Lists (16)
Sort Name ascending (A-Z)
Stars
The new sqlcmd, CLI for SQL Server and Azure SQL (winget install sqlcmd / sqlcmd create mssql / sqlcmd open ads)
The slightly more awesome standard unix password manager for teams
The most scalable and customizable identity server on the market. Replace your Homegrown, Auth0, Okta, Firebase with better UX and DX. Has all the tablestakes: Passkeys, Social Sign In, Multi-Facto…
👾 Fast and simple video download library and CLI tool written in Go
Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.
Lightweight network IP scanner. Can be used to notify about new hosts and monitor host online/offline history
💥 Blazing fast terminal file manager written in Rust, based on async I/O.
A command and control framework written in rust.
CSTC is a Burp Suite extension that allows request/response modification using a GUI analogous to CyberChef
An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws
Create native Mac applications from command line scripts.
A Security Tool for Bug Bounty, Pentest and Red Teaming.
Loading Remote AES Encrypted PE in memory , Decrypted it and run it
A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.
A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims at aiding with initial access during red teams and phishing …
Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victims.
Command line tool for adding Windows resources to executable files
🎯 SQL Injection Payload List
SSRF (Server Side Request Forgery) testing resources
ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the current state of the target AD environment.
Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI
Yet another shellcode runner consists of different techniques for evaluating detection capabilities of endpoint security solutions