- Lexington, KY
Highlights
Stars
Convert .emlx and .partial.emlx files created by Apple’s Mail.app to .eml
A MySQL-compatible relational database with a storage agnostic query engine. Implemented in pure Go.
by ex-googlers, for ex-googlers - a lookup table of similar tech & services
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Kill a Kubernetes namespace suffering from being stuck in "Terminating"
A fully-modern text-based browser, rendering to TTY and browsers
An open-source post-exploitation framework for students, researchers and developers.
Scripts to build your own IPsec VPN server, with IPsec/L2TP, Cisco IPsec and IKEv2
Single node Kubernetes instance implemented using Terraform and kubeadm
Elasticsearch cluster on top of Kubernetes made easy.
ELK (Elasticsearch + Logstash + Kibana) cluster on top of Kubernetes made easy.
A framework for BREACH and other compression-based crypto attacks
NCC Group Template for the Microsoft Threat Modeling Tool 2016 for Automotive Security
PowerSploit - A PowerShell Post-Exploitation Framework
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Automatic SQL injection and database takeover tool
signal-cli provides an unofficial commandline, JSON-RPC and dbus interface for the Signal messenger.
Configuration guidance for implementing Pass-the-Hash mitigations. #nsacyber
Finds unknown classes of injection vulnerabilities
Builds and runs a CloudStack Management Server stack under Docker.
w3af: web application attack and audit framework, the open source web vulnerability scanner.