Vulnerabilities Scan: 15000+PoCs; 20 kinds of application password crack; 7000+Web fingerprints; ...

Find out how to effectively secure cloud environments using AWS, Azure, ...

Assessment, Analysis, and Hardening of a vulnerable system. This report includes ...

Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire Who ...

A curated list of various bug bounty tools Recon Subdomain Enumeration ...

Exploit code for Jira Mobile Rest Plugin SSRF (CVE-2022-26135) CVE-2022-26135 – ...

An OSINT tool to search fast for accounts by username across ...

backvenom multi-purpose Red Team Assessment access and exploitation framework for exploitation ...

Awesome Bloodhound A curated list of awesome Bloodhound resources This list ...

WEF – WiFi Exploitation Framework A fully offensive framework to the ...