Starred repositories
f.k.a. Awesome ChatGPT Prompts. Share, discover, and collect prompts from the community. Free and open source — self-host for your organization with complete privacy.
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
Active Directory and Internal Pentest Cheatsheets
A collection of hacking tools, resources and references to practice ethical hacking.
Awesome EDR Bypass Resources For Ethical Hacking
SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.
💻🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
📚 Freely available programming books
🤗更优雅的微信公众号订阅方式,支持私有化部署、微信公众号RSS生成(基于微信读书)
XSS payloads designed to turn alert(1) into P1
🤯 LobeHub is your Chief Agent Operator, organizing your agents into 7×24 operations by hiring, scheduling, and reporting on your entire AI team.
An XSS exploitation command-line interface and payload generator.
the transparent ransomware claim tracker 🥷🏼🧅🖥️
Make bilingual epub books Using AI translate
Fetches JavaScript files quickly and comprehensively.
A curated list of awesome actions to use on GitHub
All about bug bounty (bypasses, payloads, and etc)
Tiny PHP Web shell for executing unix commands from web page
PHP shells that work on Linux OS, macOS, and Windows OS.
Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing
Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure DevOps release pipelines.
GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.
🧡 Browser extension that simplifies finding and subscribing RSS and RSSHub
Fast, multi-protocol credential brute-forcer. Parses Nmap, Nessus, and Nexpose output to automatically test default and custom credentials across 30+ protocols.
The recursive internet scanner for hackers. 🧡