CyberSecurity
Remote operations commands implemented using Beacon Object Files
The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.
Situational Awareness commands implemented using Beacon Object Files
Hunt down social media accounts by username across social networks
Extract credentials from lsass remotely
Prowler is the world’s most widely used open-source cloud security platform that automates security and compliance across any cloud environment.
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.
PowerShell MachineAccountQuota and DNS exploit tools
Active Directory Control Paths auditing and graphing tools
Attack Graph Visualizer and Explorer (Active Directory) ...Who's *really* Domain Admin?
Create actionable data from your Vulnerability Scans
SharpDump is a C# port of PowerSploit's Out-Minidump.ps1 functionality.
InQL is a robust, open-source Burp Suite extension for advanced GraphQL testing, offering intuitive vulnerability detection, customizable scans, and seamless Burp integration.
a recon tool that finds sensitive data inside the screenshots uploaded to prnt.sc
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.
SIPVicious OSS is a VoIP security testing toolset. It helps security teams, QA and developers test SIP-based VoIP systems and applications. This toolset is useful in simulating VoIP hacking attacks…
This document describes common misconfigurations of F5 Networks BigIP systems.
Small and highly portable detection tests based on MITRE's ATT&CK.
Infection Monkey - An open-source adversary emulation platform
A Nmap XSL implementation with Bootstrap.




