Exploits & Payloads

PayloadsAllTheThings – A list of useful payloads and bypass for Web Application Security and Pentest/CTF Methodology and Resources Active Directory Attack.md Cloud – AWS Pentest.md Cloud – Azure Pentest.md Cobalt Strike – Cheatsheet.md Linux – Persistence.md Linux – Privilege Escalation.md Metasploit – Cheatsheet.md Methodology and enumeration.md Network Pivoting Techniques.md Network Discovery.md Reverse Shell Cheatsheet.md Subdomains […]

Configuration Management

Rudder – Rudder is an easy to use, web-driven, role-based solution for IT Infrastructure Automation & Compliance. Automate common system administration tasks (installation, configuration); Enforce configuration over time (configuring once is good, ensuring that configuration is valid and automatically fixing it is better); Inventory of all managed nodes; Web interface to configure and manage nodes […]


An open source firewall is a type of software-based firewall that is developed and maintained by a community of volunteers, rather than a commercial organization. Open source firewalls are often considered to be more secure and reliable than proprietary firewalls, as they are subject to more rigorous testing and scrutiny by a wider community of […]