WindowsExploits is a collection of mostly precompiled Windows exploits, primarily sourced from https://github.com/AusJock/Privilege-Escalation. These exploits are commonly used for privilege escalation on Windows systems.
Learn how to create new Malleable C2 profiles for Cobalt Strike to avoid detection and signatured toolset
RTA provides a framework of scripts for blue teams to test detection capabilities against malicious tradecraft, modeled after MITRE ATT&CK.
A customized Kali Linux distribution for ICS/SCADA pentesting professionals
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang for efficient and secure communication.
OWASP OWTF is a penetration testing framework focused on efficiency and alignment with security standards.
A list of useful payloads and bypasses for Web Application Security.
An open source network penetration testing framework with automatic recon and scanning capabilities.
Collection of URLs for vulnerable web applications and systems for cybersecurity practice.
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
A cybersecurity platform that offers vulnerability scanning, Windows Defender and 3rd party AV management, and MFA compliance reporting, among other features.
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.