🔮 Future ideas
C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Interact with your documents using the power of GPT, 100% privately, no data leaks
Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code with KICS by Checkmarx.
A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑
🌀 Browse the whole web from a web page. Remote browser isolation. For compliance, integration, security, privacy and more! By https://dosyago.com
This is Advance Phishing Tool ! OTP PHISHING
OpenVPN road warrior installer for Ubuntu, Debian, AlmaLinux, Rocky Linux, CentOS and Fedora
BadZure orchestrates the setup of Azure AD tenants, populating them with diverse entities while also introducing common security misconfigurations to create vulnerable tenants with multiple attack …
it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web page
This is a step-by-step guide to implementing a DevSecOps program for any size organization
An OSINT tool that helps detect members of a company with leaked credentials
PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is a useful tool for performing penetration tests of applicatio…
Cameradar hacks its way into RTSP videosurveillance cameras