to^ to016
Lists (7)
Sort Name ascending (A-Z)
Stars
Scan for secrets in dangling commits on GitHub using GH Archive data.
Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.
Trail of Bits Claude Code skills for security research, vulnerability detection, and audit workflows
A dev container for rapid prototyping of binary exploits.
Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist
GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic, interesting Subs) parameters grep
A ready to use JSONP endpoints/payloads to help bypass content security policy (CSP) of different websites.
ππ¦ Dalfox is a powerful open-source XSS scanner and utility focused on automation.
Deserialization payload generator for a variety of .NET formatters
An autonomous LLM-agent for large-scale, repository-level code auditing
Proxylogon & Proxyshell & Proxyoracle & Proxytoken & All exchange server history vulns summarization :)
Chrome browser extension-based Command & Control
share some useful archives about vm and qemu escape exploit.
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidel...
GitHub Actions Goat: Deliberately Vulnerable GitHub Actions CI/CD Environment
A repository for learning various heap exploitation techniques.
Course materials for Modern Binary Exploitation by RPISEC
Octoscan is a static vulnerability scanner for GitHub action workflows.
GitHub Attack Toolkit - Extreme Edition - A static analysis and exploit toolkit for GitHub Actions.
The fastest and complete solution for domain recognition. Supports screenshoting, port scan, HTTP check, data import from other tools, subdomain monitoring, alerts via Discord, Slack and Telegram, ...
Burp Plugin to Bypass WAFs through the insertion of Junk Data
Materials for the workshop "Red Team Ops: Havoc 101"
Find, verify, and analyze leaked credentials
A flexible tool for redirecting a given program's TCP traffic to SOCKS5 or HTTP proxy.