hal308's Stars
danielmiessler/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
kelseyhightower/kubernetes-the-hard-way
Bootstrap Kubernetes the hard way. No scripts.
MichaelCade/90DaysOfDevOps
This repository started out as a learning in public project for myself and has now become a structured learning map for many in the community. We have 3 years under our belt covering all things DevOps, including Principles, Processes, Tooling and Use Cases surrounding this vast topic.
osquery/osquery
SQL powered operating system instrumentation, monitoring, and analytics.
reflex-dev/reflex
🕸️ Web apps in pure Python 🐍
vulhub/vulhub
Pre-Built Vulnerable Environments Based on Docker-Compose
MatrixTM/MHDDoS
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
BloodHoundAD/BloodHound
Six Degrees of Domain Admin
mitre/caldera
Automated Adversary Emulation Platform
thangchung/go-coffeeshop
☕ A practical event-driven microservices demo built with Golang. Nomad, Consul Connect, Vault, and Terraform for deployment
jonaslejon/malicious-pdf
💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
dzhibas/SublimePrettyJson
Prettify/Minify/Query/Goto/Validate/Lint JSON plugin for Sublime Text 3 & 4
brimdata/zui
Zui is a powerful desktop application for exploring and working with data. The official front-end to the Zed lake.
h3xduck/TripleCross
A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
yeswehack/vulnerable-code-snippets
Twitter vulnerable snippets
mrd0x/EvilSelenium
EvilSelenium is a tool that weaponizes Selenium to attack Chromium based browsers.
eviltik/evilscan
NodeJS Simple Network Scanner
chronicle/GCTI
mattharrison/effective_pandas_book
Errata and code for Effective Pandas book
netero1010/ScheduleRunner
A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation
evilsocket/medusa
A fast and secure multi protocol honeypot.
0x4D31/detection-and-response-pipeline
✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The purpose is to create a reference hub for designing effective threat detection and response pipelines. 👷 🏗
nirajkharel/AD-Pentesting-Notes
aws-samples/aws-secret-sidecar-injector
Kubernetes mutating webhook to fetch secrets from AWS Secrets Manager
chihirobelmo/FalconBMS-Alternative-Launcher
Configure and save FalconBMS setup per Joysticks.
StamusNetworks/suricata-language-server
Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and auto-completion to your preferred editor once it is configured.
StamusNetworks/suricata-4-analysts
The Security Analyst’s Guide to Suricata
mrcbax/honeyup
An uploader honeypot designed to look like poor website security.
aws-samples/aws-gateway-load-balancer-suricata-ids-ips-nsm
Tech-Bandit/pi-hole
pi-hole setup on portainer