Lists (1)
Sort Name ascending (A-Z)
Starred repositories
A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM.
Cybersecurity AI (CAI), the framework for AI Security
GeoIntel using Google's Gemini API to uncover the location where photos were taken through AI-powered geo-location analysis.
Semi-automatic OSINT framework and package manager
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wis…
SearXNG is a free internet metasearch engine which aggregates results from various search services and databases. Users are neither tracked nor profiled.
This Repositories contains list of One Liners with Descriptions and Installation requirements
Pre-Built Vulnerable Environments Based on Docker-Compose
Persistent Windows backdoor with HTTP/S based C2 communication
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
Macro-header for compile-time C obfuscation (tcc, win x86/x64)
Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, build your taylor-made EASM tool, co…
A Security Tool for Bug Bounty, Pentest and Red Teaming.
Chromium-based info stealer for windows, sends credentials & history via a discord webhook
Community curated list of templates for the nuclei engine to find security vulnerabilities.
Transparently tunnel your IP traffic through ICMP echo and reply packets.
Tesseract Open Source OCR Engine (main repository)
Harness the power of ChatGPT inside the GDB or LLDB debugger!
Distribution-independent installer framework
The best tool for finding one gadget RCE in libc.so.6
CTF framework and exploit development library
A repository for learning various heap exploitation techniques.
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
A library for generating fake data such as names, addresses, and phone numbers.