🖥️ A reveal.js website for presenting the cyber security basics to humans
:computer:🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
:computer::warning: A curated collection of awesome malware, botnets, and other post-exploitation tools.
A curated list of awesome resources related to executable packing
Forward shell generation framework
Autosploit = Automating Metasploit Modules.
Explanation of All the Payloads Used in Pentester Academy's JS for Pentester Course
OSINT tool for finding profiles by username
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues invo...
Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involvi...