Vulnerabilities Scan: 15000+PoCs; 20 kinds of application password crack; 7000+Web fingerprints; ...

Find out how to effectively secure cloud environments using AWS, Azure, ...

Assessment, Analysis, and Hardening of a vulnerable system. This report includes ...

mal-analysis-tools A curated list of malware repositories, trackers and malware analysis ...

Exploit code for Jira Mobile Rest Plugin SSRF (CVE-2022-26135) CVE-2022-26135 – ...

An OSINT tool to search fast for accounts by username across ...

CVE-2022-29885 The tool is only used for security research. It is ...

backvenom multi-purpose Red Team Assessment access and exploitation framework for exploitation ...

ZombieThread Another meterpreter injection technique using C# that attempts to bypass ...

A list of search engines useful during Penetration testing, vulnerability assessments, ...