Thanks to visit codestin.com
Credit goes to github.com

Skip to content
View reike's full-sized avatar

Block or report reike

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

real time face swap and one-click video deepfake with only a single image

Python 78,334 11,431 Updated Dec 15, 2025

Technical add-on for Splunk related to TheHive/Cortex from TheHive project

Python 53 11 Updated Sep 16, 2025

Reverse Engineer's Toolkit

Inno Setup 5,154 536 Updated May 1, 2025

AssemblyLine4 documentation

HTML 28 18 Updated Jan 14, 2026

macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other formats for pentest, demo, and social engineering assessments…

Python 2,292 421 Updated Aug 15, 2024

All-in-One malware analysis tool.

YARA 1,919 251 Updated Aug 22, 2025

Script for automating Linux memory capture and analysis

Shell 274 49 Updated Feb 1, 2020

Image Payload Creating/Injecting tools

Perl 1,270 250 Updated Nov 30, 2023

The official repo for a project involving a crowdsourced DFIR book. The main purpose of this book is to give anyone interested an opportunity to write a chapter of a book to get their name out ther…

Ruby 217 23 Updated Dec 30, 2025

πŸ“Ί(tv) Tidy Viewer is a cross-platform CLI csv pretty printer that uses column styling to maximize viewer enjoyment.

Rust 2,128 40 Updated Aug 21, 2025

Run macOS VM in a Docker! Run near native OSX-KVM in Docker! X11 Forwarding! CI/CD for OS X Security Research! Docker mac Containers.

Shell 52,023 2,887 Updated Nov 11, 2025

πŸ’€ Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh

Python 3,584 462 Updated Nov 14, 2025
PowerShell 2,377 374 Updated Oct 14, 2023

Tools to assist in forensicating docker

Python 86 22 Updated Mar 5, 2025

β‘·β ‚πš”πšŠπš›πš–πšŠ 𝚟𝟸⠐Ⓘ is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework)

Shell 923 173 Updated May 21, 2025

code for the Proxy DLL example blog post

C 62 15 Updated Oct 29, 2021

reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities

Shell 7,067 1,116 Updated Jan 12, 2026

DNSTake β€” A fast tool to check missing hosted DNS zones that can lead to subdomain takeover

Go 854 74 Updated Feb 13, 2023

Sysmon for Linux

C 2,054 210 Updated Jul 3, 2025

ncurses-grep: interactively navigate grep-like results

C 32 4 Updated Mar 21, 2024

barq: The AWS Cloud Post Exploitation framework!

Python 388 64 Updated Nov 19, 2022

Python library to carry out DFIR analysis on the Cloud

Python 495 90 Updated Oct 8, 2025

Tiny script to verify if a domain or a list of domain is available.

Python 11 4 Updated Jul 22, 2021

The ultimate WinRM shell for hacking/pentesting

Ruby 5,208 672 Updated Jan 9, 2026

Configuration Hardening Assessment PowerShell Script (CHAPS)

PowerShell 188 47 Updated Aug 22, 2025

A list of useful payloads and bypass for Web Application Security and Pentest/CTF

Python 74,466 16,517 Updated Jan 3, 2026

Attack and defend active directory using modern post exploitation adversary tradecraft activity

4,782 1,096 Updated Jul 29, 2025

PKE Meter - Automated script to search "ghosts" and extract objects from Active Directory

PowerShell 9 Updated Sep 22, 2024

Files for the packer tutorial

C 75 21 Updated Feb 21, 2021

All of the ad-hoc things you're doing to manage incidents today, done for you, and much more!

Python 6,324 641 Updated Sep 3, 2025
Next