iamtecheater Goto Github PK
Name: Tech Eater
Type: User
Company: Tech Eater
Bio: Security Analyst | Hacker | Gamer
Twitter: iamtecheater
Location: South Africa
Blog: https://techeater.co.za/
Name: Tech Eater
Type: User
Company: Tech Eater
Bio: Security Analyst | Hacker | Gamer
Twitter: iamtecheater
Location: South Africa
Blog: https://techeater.co.za/
A guide on how to become an Information (or Cyber) Security Professional. With resources from free to expensive.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.
Attack Surface Analyzer can help you analyze your operating system's security configuration for changes during software installation.
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
Tooling for assessing an Azure AD tenant state and configuration
BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active Directory. Each time this tool runs, it produces different results. The domain, users, groups, computers and permissions are different. Every. Single. Time.
Bad char generator to instruct encoders such as shikata-ga-nai to transform those to other chars.
Automated solution for nmap'ing
Code samples for No Starch Press Black Hat Go
A curated list of blockchain security Capture the Flag (CTF) competitions
Six Degrees of Domain Admin
A tool for parsing breached passwords
A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Security vulnerabilities within your own API Security CTF.
CrimeFlare is a useful tool for bypassing websites protected by CloudFlare WAF, with this tool you can easily see the real IP of websites that have been protected by CloudFlare. The resulting information is certainly very useful for conducting further penetration testing, and analyzing websites with the same server.
I just wanted to show how a countdown timer works
A swiss army knife for pentesting networks
CrowdSec - the open-source and participative IPS able to analyze visitor behavior & provide an adapted response to all kinds of attacks. It also leverages the crowd power to generate a global CTI database to protect the user network.
Shell script to obtain information from https://crt.sh
(Unofficial) Python API for https://crt.sh
A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager
A declarative, efficient, and flexible JavaScript library for building user interfaces.
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google ❤️ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.