Pinned Repositories
awesome-security
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
awesome-shodan-queries
🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻
GTFOBins.github.io
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
LinEnum
Scripted Local Linux Enumeration & Privilege Escalation Checks
linux-exploit-suggester
Linux privilege escalation auditing tool
linux-smart-enumeration
Linux enumeration tool for pentesting and CTFs with verbosity levels
linuxprivchecker
linuxprivchecker.py -- a Linux Privilege Escalation Check Script
metasploit-framework
Metasploit Framework
PEASS-ng
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
Pentest-Cheatsheets
Z0rca33's Repositories
Z0rca33/awesome-security
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
Z0rca33/awesome-shodan-queries
🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻
Z0rca33/GTFOBins.github.io
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Z0rca33/LinEnum
Scripted Local Linux Enumeration & Privilege Escalation Checks
Z0rca33/linux-exploit-suggester
Linux privilege escalation auditing tool
Z0rca33/linux-smart-enumeration
Linux enumeration tool for pentesting and CTFs with verbosity levels
Z0rca33/linuxprivchecker
linuxprivchecker.py -- a Linux Privilege Escalation Check Script
Z0rca33/metasploit-framework
Metasploit Framework
Z0rca33/PEASS-ng
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
Z0rca33/Pentest-Cheatsheets
Z0rca33/psfalcon
PowerShell for CrowdStrike's OAuth2 APIs
Z0rca33/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
Z0rca33/seeker
Accurately Locate Smartphones using Social Engineering
Z0rca33/ThreatHunting
Tools for hunting for threats.
Z0rca33/Udemy-notes
My udemy notebooks
Z0rca33/volatility3
Volatility 3.0 development