-
23:42
(UTC -12:00)
Lists (31)
Sort Name ascending (A-Z)
App building/Agent
Claude
Cleaning up
Secure DoD compliant data drive erasing and log cleaningCloning self
Everything that has to do with audio or chat cloningCurrent
Deep fake!
Eroh-tïkuh
ESP32 hackin
FlipperZero
For BEAD
For David
Hackin'
Home automation
Job
Job hunting
Kali
LLM
Local AI Add-ons
Microsoft activation
🚀 My stack
OpSec
Pentesters-Wiki
Productivity
Reading priority list
Red team?
Remote work
Show Marrina to learn w/ me
USB Swiss ArmyLnife
Website building
Wifi drivers
XSS
Stars
Primary Git Repository for the Zephyr Project. Zephyr is a new generation, scalable, optimized, secure RTOS for multiple hardware architectures.
☁️ ⚡ Granular, Actionable Adversary Emulation for the Cloud
Exploit Create Android Ransomware In Termux (NO ROOT)
Steal user's password when running sudo for post-exploitation purposes
🕵️♂️ All-in-one OSINT tool for analysing any website
PortSwigger / wordpress-scanner
Forked from kacperszurek/burp_wpFind known vulnerabilities in WordPress plugins and themes using Burp Suite proxy. WPScan like plugin for Burp.
Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities
Claude Code skill implementing Manus-style persistent markdown planning — the workflow pattern behind the $2B acquisition.
Not Made By Me Just Lots Of Fun And Cool File's
Get 10X more out of Claude Code, Codex or any coding agent
Selenium-based Python script to automate sending emails to warm up your sender reputation and improve email deliverability
Extract data from modern Chrome versions, including refresh tokens, cookies, saved credentials, autofill data, browsing history, and bookmarks
Obfusk8: lightweight Obfuscation library based on C++17 / Header Only for windows binaries
An0nUD4Y / Obfusk8
Forked from x86byte/Obfusk8Obfusk8: lightweight Obfuscation library based on C++17 / Header Only for windows binaries
An0nUD4Y / LayeredSyscall
Forked from WKL-Sec/LayeredSyscallGenerating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR hooks in Windows.
🦄 A curated list of privacy & security-focused software and services
Production-ready implementation of InvisPose - a revolutionary WiFi-based dense human pose estimation system that enables real-time full-body tracking through walls using commodity mesh routers
scanner detecting the use of JavaScript libraries with known vulnerabilities. Can also generate an SBOM of the libraries it finds.
Z-Ransom (Create Android Ransomware In Kali linux and Termux (NO ROOT)