This article provides a treasure trove of resources, including cheatsheets, detailed notes, and automation scripts, tailored for cybersecurity professionals and enthusiasts.
Whether you’re a beginner or an experienced red teamer, these tools will enhance your skills in simulating cyber attacks and strengthening defenses.
Dive into our curated collection and join a community dedicated to advancing cybersecurity through practical, hands-on experience.
This repository contains cheatsheets, notes, and scripts related to my learning in cybersecurity, particularly Red Teaming. You’ll find a variety of resources that I’ve compiled over the years, including:
Share with your friends:
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…