Pinned Repositories
0xdork
aad-sso-enum-brute-spray
POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln
abaddon
AD-Mastertools-collection
This is an AD pentest tools collection
AirGuard
Protect yourself from being tracked ๐ by AirTags ๐ท and Find My accessories ๐
AllAboutBugBounty
All about bug bounty (bypasses, payloads, and etc)
DetectionLab
Automate the creation of a lab environment complete with security tooling and logging best practices
WELA
WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ใ็พ ๏ผใฆใงใฉ๏ผ
HU-MA's Repositories
HU-MA/AD-Mastertools-collection
This is an AD pentest tools collection
HU-MA/AutoSmuggle
Utility to craft HTML or SVG smuggled files for Red Team engagements
HU-MA/awesome-list
Cybersecurity oriented awesome list
HU-MA/Bug-Bounty-Beginner-Roadmap
This is a resource factory for anyone looking forward to starting bug hunting and would require guidance as a beginner.
HU-MA/Bug-bounty-Writeups
Repository of Bug-Bounty Writeups
HU-MA/CloudPentestCheatsheets
This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage cloud providers.
HU-MA/coroot
Coroot is an open-source APM & Observability tool, a DataDog and NewRelic alternative ๐, ๐ฅ๏ธ, ๐. Powered by eBPF for rapid insights into system performance. Monitor, analyze, and optimize your infrastructure effortlessly for peak reliability at any scale.
HU-MA/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability
Microsoft-Outlook-Remote-Code-Execution-Vulnerability
HU-MA/CVE-2024-36991
POC for CVE-2024-36991: This exploit will attempt to read Splunk /etc/passwd file.
HU-MA/CyberChef
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
HU-MA/Harden-Windows-Security
Harden Windows Safely, Securely using Official Supported Microsoft methods and proper explanation | Always up-to-date and works with the latest build of Windows | Provides tools and Guides for Personal, Enterprise, Government and Military security levels | Read The Rationale https://github.com/HotCakeX/Harden-Windows-Security/blob/main/Rationale.md
HU-MA/HEDnsExtractor
A suite for hunting suspicious targets, expose domains and phishing discovery
HU-MA/information-security-relatory
Reports from various areas of information security
HU-MA/llm-security-101
Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.
HU-MA/malicious-pdf
๐ Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
HU-MA/NetAlertX
๐ง๐ WIFI / LAN intruder detector. Scans for devices connected to your network and alerts you if new and unknown devices are found.
HU-MA/netlas-cookbook
The goal of this guide is very simple - to teach anyone interested in cyber security, regardless of their knowledge level, how to make the most of Netlas.io.
HU-MA/netpuppy
A CLI tool for making and/ or binding TCP connections. Inspired by Netcat & written in Golang!
HU-MA/nowafpls
Burp Plugin to Bypass WAFs through the insertion of Junk Data
HU-MA/One-Liners
A collection of one-liners for bug bounty hunting.
HU-MA/rapidscan
:new: The Multi-Tool Web Vulnerability Scanner.
HU-MA/Red-Team-Infrastructure-Wiki
Wiki to collect Red Team infrastructure hardening resources
HU-MA/Sec_Mind_Maps
cyber security mind maps collection
HU-MA/secator
secator - the pentester's swiss knife
HU-MA/shelf
The Shelf is a repository containing various tools, exploits, and scripts that Iโve gathered over the years. These are small but useful utilities for hacking, automation, and configurations that didn't justify their own repo but are too handy to lose. Useful for quick tasks, testing, or competitive hacking.
HU-MA/shellsilo
HU-MA/SpideyX
SpideyX a multipurpose Web Penetration Testing tool with asynchronous concurrent performance with multiple mode and configurations.
HU-MA/vulhub
Pre-Built Vulnerable Environments Based on Docker-Compose
HU-MA/waf-community-bypasses
HU-MA/wpt
Test suites for Web platform specs โ including WHATWG, W3C, and others