Gather and update all available and newest CVEs with their PoC.
-
Updated
Jun 2, 2024 - HTML
Gather and update all available and newest CVEs with their PoC.
The most exhaustive list of reliable DNS resolvers.
The Network Execution Tool
Demonized Shell is an Advanced Tool for persistence in linux.
Personal cybersecurity notes
It records your screenshots and code, then lets you upload to ASHIRT
Adversary Simulators High-Fidelity Intelligence and Reporting Toolkit
Asset inventory of over 800 public bug bounty programs.
Powerful+Fast Kubernetes service discovery tools via kubernetes DNS service. Currently supported service ip-port BruteForcing / AXFR Domain Transfer Dump / Coredns WildCard Dump
Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload creation using Metasploit. For use with Kali Linux.
Adversary Emulation Framework
The SpecterOps project management and reporting engine
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
This is a simple keylogger malware for educational purposes
Test & strengthen defenses against social attacks. Simulate phishing, vishing & more in a safe, ethical LAB.Test & strengthen defenses against social attacks. Simulate phishing, vishing & more in a safe, ethical LAB.
An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.
A custom SMTP Honeypot written in PHP, with focus on gathering intel on threat actors and for doing spam forensic work
Add a description, image, and links to the red-team topic page so that developers can more easily learn about it.
To associate your repository with the red-team topic, visit your repo's landing page and select "manage topics."