- Netherlands
Hacking
The labs for my Udemy course (https://www.udemy.com/course/intro-to-bug-bounty-by-nahamsec)
30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, mssql, mysql, ntp, oracle, pjl, pop3, postgres, rdp, redis, si…
Fetch all the URLs that the Wayback Machine knows about for a domain
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
Leverages publicly available datasets from Google BigQuery to generate content discovery and subdomain wordlists
Generates permutations, alterations and mutations of subdomains and then resolves them
EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.
A security tool for grabbing screenshots of many web hosts
Find interesting Amazon S3 Buckets by watching certificate transparency logs.
Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.
Reconnaissance tool for GitHub organizations
Find, verify, and analyze leaked credentials
Official module repository for the Recon-ng Framework.
Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabling collaboration to tackle trending vulnerabilities on the …
IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly found vulnerabilities in IoT devices.
Automated Penetration Testing Agentic Framework Powered by Large Language Models
An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.
Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss.
This repository is a collection of powershell functions every hacker should know
A pure-python win32 debugger interface I wrote but no longer maintain.
Retired beginner/intermediate malware analysis training materials from @pedramamini and @erocarrera.