Take it like a gift

BlueHound
BlueHound

Pinpoint the security issues that actually matter.

The art of command line
The art of command line

Master the command line, in one page.

dsieve
dsieve

Filter and enrich a list of subdomains by level.

holehe
holehe

Check if the mail is used on different sites and retrieve informations on sites.

Sub3 Suite
Sub3 Suite

A free, open source, cross platform Intelligence gathering tool.

wacker
wacker

A WPA3 dictionary cracker.

LeakLooker-X
LeakLooker-X

Discover, browse and monitor database/source code leaks.

JWT cracker
JWT cracker

JWT brute force cracker written in C.

ruler
ruler

A tool to abuse Exchange services.

metahttp
metahttp

Script that automates the scanning of a target network for HTTP resources through XXE.

CVE-MAKER
CVE-MAKER

A hub for finding CVEs and exploits based on the official NIST, ExploitDB and Github databases.

IPRotate
IPRotate

Extension for Burp Suite which uses AWS API Gateway to rotate your IP on every request.

metasploitable
metasploitable

VM that is built from the ground up with a large amount of security vulnerabilities.

Linux Exploit Suggester
Linux Exploit Suggester

Based on operating system release number.

Mythic
Mythic

A collaborative, multi-platform, red teaming framework.