.. / Items
Star

Below is the list of items:

AD

Tools for Active Directory security.

BinaryExp

Tools for binary exploitation/pwn.

Blue

Tools for blue team operations and defense.

C2

Command and Control frameworks (C2) for remote control.

Cheatsheets

Collection of quick reference guides for various topics.

Cloud

Tools and services for cloud security and management.

Crack

Tools for password cracking and hash analysis.

Crypto

Tools for cryptographic analysis and manipulation.

DoS

Tools for conducting Denial of Service attacks.

Evasion

Tools for evading detection and bypassing security measures.

Mindmaps

Visual representations of knowledge domains and concepts.

Misc

Miscellaneous tools and utilities not categorized elsewhere.

Mobile

Tools for mobile application security testing and analysis.

OSINT

Tools for Open Source Intelligence gathering and analysis.

Pivoting

Techniques and tools for lateral movement within networks.

PrivEsc

Tools for identifying and exploiting privilege escalation vulnerabilities.

Red

Tools and frameworks for offensive security and red team operations.

Reversing

Tools for reverse engineering and malware analysis.

Scan

Tools for network and vulnerability scanning.

Stegano

Tools for steganography detection and analysis.

Web

Tools for web application security testing and exploitation.

Wifi

Tools for wireless network security assessment and auditing.

Wordlists

Collections of wordlists for password cracking and dictionary attacks.