Lists (1)
Sort Name ascending (A-Z)
Starred repositories
🕹️ A basic gameboy emulator with terminal "Cloud Gaming" support
Information gathering framework for phone numbers
Living Under the Land on Linux ~ BSides Belfast 2025
A full (fanmade) English translation for Cowboy Bebop - Tsuioku no Serenade for the PlayStation 2
Portable file server with accelerated resumable uploads, dedup, WebDAV, FTP, TFTP, zeroconf, media indexer, thumbnails++ all in one file, no deps
Audits an AppLocker policy XML and reports weak/misconfigured/risky settings, including actual ACL checks.
Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and eviction.
Oblivion Desktop - Unofficial Warp Client for Windows/Mac/Linux
Run Windows apps such as Microsoft Office/Adobe in Linux (Ubuntu/Fedora) and GNOME/KDE as if they were a part of the native OS, including Nautilus integration. Hard fork of https://github.com/Fmst…
A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule
A small collection of Crystal Palace PIC loaders designed for use with Cobalt Strike
Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.
Fair-code workflow automation platform with native AI capabilities. Combine visual building with custom code, self-host or cloud, 400+ integrations.
A curated list of CTF frameworks, libraries, resources and softwares
Bjorn is a powerful network scanning and offensive security tool for the Raspberry Pi with a 2.13-inch e-Paper HAT. It discovers network targets, identifies open ports, exposed services, and potent…
Example pwnable challenge hosted with docker
A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for attack surface discovery in bug bounties and pentests
Binary instrumentation framework based on FRIDA
Meet the calendar that changes everything
A tiny tool built to help AD Admins tame the Protected Users group.