Lists (32)
Sort Name ascending (A-Z)
ADVERSARY LANGUAGES
Alternative programming languages used by adversariesAI
APP
C2:Loaders
CHEAT SHEETS
COLLECTION
COMMAND & CONTROL
List of C2 projects we've used at least once during assumed breach, threat emulation, and purple team exercise work.CREDENTIAL ACCESS
CTI ANALYSIS
Tools for automating CTI analysisDEFENSE EVASION
DEVSEC OPS
All things DevSecOpsDISCOVERY
EXECUTION
EXFILTRATION
INITIAL ACCESS
LATERAL MOVEMENT
LEARNING
MacOS
MALDOC
MOBILE
OSINT
PERSISTENCE
PIPELINES
PRIVILEGE ESCALATION
RANSOMWARE SIM
RECON
REPORTING
SMART CONTRACT TOOLS
TOOLS
This list includes offensive operations tooling that includes many TTPsTTP
VULN ANALYSIS
WEB APPS
Open source web appsStars
Learn how to design large-scale systems. Prep for the system design interview. Includes Anki flashcards.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Interact with your documents using the power of GPT, 100% privately, no data leaks
🐸💬 - a deep learning toolkit for Text-to-Speech, battle-tested in research and production
🎨 Diagram as Code for prototyping cloud system architectures
Universal memory layer for AI Agents; Announcing OpenMemory MCP - local and secure memory management.
all of the workflows of n8n i could find (also from the site itself)
The lean application framework for Python. Build sophisticated user interfaces with a simple Python API. Run your apps in the terminal and a web browser.
Chat with your documents on your local device using GPT models. No data leaves your device and 100% private.
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
Build resilient language agents as graphs.
Typer, build great CLIs. Easy to code. Based on Python type hints.
Exploitation Framework for Embedded Devices
A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
Prowler is the Open Cloud Security platform for AWS, Azure, GCP, Kubernetes, M365 and more. It helps for continuous monitoring, security assessments & audits, incident response, compliance, hardeni…
Databricks’ Dolly, a large language model trained on the Databricks Machine Learning Platform
Fast subdomains enumeration tool for penetration testers
Open-source infrastructure for Computer-Use Agents. Sandboxes, SDKs, and benchmarks to train and evaluate AI agents that can control full desktops (macOS, Linux, Windows).
An open-source post-exploitation framework for students, researchers and developers.
A swiss army knife for pentesting networks
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
People tracker on the Internet: OSINT analysis and research tool by Jose Pino
A supercharged Git/GitHub command line interface (CLI). An official integration for GitHub and GitHub Enterprise: https://github.com/works-with/category/desktop-tools
Agent Reinforcement Trainer: train multi-step agents for real-world tasks using GRPO. Give your agents on-the-job training. Reinforcement learning for Qwen2.5, Qwen3, Llama, and more!
CLI tool to build, test, debug, and deploy Serverless applications using AWS SAM