Highlights
🔒 Security
Complete solution for intentionally vulnerable webshop: "Juice Shop"
🙃 Reverse Shell Cheat Sheet 🙃
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
🧠 Laws, Theories, Principles and Patterns for developers and technologists.
🙈 Steganography: Hiding an image inside another
An open-source post-exploitation framework for students, researchers and developers.
Educational botnet program to perform a DDoS attack
The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb
Bandit is a tool designed to find common security issues in Python code.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Markdown version of OWASP Testing Checklist v4
an awesome list of honeypot resources
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
An evolving how-to guide for securing a Linux server.
Given JSON-like content, The JSON Sanitizer converts it to valid JSON.
Command-line tool integrating with go:generate to replace substitute tokens with ENV variables value.
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more