Framework
Fuzz
Go
Golang
Gps
Graphical
Gui
Guide
Hacking
Hacking-tools
Hackrf
Hashcat
Help
Hunter
Image
Information
Information gathering
Information-gathering
Injection
Intelligence
Interactsh
Interception
Intrusion
Iphone
Java
Javascript
Jsonp
K8s
Karma-attack
Kernel-mode
Keylogger
Kibana
Leak
Leaks
Learning
Lfi
Linux
List
Lists
Loader
Local
Logstash
Malware
Man-in-the-middle
Manuals
Mapping
Metasploit
Metasploit-framework
Meterpreter
Mitm
Mitmproxy
Modsecurity
Monitoring
Ncat
Neo4j
Network
Network-graph
Network-monitoring
Network-visualization
Networking
Nmap
Notetaking
Notion
Nsm
Obfuscation
Office
Open-source
Openvas
Optimize
Osint
Oswap
Outlook
Owasp
Password
Password-cracking
Payload
Payloads
Pcap
Pdf
Pe-files
Pentesting
Phishing
Phising
Phone
Phonenumber
Php
Plugin
Poc
Powershell
Privacy
Privilege-escalation
Pyshell
Python
Python3
Radare2
Rails
Rat
Rce
Rdp
Reaver
Recon
Reconnaissance
Reconnaissance-tools
Red-team
Red-teams
Reverse-engineering
Reverse-proxy
Reverse-shell
Rootkit
Ruby
Rust
Sandbox
Scanner
Scanners
Scanning
Sdr
Security
Security-audit
Security-automation
Security-scanner
Security-tools
Security-vulnerabilities
Security-vulnerability
Shadow
Shell
Shell-escape
Shellcode
Shellcodes
Shodan
Sim
Smartphones
Sniffer
Sniffing
Snort
Social-engineering
Software-characterization
Spring
Sql
Sqli
Ssh
Ssl
Ssrf
Ssti
Static-analysis
Stealer
Stub
Subdomain
Suricata
System-administration
Tactic
Technique
Threat-intelligence
Tls
Toolbox
Toolkit
Tor
Tor-onion-service
Traffic
Training
Traking
Tty
Twilio
Uac-bypass
Undetectable
Unpacker
Unserialize
Vb
Virtual machines
Voicemail
Voip
Vulnerability
Vulnerability-detection
Vulnerability-scanners
Vulnerable
Waf
Web
Web-attacks
Web-fuzzer
Webapi
Webshell
Wifi
Windows
Windows-10
Windows-tweaks
Wireless
Wireshark
Wpa2-handshake
X64dbg
Xsrf
Xss
Xssi
Xxe
Zeek
Zipcracker
Dnscrypt Proxy Gui
Security
WiFi-Pumpkin
Network
FeedingBottle
Network
ACT | Semi-Automated Cyber Threat Intelligence
Security
AIL Framework
Reconnaissance-Tools
Binary Ninja 3.0
Reverse-Engineering
BruteShark - Network Analysis Tool
Network
NetCap
Network
ngrev
Reverse-Engineering
Deobfuscated BurpSuite Pro 2.1
Reverse-Engineering
Redress - A tool for analyzing stripped binaries
Reverse-Engineering
PA-Toolkit | Pentester Academy Wireshark Toolkit
Network
VoIPShark
Network
Ghidra Software Reverse Engineering Framework
Reverse-Engineering
Malware Analysis Tools List
Security
Cutter - Radare2 Gui
Reverse-Engineering
DroidDetective analysing Android applications
Phone
Obfuscapk
Phone
Andriller
Phone
SimJacker
Phone
email2phonenumber
Phone
StaCoAn
Phone
VoiceMailAutomator
Phone
Android Security List
Phone
ngrev
Reverse-Engineering
Dnscrypt Proxy Gui
Security
Ricochet
Security
Metasploit Pro
Pentesting
VAmPI - The Vulnerable API
Web-Security
NotionTerm - Embed reverse shell in Notion pages
Exploitation-Tools
MitmProxy2Swagger - Automagically reverse-engineer REST API
Reverse-Engineering
OffensiveNotion C2
Exploitation-Tools
DroidDetective analysing Android applications
Phone
ApplicationInspector
Security
PA-Toolkit | Pentester Academy Wireshark Toolkit
Network
Puwr - SSH attack surface on local network
Network
XSS Attack
Web-Security
Singularity of Origin
Web-Security
Atomic Red Team
Pentesting
AutoRDPwn
Exploitation-Tools
o365-attack-toolkit
Exploitation-Tools
Active Directory Kill Chain Attack and Defense
Pentesting
Puwr - SSH attack surface on local network
Network
Sub3suite - Subdomain Enumeration Suite
Reconnaissance-Tools
CSS Exfil Protection
Web-Security
BotenaGo Malware Targets Millions of IoT Devices
Exploit
AutoPWN Suite - Scanning vulnerabilities and exploiting systems automatically
Exploitation-Tools
lsassy
Reconnaissance-Tools
AttackSurfaceMapper
Reconnaissance-Tools
ACT | Semi-Automated Cyber Threat Intelligence
Security
Jok3r v3
Web-Security
Infection Monkey
Pentesting
CobaltBus | Cobalt Strike C2 traffic via Azure Servicebus
Exploitation-Tools
Postshell
Web-Security
PwnKit-Exploit
Exploit
GTFOBins - Search for Unix binaries
Exploit
PwnKit-Exploit
Exploit
GTFOBins - Search for Unix binaries
Exploit
Tplmap
Web-Security
Server Side Template Injection
Web-Security
ezXSS
Web-Security
Femida-xss
Web-Security
B-XSSRF
Web-Security
Block Alert XSS
Web-Security
Sparrow Wifi
Network
Agile Web Development with Rails 5.1
Development
Beginning C++ 17
Development
HackBar V2
Web-Security
Beginning C++ 17
Development
dns-prefetch
Development
OpenC2
Exploitation-Tools
Malicious PDF Generator ☠️
Pentesting
Malicious PDF Generator ☠️
Pentesting
Femida-xss
Web-Security
MITM Intercept
Network
Deobfuscated BurpSuite Pro 2.1
Reverse-Engineering
HTTP Request Smuggler
Web-Security
PwnKit-Exploit
Exploit
GTFOBins - Search for Unix binaries
Exploit
baby pwn 2018 CTF
Exploit
Postshell
Web-Security
CobaltBus | Cobalt Strike C2 traffic via Azure Servicebus
Exploitation-Tools
OffensiveNotion C2
Exploitation-Tools
Faction C2 Framework
Exploitation-Tools
Sliver
Exploitation-Tools
FudgeC2
Exploitation-Tools
C3 Custom Command and Control
Exploitation-Tools
Telegram Csharp C2
Exploitation-Tools
GhostTunnel
Exploitation-Tools
goDoH
Exploitation-Tools
Covenant
Exploitation-Tools
OpenC2
Exploitation-Tools
Koadic C3
Exploitation-Tools
Ricochet
Security
ThreatMapper
Security
Log4shell | CVE-2021-44228
Exploit
DotCMS Remote Code Execution | CVE-2022-26352
Exploit
CMS Scan
Web-Security
Cobalt Strike MANUALS_V2 Active Directory
Pentesting
CobaltBus | Cobalt Strike C2 traffic via Azure Servicebus
Exploitation-Tools
Phant0m | Windows Event Log Killer
Exploitation-Tools
iBoot IOS 9.3 Leaked
Phone
Tplmap
Web-Security
Faction C2 Framework
Exploitation-Tools
Sliver
Exploitation-Tools
FudgeC2
Exploitation-Tools
C3 Custom Command and Control
Exploitation-Tools
Telegram Csharp C2
Exploitation-Tools
GhostTunnel
Exploitation-Tools
goDoH
Exploitation-Tools
Koadic C3
Exploitation-Tools
Covenant
Exploitation-Tools
OpenC2
Exploitation-Tools
Metasploit Pro
Pentesting
k0otkit - Manipulate K8s in a K8s way
Pentesting
Trivy
Security
Cobalt Strike MANUALS_V2 Active Directory
Pentesting
Beginning C++ 17
Development
bkcrack - crack legacy zip
Reverse-Engineering
VoiceMailAutomator
Phone
XSRFProbe
Web-Security
CRLFsuite - Fast CRLF injection scanning tool
Web-Security
Shhhloader | Shellcode Loader
Exploitation-Tools
Defcon27 Csharp Workshop
Pentesting
Telegram Csharp C2
Exploitation-Tools
XSRFProbe
Web-Security
CSS Exfil Protection
Web-Security
Linux Smart Enumeration
Exploitation-Tools
DotCMS Remote Code Execution | CVE-2022-26352
Exploit
SpringBoot RCE | CVE-2022-22963
Exploit
Dirty Pipe - Linux Local Privilege Escalation
Exploit
Xerror
Pentesting
Misp Dashboard
Reconnaissance-Tools
Binary Ninja 3.0
Reverse-Engineering
Defcon27 Csharp Workshop
Pentesting
XSS Attack
Web-Security
Active Directory Kill Chain Attack and Defense
Pentesting
NETReactorSlayer - Deobfuscator for Eziriz .NET Reactor
Reverse-Engineering
Security Onion Linux distro for intrusion detection
Security
ApplicationInspector
Security
NetCap
Network
Binary Ninja 3.0
Reverse-Engineering
Bypassing UAC on Windows 10 using Disk Cleanup
Exploit
Faction C2 Framework
Exploitation-Tools
Sliver
Exploitation-Tools
Singularity of Origin
Web-Security
goDoH
Exploitation-Tools
PA-Toolkit | Pentester Academy Wireshark Toolkit
Network
Covenant
Exploitation-Tools
goDoH
Exploitation-Tools
Dnscrypt Proxy Gui
Security
S1EM
Security
Trivy
Security
dns-prefetch
Development
NETReactorSlayer - Deobfuscator for Eziriz .NET Reactor
Reverse-Engineering
SILENTTRINITY
Exploitation-Tools
S1EM
Security
Kage
Exploitation-Tools
email2phonenumber
Phone
DeathStar
Exploitation-Tools
The TIDoS Framework
Web-Security
Dirty Pipe - Linux Local Privilege Escalation
Exploit
Auto-Elevate
Exploit
The Ultimate Guide to Ethical Hacking
Security
Phant0m | Windows Event Log Killer
Exploitation-Tools
PwnKit-Exploit
Exploit
GTFOBins - Search for Unix binaries
Exploit
Metasploit Pro
Pentesting
OWASP ZSC Tool
Exploit
AutoPWN Suite - Scanning vulnerabilities and exploiting systems automatically
Exploitation-Tools
HTTP Request Smuggler
Web-Security
TAS
Exploitation-Tools
TAS
Exploitation-Tools
TAS
Exploitation-Tools
Stegify
Security
OnionShare
Security
OWASP Coraza Web Application Firewall v2
Web-Security
Inflator
Network
FeedingBottle
Network
Microsoft Office RCE Vulnerability aka Follina - CVE-2022-30190
Exploit
BruteShark - Network Analysis Tool
Network
Andriller
Phone
PacketStreamer - Tcpdump for cloud native environments
Network
Deobfuscated BurpSuite Pro 2.1
Reverse-Engineering
Redress - A tool for analyzing stripped binaries
Reverse-Engineering
PyREBox
Reverse-Engineering
Ghidra Software Reverse Engineering Framework
Reverse-Engineering
Cutter - Radare2 Gui
Reverse-Engineering
Cracking HawkEye Keylogger Reborn
Reverse-Engineering
Ehtools
Network
AIL Framework
Reconnaissance-Tools
Pown Recon
Reconnaissance-Tools
Web Attack Payloads Wordlist
Web-Security
Wfuzz - The Web fuzzer
Web-Security
BotenaGo Malware Targets Millions of IoT Devices
Exploit
OWASP Coraza Web Application Firewall v2
Web-Security
Trivy
Security
XRay
Network
Sliver
Exploitation-Tools
Stegify
Security
Singularity of Origin
Web-Security
Redress - A tool for analyzing stripped binaries
Reverse-Engineering
Vuls | VULnerability Scanner
Web-Security
goDoH
Exploitation-Tools
Sparrow Wifi
Network
x64dbg Plugin Manager
Reverse-Engineering
ngrev
Reverse-Engineering
Sub3suite - Subdomain Enumeration Suite
Reconnaissance-Tools
Kage
Exploitation-Tools
Inflator
Network
FeedingBottle
Network
Dnscrypt Proxy Gui
Security
The Ultimate Guide to Ethical Hacking
Security
Postenum
Exploitation-Tools
The Ultimate Guide to Ethical Hacking
Security
Mip22 - Advanced Phishing Tool
Reconnaissance-Tools
Nivistealer
Reconnaissance-Tools
Sparrow Wifi
Network
Hashview
Pentesting
Linux Privilege Escalation
Exploit
Windows Privilege Escalation
Exploit
Tyton: Kernel-Rootkit
Exploitation-Tools
Pixload
Web-Security
o365-attack-toolkit
Exploitation-Tools
Pown Recon
Reconnaissance-Tools
ACT | Semi-Automated Cyber Threat Intelligence
Security
AIL Framework
Reconnaissance-Tools
Osmedeus
Web-Security
RedELK
Reconnaissance-Tools
BloodHound
Exploitation-Tools
CRLFsuite - Fast CRLF injection scanning tool
Web-Security
XRay
Network
Malicious PDF Generator ☠️
Pentesting
MITM Intercept
Network
NetCap
Network
email2phonenumber
Phone
StaCoAn
Phone
VoiceMailAutomator
Phone
iBoot IOS 9.3 Leaked
Phone
DotCMS Remote Code Execution | CVE-2022-26352
Exploit
SpringBoot RCE | CVE-2022-22963
Exploit
JSONBee
Web-Security
k0otkit - Manipulate K8s in a K8s way
Pentesting
SKA - Simple Karma Attack
Network
Tyton: Kernel-Rootkit
Exploitation-Tools
TAS
Exploitation-Tools
S1EM
Security
Cobalt Strike MANUALS_V2 Active Directory
Pentesting
iBoot IOS 9.3 Leaked
Phone
ACT | Semi-Automated Cyber Threat Intelligence
Security
AIL Framework
Reconnaissance-Tools
HaccTheHub
Security
HackBar V2
Web-Security
Security Onion Linux distro for intrusion detection
Security
PwnKit-Exploit
Exploit
GTFOBins - Search for Unix binaries
Exploit
SUID3NUM
Exploitation-Tools
Postenum
Exploitation-Tools
Linux Privilege Escalation
Exploit
Windows Privilege Escalation
Exploit
0xsp Mongoose
Exploitation-Tools
Web Attack Payloads Wordlist
Web-Security
Android Security List
Phone
Red Teaming/Adversary Simulation Toolkit
Pentesting
Active Directory Kill Chain Attack and Defense
Pentesting
Malware Analysis Tools List
Security
Shhhloader | Shellcode Loader
Exploitation-Tools
Puwr - SSH attack surface on local network
Network
S1EM
Security
BotenaGo Malware Targets Millions of IoT Devices
Exploit
Malware Analysis Tools List
Security
WiFi-Pumpkin
Network
Cobalt Strike MANUALS_V2 Active Directory
Pentesting
XRay
Network
Xerror
Pentesting
Kage
Exploitation-Tools
Xerror
Pentesting
MITM Intercept
Network
MitmProxy2Swagger - Automagically reverse-engineer REST API
Reverse-Engineering
Xepor - web routing framework for reverse engineers and security researchers
Reverse-Engineering
SKA - Simple Karma Attack
Network
WiFi-Pumpkin
Network
Modlishka: Reverse-Proxy
Pentesting
MitmProxy2Swagger - Automagically reverse-engineer REST API
Reverse-Engineering
Xepor - web routing framework for reverse engineers and security researchers
Reverse-Engineering
Wfuzz - The Web fuzzer
Web-Security
OWASP Coraza Web Application Firewall v2
Web-Security
Security Onion Linux distro for intrusion detection
Security
NetCap
Network
Revshellgen
Web-Security
LetsMapYourNetwork
Network
BruteShark - Network Analysis Tool
Network
NetCap
Network
Jok3r v3
Web-Security
LetsMapYourNetwork
Network
Malcolm Network Traffic Analysis Tool
Network
The Zeek Network Security Monitor
Network
ThreatMapper
Security
Log4shell | CVE-2021-44228
Exploit
FeedingBottle
Network
LetsMapYourNetwork
Network
OffensiveNotion C2
Exploitation-Tools
NotionTerm - Embed reverse shell in Notion pages
Exploitation-Tools
Malcolm Network Traffic Analysis Tool
Network
The Zeek Network Security Monitor
Network
Obfuscapk
Phone
Microsoft Office RCE Vulnerability aka Follina - CVE-2022-30190
Exploit
Metasploit Pro
Pentesting
Stegify
Security
WiFi-Pumpkin
Network
OnionShare
Security
Infection Monkey
Pentesting
Inflator
Network
FeedingBottle
Network
Xerror
Pentesting
The finest Windows Optimizer
Security
Sub3suite - Subdomain Enumeration Suite
Reconnaissance-Tools
OWASP Coraza Web Application Firewall v2
Web-Security
VAmPI - The Vulnerable API
Web-Security
bkcrack - crack legacy zip
Reverse-Engineering
Hashview
Pentesting
OWASP ZSC Tool
Exploit
Pixload
Web-Security
Weaponised XSS Payloads
Web-Security
XSpear
Web-Security
Winpayloads
Exploitation-Tools
PyFuscation
Exploitation-Tools
SQLi Auth Bypass payloads
Web-Security
Metasploit Pro
Pentesting
Donut
Exploitation-Tools
Defcon27 Csharp Workshop
Pentesting
PacketStreamer - Tcpdump for cloud native environments
Network
Malcolm Network Traffic Analysis Tool
Network
The Zeek Network Security Monitor
Network
Malicious PDF Generator ☠️
Pentesting
Donut
Exploitation-Tools
AutoPWN Suite - Scanning vulnerabilities and exploiting systems automatically
Exploitation-Tools
HaccTheHub
Security
LKWA
Web-Security
AppSpider
Web-Security
Server Side Template Injection
Web-Security
ezXSS
Web-Security
AutoRDPwn
Exploitation-Tools
Android Security List
Phone
Red Teaming/Adversary Simulation Toolkit
Pentesting
Mip22 - Advanced Phishing Tool
Reconnaissance-Tools
Nivistealer
Reconnaissance-Tools
o365-attack-toolkit
Exploitation-Tools
Modlishka: Reverse-Proxy
Pentesting
Trape
Pentesting
Obfuscapk
Phone
SimJacker
Phone
email2phonenumber
Phone
Server Side Template Injection
Web-Security
ezXSS
Web-Security
PHPGGC
Web-Security
x64dbg Plugin Manager
Reverse-Engineering
Microsoft Office RCE Vulnerability aka Follina - CVE-2022-30190
Exploit
BotenaGo Malware Targets Millions of IoT Devices
Exploit
DotCMS Remote Code Execution | CVE-2022-26352
Exploit
SpringBoot RCE | CVE-2022-22963
Exploit
Phant0m | Windows Event Log Killer
Exploitation-Tools
PyShell
Web-Security
FudgeC2
Exploitation-Tools
AutoRDPwn
Exploitation-Tools
PyFuscation
Exploitation-Tools
DeathStar
Exploitation-Tools
The finest Windows Optimizer
Security
SUID3NUM
Exploitation-Tools
Postenum
Exploitation-Tools
UAC Bypass in Windows 10 Store Binary
Exploit
Bypassing UAC using App Paths
Exploit
Another sdclt UAC bypass
Exploit
Linux Privilege Escalation
Exploit
Windows Privilege Escalation
Exploit
0xsp Mongoose
Exploitation-Tools
PyShell
Web-Security
Tornado | anonymously reverse shell
Exploitation-Tools
DroidDetective analysing Android applications
Phone
Xepor - web routing framework for reverse engineers and security researchers
Reverse-Engineering
PyShell
Web-Security
Xerror
Pentesting
SUID3NUM
Exploitation-Tools
Stegify
Security
Winpayloads
Exploitation-Tools
PyREBox
Reverse-Engineering
WiFi-Pumpkin
Network
OnionShare
Security
PyFuscation
Exploitation-Tools
CMS Scan
Web-Security
DeathStar
Exploitation-Tools
Traxss
Web-Security
FudgeC2
Exploitation-Tools
SILENTTRINITY
Exploitation-Tools
Koadic C3
Exploitation-Tools
Ghidra Software Reverse Engineering Framework
Reverse-Engineering
Cutter - Radare2 Gui
Reverse-Engineering
Cracking HawkEye Keylogger Reborn
Reverse-Engineering
Agile Web Development with Rails 5.1
Development
Kage
Exploitation-Tools
Microsoft Office RCE Vulnerability aka Follina - CVE-2022-30190
Exploit
DotCMS Remote Code Execution | CVE-2022-26352
Exploit
SpringBoot RCE | CVE-2022-22963
Exploit
Dirty Pipe - Linux Local Privilege Escalation
Exploit
LKWA
Web-Security
AppSpider
Web-Security
AutoRDPwn
Exploitation-Tools
Inflator
Network
Sub3suite - Subdomain Enumeration Suite
Reconnaissance-Tools
lsassy
Reconnaissance-Tools
AttackSurfaceMapper
Reconnaissance-Tools
Kamerka GUI
Reconnaissance-Tools
The TIDoS Framework
Web-Security
Osmedeus
Web-Security
Pown Recon
Reconnaissance-Tools
RedELK
Reconnaissance-Tools
BloodHound
Exploitation-Tools
lsassy
Reconnaissance-Tools
AttackSurfaceMapper
Reconnaissance-Tools
Kamerka GUI
Reconnaissance-Tools
AutoRDPwn
Exploitation-Tools
Telegram Csharp C2
Exploitation-Tools
GhostTunnel
Exploitation-Tools
SILENTTRINITY
Exploitation-Tools
Koadic C3
Exploitation-Tools
StaCoAn
Phone
Modlishka: Reverse-Proxy
Pentesting
NotionTerm - Embed reverse shell in Notion pages
Exploitation-Tools
k0otkit - Manipulate K8s in a K8s way
Pentesting
Tornado | anonymously reverse shell
Exploitation-Tools
PwnKit-Exploit
Exploit
GTFOBins - Search for Unix binaries
Exploit
Postshell
Web-Security
Revshellgen
Web-Security
Tyton: Kernel-Rootkit
Exploitation-Tools
Agile Web Development with Rails 5.1
Development
OffensiveNotion C2
Exploitation-Tools
PyREBox
Reverse-Engineering
AutoPWN Suite - Scanning vulnerabilities and exploiting systems automatically
Exploitation-Tools
LKWA
Web-Security
AppSpider
Web-Security
Trivy
Security
CRLFsuite - Fast CRLF injection scanning tool
Web-Security
Vuls | VULnerability Scanner
Web-Security
B-XSSRF
Web-Security
Osmedeus
Web-Security
BloodHound
Exploitation-Tools
Sparrow Wifi
Network
PacketStreamer - Tcpdump for cloud native environments
Network
Xepor - web routing framework for reverse engineers and security researchers
Reverse-Engineering
Malcolm Network Traffic Analysis Tool
Network
S1EM
Security
The Zeek Network Security Monitor
Network
HaccTheHub
Security
NetCap
Network
Traxss
Web-Security
XSS Attack
Web-Security
Block Alert XSS
Web-Security
Revshellgen
Web-Security
Android Security List
Phone
Vuls | VULnerability Scanner
Web-Security
0xsp Mongoose
Exploitation-Tools
Infection Monkey
Pentesting
ApplicationInspector
Security
Dirty Pipe - Linux Local Privilege Escalation
Exploit
Auto-Elevate
Exploit
Security Onion Linux distro for intrusion detection
Security
HaccTheHub
Security
ThreatMapper
Security
Log4shell | CVE-2021-44228
Exploit
ApplicationInspector
Security
Trivy
Security
Infection Monkey
Pentesting
Metasploit Pro
Pentesting
ThreatMapper
Security
Log4shell | CVE-2021-44228
Exploit
AutoRDPwn
Exploitation-Tools
Revshellgen
Web-Security
Postenum
Exploitation-Tools
Shhhloader | Shellcode Loader
Exploitation-Tools
Metasploit Pro
Pentesting
Donut
Exploitation-Tools
OWASP ZSC Tool
Exploit
lsassy
Reconnaissance-Tools
AttackSurfaceMapper
Reconnaissance-Tools
Kamerka GUI
Reconnaissance-Tools
XRay
Network
SimJacker
Phone
Andriller
Phone
PacketStreamer - Tcpdump for cloud native environments
Network
WiFi-Pumpkin
Network
PacketStreamer - Tcpdump for cloud native environments
Network
Trape
Pentesting
ApplicationInspector
Security
SpringBoot RCE | CVE-2022-22963
Exploit
LKWA
Web-Security
AppSpider
Web-Security
HackBar V2
Web-Security
Puwr - SSH attack surface on local network
Network
MITM Intercept
Network
B-XSSRF
Web-Security
Tplmap
Web-Security
ApplicationInspector
Security
Nivistealer
Reconnaissance-Tools
Shhhloader | Shellcode Loader
Exploitation-Tools
Osmedeus
Web-Security
BloodHound
Exploitation-Tools
PacketStreamer - Tcpdump for cloud native environments
Network
RedELK
Reconnaissance-Tools
Atomic Red Team
Pentesting
Atomic Red Team
Pentesting
Misp Dashboard
Reconnaissance-Tools
MITM Intercept
Network
Jok3r v3
Web-Security
B-XSSRF
Web-Security
0xsp Mongoose
Exploitation-Tools
PA-Toolkit | Pentester Academy Wireshark Toolkit
Network
Tornado | anonymously reverse shell
Exploitation-Tools
OnionShare
Security
Ricochet
Security
Stegify
Security
OnionShare
Security
NetCap
Network
HaccTheHub
Security
Trape
Pentesting
TAS
Exploitation-Tools
VoiceMailAutomator
Phone
Auto-Elevate
Exploit
UAC Bypass in Windows 10 Store Binary
Exploit
Bypassing UAC using App Paths
Exploit
Another sdclt UAC bypass
Exploit
Bypassing UAC on Windows 10 using Disk Cleanup
Exploit
Tornado | anonymously reverse shell
Exploitation-Tools
Winpayloads
Exploitation-Tools
NETReactorSlayer - Deobfuscator for Eziriz .NET Reactor
Reverse-Engineering
PHPGGC
Web-Security
Faction C2 Framework
Exploitation-Tools
Covenant
Exploitation-Tools
Windows and Office ISO Download
Security
VoiceMailAutomator
Phone
VoIPShark
Network
SimJacker
Phone
Singularity of Origin
Web-Security
baby pwn 2018 CTF
Exploit
Auto-Elevate
Exploit
Security Onion Linux distro for intrusion detection
Security
ThreatMapper
Security
Log4shell | CVE-2021-44228
Exploit
The TIDoS Framework
Web-Security
Vuls | VULnerability Scanner
Web-Security
Jok3r v3
Web-Security
VAmPI - The Vulnerable API
Web-Security
OWASP Coraza Web Application Firewall v2
Web-Security
Web Attack Payloads Wordlist
Web-Security
Wfuzz - The Web fuzzer
Web-Security
dns-prefetch
Development
CMS Scan
Web-Security
Pixload
Web-Security
Weaponised XSS Payloads
Web-Security
XSpear
Web-Security
The TIDoS Framework
Web-Security
0xsp Mongoose
Exploitation-Tools
NotionTerm - Embed reverse shell in Notion pages
Exploitation-Tools
PyShell
Web-Security
BruteShark - Network Analysis Tool
Network
Sparrow Wifi
Network
SKA - Simple Karma Attack
Network
Ehtools
Network
WiFi-Pumpkin
Network
Inflator
Network
FeedingBottle
Network
The finest Windows Optimizer
Security
Microsoft Office RCE Vulnerability aka Follina - CVE-2022-30190
Exploit
Auto-Elevate
Exploit
Phant0m | Windows Event Log Killer
Exploitation-Tools
Winpayloads
Exploitation-Tools
0xsp Mongoose
Exploitation-Tools
AutoRDPwn
Exploitation-Tools
o365-attack-toolkit
Exploitation-Tools
PyFuscation
Exploitation-Tools
UAC Bypass in Windows 10 Store Binary
Exploit
Bypassing UAC using App Paths
Exploit
Another sdclt UAC bypass
Exploit
Bypassing UAC on Windows 10 using Disk Cleanup
Exploit
The finest Windows Optimizer
Security
WiFi-Pumpkin
Network
PA-Toolkit | Pentester Academy Wireshark Toolkit
Network
VoIPShark
Network
Ehtools
Network
x64dbg Plugin Manager
Reverse-Engineering
XSRFProbe
Web-Security
AppSpider
Web-Security
Server Side Template Injection
Web-Security
HackBar V2
Web-Security
ezXSS
Web-Security
Traxss
Web-Security
CSS Exfil Protection
Web-Security
XSS Attack
Web-Security
Weaponised XSS Payloads
Web-Security
Block Alert XSS
Web-Security
XSpear
Web-Security
LKWA
Web-Security
B-XSSRF
Web-Security
PacketStreamer - Tcpdump for cloud native environments
Network
bkcrack - crack legacy zip
Reverse-Engineering