Asset inventory of over 800 public bug bounty programs.
-
Updated
Jun 1, 2024 - Shell
Asset inventory of over 800 public bug bounty programs.
The most exhaustive list of reliable DNS resolvers.
Gather and update all available and newest CVEs with their PoC.
Personal cybersecurity notes
Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload creation using Metasploit. For use with Kali Linux.
Adversary Emulation Framework
The SpecterOps project management and reporting engine
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
This is a simple keylogger malware for educational purposes
Test & strengthen defenses against social attacks. Simulate phishing, vishing & more in a safe, ethical LAB.Test & strengthen defenses against social attacks. Simulate phishing, vishing & more in a safe, ethical LAB.
The Network Execution Tool
An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.
A custom SMTP Honeypot written in PHP, with focus on gathering intel on threat actors and for doing spam forensic work
Monitoring the Cloud Landscape
Adversary Simulators High-Fidelity Intelligence and Reporting Toolkit
Automated Adversary Emulation Platform
Fast multithreaded multiplatform password spraying tool designed for easy use. Supports webhooks, jitter, delay, files, rotation, backend database
Information Security, Risk mgmt. and Forensics.
Kubernetes Attack Graph
Beacon Object File (BOF) launcher - library for executing BOF files in C/C++/Zig applications
Add a description, image, and links to the red-team topic page so that developers can more easily learn about it.
To associate your repository with the red-team topic, visit your repo's landing page and select "manage topics."