Stars
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues i…
Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practising GraphQL Security.
Master programming by recreating your favorite technologies from scratch.
A new kind of Progress Bar, with real-time throughput, ETA, and very cool animations!
Environment used to find Moodle CVE-2025-26529
JSSCM detects expired domains for Stored XSS exploitation during browsing.
Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit
Commands and Scripts to attack Linux and Servers
Allows you to emulate an Android native library, and an experimental iOS emulation
Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow affecting the emulated binary is provided.
SecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to create informational content in multiple formats and share with …
Gospider - Fast web spider written in Go
A versatile and portable proxy for capturing, manipulating, and replaying HTTP/HTTPS traffic on the go.
A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.
Software-Defined Networking tools for LXC (LinuX Containers)
Blind XSS Scanner is a tool that can be used to scan for blind XSS vulnerabilities in web applications.
The best resources for learning exploit development
Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2, evasion, etc).