-
TAG - The Aspen Group
- Chicago, IL
Stars
This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at the forefront of the field. It serves as a central repository…
VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data exfiltration techniques used by advanced threat actors, allo…
This repository contain articles from around the web related to application security. It covers resources for Web , mobile and also native applications.
This repository is to make life of the pentester easy as it is a collection of the websites that can be used by pentesters for day to day studies and to remain updated.
Collection of PoC and offensive techniques used by the BlackArrow Red Team
This map lists the essential techniques to bypass anti-virus and EDR
This shows how to install pyrit for fluxion or other wifi hacking tools if you don't have pip installed or you have
Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords
An Information Security Reference That Doesn't Suck
List of Awesome Red Teaming Resources