Lists (32)
Sort Name ascending (A-Z)
ADVERSARY LANGUAGES
Alternative programming languages used by adversariesAI
APP
C2:Loaders
CHEAT SHEETS
COLLECTION
COMMAND & CONTROL
List of C2 projects we've used at least once during assumed breach, threat emulation, and purple team exercise work.CREDENTIAL ACCESS
CTI ANALYSIS
Tools for automating CTI analysisDEFENSE EVASION
DEVSEC OPS
All things DevSecOpsDISCOVERY
EXECUTION
EXFILTRATION
INITIAL ACCESS
LATERAL MOVEMENT
LEARNING
MacOS
MALDOC
MOBILE
OSINT
PERSISTENCE
PIPELINES
PRIVILEGE ESCALATION
RANSOMWARE SIM
RECON
REPORTING
SMART CONTRACT TOOLS
TOOLS
This list includes offensive operations tooling that includes many TTPsTTP
VULN ANALYSIS
WEB APPS
Open source web appsStars
Set up a modern web app by running one command.
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static a…
A curated list of awesome things related to shadcn/ui.
A javascript library to run SQLite on the web.
Community curated list of templates for the nuclei engine to find security vulnerabilities.
The Browser Exploitation Framework Project
a free and opensource app that lets you gain an unfair advantage
A collaborative, multi-platform, red teaming framework
The XSS Hunter service - a portable version of XSSHunter.com
Secure chat software for your computer.
📕 A minimal Markdown editor desktop app
KQL Queries. Microsoft Defender, Microsoft Sentinel
CA Optics - Azure AD Conditional Access Gap Analyzer
Collection of macOS persistence methods and miscellaneous tools in JXA
RedHerd is a collaborative and serverless framework for orchestrating a geographically distributed group of assets.