BorderElliptic

ATTACK VECTOR DEVELOPMENT RESOURCES ... HARMLESS MUSINGS ON DISCREET TACTICAL INCURSION, WEAPONIZED PACKET INJECTION, PERSISTENT TARGET CONTROL, PRIVILEGE ESCALATION AND FOOTPRINT OBFUSCATION

Exploit Database

Metasploit Web

Metasploit Github Portal

 

Linux From Scratch - Build Your Own Custom Linux System

Top 10 Open Source AI Platforms in 2020

The Future of Hacking With Nanotechnology

Weaponize PDF docs to Steal Windows Credentials

OpenSource Virtual Network Simulators

Open Source Security Tools

Commercial Research Tools