💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
-
Updated
Jan 2, 2025 - Python
💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
All knowledge I gained from CTFs, real life penetration testing and learning by myself.
Penetration Testing AI Assistant based on open source LLMs.
OWASP LLM (Large Language Model) Top 10
ClatsCracker is a versatile Python password-cracking tool supporting over 15 hash algorithms. It offers dictionary or brute-force attacks, adjustable threads, salted hash verification, a user-friendly menu, and progress feedback—ensuring, efficient, ethical password testing. Released December 13, 2024 by Josh Clatney (Clats97)
Just like a ghost, Ghost_Dir is capable of detecting hidden subdirectories that other scanning tools may not be able to find. It acts silently, without leaving any traces, and is able to penetrate into obscure areas of the web page that usually go unnoticed.
Python tool for detecting subdomain takeover vulnerabilities by resolving CNAME records and checking for known error messages. It supports bulk domain scanning and logs detailed results for analysis.
Offensive Security Scripts (OSS) - Repository of random scripts I've written for offensive purposes.
This have 150+ books for start your career in the Penetration testing or cybersecurity
This repository is all about the POC and Tools that can be leveraged down for initial access in red teaming engagements.
🕒 This repository contains the core source code and configuration files for the website. Feel free to modify, extend, and contribute to its development to improve functionality, add new features, and ensure the ongoing success of the project.
THM DESCRIPTION: Get started with Cyber Security in 24 Days - Learn the basics by doing a new, beginner friendly security challenge every day leading up to Christmas.
Pages documenting my Pentesting journey.
LSASSExtractor is a lightweight tool designed to capture memory dumps of the LSASS process on Windows systems. By leveraging the Windows API, it locates the target process and creates a memory dump, which can be analyzed to extract sensitive information such as passwords, encryption keys, and authentication tokens.
My Private Website Pentesting Tool
Offensive Security Research, Corporate Espionage Investigation
Your Ultimate Companion for Security Testing and Vulnerability Tracking
A collection of awesome penetration testing and offensive cybersecurity resources.
A keylogger designed for stealthy keystroke capture & analysis.
Security notes
Add a description, image, and links to the penetrationtesting topic page so that developers can more easily learn about it.
To associate your repository with the penetrationtesting topic, visit your repo's landing page and select "manage topics."