infosecx's repositories
invoke-mimikatz.ps1-fixed
fixed mimikatz PowerShell version for server 2016 ,windows 10 latest .
Red-Team-Infrastructure-Wiki
Wiki to collect Red Team infrastructure hardening resources
bruteforce-lists
Some files for bruteforcing certain things.
easy-chat-buffer-overflow
Download the exploit code of easy chat buffer overflow 2.2
fastlane
🚀 The easiest way to automate building and releasing your iOS and Android apps
Red_Team
Some scripts useful for red team activities
all-in-one-veda
all the indian vedas and books
PENTESTING-BIBLE
This repository was created and developed by Ammar Amer @cry__pto Only. Updates to this repository will continue to arrive until the number of links reaches 10000 links & 10000 pdf files .Learn Ethical Hacking and penetration testing .hundreds of ethical hacking & penetration testing & red team & cyber security & computer science resources.
awesome-osint
:scream: A curated list of amazingly awesome OSINT
offsec_machine
Offsec_machines
ProjectX
DarkWeb Overview
hackthebox-writeups
Writeups for HacktheBox 'boot2root' machines
Windows
Useful Commands, Reverse Shell, Privilege Escalation Methods, Impersonation Attacks, Useful Powershell Commands and more
Python-Books
List of all books references for python learning and development
IoTGoat
IoTGoat is a deliberately insecure firmware based on OpenWrt.
wesng
Windows Exploit Suggester - Next Generation
Awesome-Cellular-Hacking
Awesome-Cellular-Hacking
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
private-ai
Repo for Udacity's Secure & Private AI course
SSRF_Vulnerable_Lab
This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack
oscp-ttols
tools required for oscp
shadow-brokers
All in one resources for NSA leaked tools by shadow-broker !!!
vuln-web-apps
A curated list of vulnerable web applications.
Red-Teaming-Toolkit
A collection of open source and commercial tools that aid in red team operations.
AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
programming-books-ITsecurity
Learn programming for hacking and Security
pentesting-reports-master-collection
All type of Projects Pen-testing Reports & Prcedures
kubernetics-elastic-kibana
learn all elastic-search+kibana+kubernatics
bitcoin-masterclass
learn-detailed-bitcoin
scada-ICS
Learn-SCADA-ICS