Highlights
π useful lists
Overview of alternative open source front-ends for popular internet platforms (e.g. YouTube, Twitter, etc.)
List of Github repositories and articles with list of dorks for different search engines
Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.
A repository of curated datasets from various attacks
Community guide to securing and improving privacy on macOS.
The OWASP Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes technical processes for verifying the OWAβ¦
OSX and iOS related security tools
A curated list of Awesome Threat Intelligence resources
A collection of smart contract vulnerabilities along with prevention methods
One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password π‘οΈ
Some setup scripts for security research tools.
Various Dockerfiles I use on the desktop and on servers.
Wiki to collect Red Team infrastructure hardening resources
Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss.
Leaked pentesting manuals given to Conti ransomware crooks
This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage cloud providers.
This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and how they can be mitigated or detected.
A curated list of annual cyber security reports




