FortifoxSec's Stars
spacehuhn/esp8266_beaconSpam
Creates up to a thousand WiFi access points with custom SSIDs.
savio-code/ghost-phisher
Automatically exported from code.google.com/p/ghost-phisher
vitalysim/Awesome-Hacking-Resources
A collection of hacking / penetration testing resources to make you better!
j3ssie/osmedeus
A Workflow Engine for Offensive Security
gnebbia/pdlist
A passive subdomain finder
juliocesarfort/public-pentesting-reports
A list of public penetration test reports published by several consulting firms and academic security groups.
taviso/ctftool
Interactive CTF Exploration Tool
jivoi/awesome-osint
:scream: A curated list of amazingly awesome OSINT
mostaphabahadou/postenum
Linux enumeration and privilege escalation tool.
plaintextoffenders/plaintextoffenders
https://plaintextoffenders.com offenders list
bitwarden/server
Bitwarden infrastructure/backend (API, database, Docker, etc).
ytdl-org/youtube-dl
Command-line program to download videos from YouTube.com and other video sites
OJ/gobuster
Directory/File, DNS and VHost busting tool written in Go
microsoft/Microsoft-365-Defender-Hunting-Queries
Sample queries for Advanced hunting in Microsoft 365 Defender
api0cradle/LOLBAS
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
StrikerMan780/Super-Doom-64
Super Doom 64 is a modification for Zandronum with a Doom 64 theme, and goes wild with it, adding reload animations to the Shotgun and SSG, replacing all Vanilla Doom textures, and even including a few of it's own maps.
Hack-with-Github/Awesome-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
zhiwehu/Python-programming-exercises
100+ Python challenging programming exercises
Snow-Shell/servicenow-powershell
PowerShell module to automate ServiceNow service and asset management. This module can be used standalone, with Azure Automation, or Docker.
minimaxir/big-list-of-naughty-strings
The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.
mandiant/commando-vm
Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mandiant.com
VirusTotal/yara
The pattern matching swiss knife
struppigel/PortEx
Java library to analyse Portable Executable files with a special focus on malware analysis and PE malformation robustness
NationalSecurityAgency/ghidra
Ghidra is a software reverse engineering (SRE) framework
WebGoat/WebGoat
WebGoat is a deliberately insecure application
goabstract/Awesome-Design-Tools
The best design tools and plugins for everything 👉
trufflesecurity/trufflehog
Find and verify secrets
The-Art-of-Hacking/h4cker
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artificial intelligence security, vulnerability research, exploit development, reverse engineering, and more.
trimstray/the-book-of-secret-knowledge
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
EbookFoundation/free-programming-books
:books: Freely available programming books