A curated collection of resources for the zero-trust security model.
☆20Jun 10, 2021Updated 4 years ago
Alternatives and similar repositories for Zero-Trust
Users that are interested in Zero-Trust are comparing it to the libraries listed below
Sorting:
- Useful Threat Hunting Stuff☆32Sep 1, 2020Updated 5 years ago
- OOB listener powered by cloudflare workers☆12Apr 13, 2025Updated 11 months ago
- Chat.JS - Vulnerable NodeJS Web-App to practice NoSQLi and Deserialization exploitation☆31Mar 21, 2021Updated 4 years ago
- This repository contains 0 click exploits to some HackTheBox machines, I used it to study for OSWE☆41May 9, 2024Updated last year
- ☆18Feb 13, 2026Updated last month
- Offensive recon with GitHub Actions☆11Aug 25, 2024Updated last year
- ☆11Sep 6, 2023Updated 2 years ago
- TESTR - A Vulnerable Python Web-App to practice XSS and Command Injection☆41Oct 8, 2022Updated 3 years ago
- ☆10Aug 9, 2024Updated last year
- A collection of resources to learn Reverse Engineering and Binary Exploitation☆11Nov 11, 2020Updated 5 years ago
- ☆10Jan 8, 2023Updated 3 years ago
- A small WinRM client designed for interacting with JEA endpoints.☆13Aug 29, 2024Updated last year
- ☆11Dec 7, 2025Updated 3 months ago
- This tool is designed to seamlessly convert Postman collections into OpenAPI schemas. This conversion is essential for API security testi…☆12Sep 3, 2024Updated last year
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- ☆12Apr 20, 2025Updated 10 months ago
- ☆13May 18, 2022Updated 3 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Jun 10, 2017Updated 8 years ago
- Kudzu is a Go C2 platform with an emphasis on extensibility.☆11Mar 30, 2021Updated 4 years ago
- An ongoing & curated collection of awesome vulnerability scanning software, libraries and frameworks, best guidelines, technical resource…☆14Feb 7, 2022Updated 4 years ago
- ☆13Mar 29, 2021Updated 4 years ago
- ☆10Dec 8, 2022Updated 3 years ago
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- ☆19Jul 23, 2025Updated 7 months ago
- Indirect Prompt Injection Methodology (IPIM) - A structured process which security professionals can use to find Indirect Prompt Injectio…☆18Jul 28, 2025Updated 7 months ago
- ☆14Dec 24, 2024Updated last year
- Questions to ask about the team and company when you're interviewing for a CISO position☆15Oct 19, 2021Updated 4 years ago
- MailHunter is a tool to give you access to the exchange server mails.☆12Apr 16, 2021Updated 4 years ago
- A tool to check for response status codes with ease☆13Apr 29, 2023Updated 2 years ago
- The tutorial of "Kubernetes Security for Microservices"☆14Oct 3, 2023Updated 2 years ago
- Advanced Sub-domain Enumerator☆10Mar 14, 2020Updated 6 years ago
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.☆23May 4, 2024Updated last year
- Red Team Projects with chat.openai.com.☆17Apr 3, 2023Updated 2 years ago
- SysCalling is an educational project demonstrating state-of-the-art syscall execution techniques for bypassing user-space EDR controls in…☆14Dec 8, 2024Updated last year
- GeeksforGeeks Algorithms and Questions implemented in Python☆12Mar 11, 2018Updated 8 years ago
- ☆10Oct 25, 2020Updated 5 years ago
- A Ghidra extension that allows you to run Angr symbolic execution using the Pcode from Ghidra.☆16Nov 11, 2021Updated 4 years ago
- ☆13Oct 24, 2024Updated last year
- Learning material for completely newcomers in the field of BOFs☆14Apr 11, 2020Updated 5 years ago