Wordlist collection
A collection of software installations scripts for Windows systems
The Pentester’s Companion
Helps with conducting forensics of mobile devices
A suite of Tools to aid Incidence Response and Live Forensics
Creates shortcuts to virtually every special location or action built
Log management solution that improves the performance of SIEM
This publication is a collection of various common attack scenarios
The open-source notification infrastructure
Vulnerable implementation of Facebook's GraphQL technology
A collection of Python classes for working with network protocols
Welcome to the Microsoft Defender for Cloud community repository
A collection of scripts for assessing Microsoft Azure security
Collection of standard and secure cryptographic algorithms
A collection of malware samples and relevant dissection information
Architect's Kung Fu tutorial collection Article collection
A Linux Toolkit for Malware Analysis
The portable software collection
Klotsky class block slider puzzles.
The Best file security app.
Powerful webdav client and sync tools with client-side AES encryption
57 Hash Functions In One Program, plus each with HMAC or KMAC
Kernel privilege escalation vulnerability collection
A collection of custom security tools for quick needs.
Collection of reverse shells for red team operations