🎯
Focusing
Pinned Loading
-
Pentesting-Methodology
Pentesting-Methodology PublicWhen it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to help while on a Pentest/CTF.
-
Cloud-Anomaly-Detection-Platform-
Cloud-Anomaly-Detection-Platform- PublicA cloud-based security analytics platform that ingests process creation logs, applies machine learning-based anomaly detection, and provides a web dashboard with AI-assisted investigation tools. Bu…
Python 1
-
-
SharpCollection
SharpCollection PublicForked from Flangvik/SharpCollection
Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure DevOps release pipelines.
-
Something went wrong, please refresh the page to try again.
If the problem persists, check the GitHub status page or contact support.
If the problem persists, check the GitHub status page or contact support.

