skim0508's Stars
ail-project/lacus
Lacus is a capturing system using playwright, as a web service.
ail-project/ail-training
AIL project training materials
ail-project/ail-framework
AIL framework - Analysis Information Leak framework
danielmiessler/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
yuqian5/PasswordCollection
A large list of leaked password that I've collected
ChatAFLndss/ChatAFL
Large Language Model guided Protocol Fuzzing (NDSS'24)
fastfire/deepdarkCTI
Collection of Cyber Threat Intelligence sources from the deep and dark web
botesjuan/Burp-Suite-Certified-Practitioner-Exam-Study
Burp Suite Certified Practitioner Exam Study
Zoltan3422/portswigger-guide
bvoris/mitreattackthreatmodeling
This provides a guided step by step walkthrough for threat modeling with MITRE ATT&CK Framework
Nickyie/Cybersecurity-Resources
A Library of various cybersecurity resources
ninjhacks/gsmevil2
GsmEvil 2
DataDog/documentation
The source for Datadog's documentation site.
splunk/security_content
Splunk Security Content
madhuakula/kubernetes-goat
Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀
e-a-security/Exploit-Dev-OSCE
Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding
avi7611/Oscp-Cheat-Sheet
wew oscp
Ignitetechnologies/Privilege-Escalation
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
OlivierLaflamme/Cheatsheet-God
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
pyenv/pyenv
Simple Python version management
JohnHammond/oscp-notetaking
This repository houses some of the small scripts I had used to quickly document throughout my OSCP course. This was referenced on YouTube, and should be made available to others!