Thanks to visit codestin.com
Credit goes to github.com

Skip to content
View peet47's full-sized avatar

Block or report peet47

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

3D-printable M2 enclosures designed by Macchina

G-code 25 3 Updated Nov 27, 2019

OpenSCAD script to generate inserts for IKEA Samla boxes

OpenSCAD 76 12 Updated Apr 7, 2025

Voron Community mods

OpenSCAD 3,207 1,869 Updated May 29, 2025

ThePhish: an automated phishing email analysis tool

Python 1,287 193 Updated Aug 1, 2024

ESPHome version of Elektor weather station v2

OpenSCAD 314 19 Updated Jul 13, 2022

Procyon is a suite of Java metaprogramming tools, including a rich reflection API, a LINQ-inspired expression tree API for runtime code generation, and a Java decompiler.

Java 1,143 131 Updated Jun 12, 2022

A tool to dump a git repository from a website

Python 2,311 285 Updated Aug 21, 2025

Cuckoo3 is a Python 3 open source automated malware analysis system.

Python 775 95 Updated Jun 23, 2025

Gather and update all available and newest CVEs with their PoC.

HTML 7,322 926 Updated Nov 4, 2025

Minimalist Asterisk Caller ID Spoofer and Secondary VOIP Line Configuration Built for AWS

Shell 305 48 Updated Sep 10, 2020

Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.

Python 308 43 Updated Mar 8, 2022

BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world.…

PowerShell 2,197 289 Updated Jun 7, 2023

Modular C2 framework aiming to ease post exploitation for red teamers.

Go 191 31 Updated May 22, 2022

PickleC2 is a post-exploitation and lateral movements framework

PowerShell 94 20 Updated Jul 26, 2021

Defeating Windows User Account Control

C 7,104 1,398 Updated Jul 8, 2025

Ransomware leak site monitoring

Python 316 61 Updated Mar 7, 2022

Repository of Yara rules dedicated to Phishing Kits Zip files

YARA 233 38 Updated Oct 20, 2025

pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE)

Shell 1,897 214 Updated Sep 23, 2022

Pentesting Android Application Course For Kids+ (English and Vietnamese edition)

Python 504 173 Updated Nov 22, 2022

FastAPI framework, high performance, easy to learn, fast to code, ready for production

Python 91,522 8,160 Updated Nov 4, 2025

Microsoft Sentinel2Go is an open source project developed to expedite the deployment of a Microsoft Sentinel research lab.

PowerShell 573 150 Updated Jan 22, 2025

GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]

1,517 272 Updated Jul 28, 2024

Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that back through your already existing Beacon communication channel

C 219 56 Updated Jul 14, 2021

A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.

C 19 4 Updated Jun 24, 2021

Docker image with Meinheld and Gunicorn for Flask applications in Python.

Python 484 61 Updated Oct 2, 2025

Windows Event Log Killer

C 1,802 306 Updated Sep 21, 2023

A collection of modern/faster/saner alternatives to common unix commands.

32,541 816 Updated Sep 10, 2024

Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software

Python 68 21 Updated Sep 4, 2023

iSpindel for ESPHome

47 3 Updated Jun 10, 2021
Next