Lists (9)
Sort Name ascending (A-Z)
Algorithms
DeceptionCircumvention
Commercial attempts to circumvent previously placed protections. Intellectual property is not free.Cyber
dev-sec-opsDolphin
FlipperShitForensics
Examination scrutinyM5
LauncherMobile
Hacking that's not hacking🚀 My stack
Stars
Node Version Manager - POSIX-compliant bash script to manage multiple active node.js versions
CTF framework and exploit development library
Modular and extensible library for Virtual Machine Introspection
Linux based WiFi pentesting device for the Flipper Zero.
This project consists of an open source library allowing software to connect to data repositories using STIX Patterning, and return results as STIX Observations.
An OSINT tool to search for accounts by username and email in social networks.
GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.
A tool to detect whether a PDF has a bad redaction
A fully-searchable and accessible archive of court data including growing repositories of opinions, oral arguments, judges, judicial financial records, and federal filings.
Open source handheld ham radio project KV4P-HT
Software tools for Nordic Semiconductor nRF24-based devices like wireless keyboards, mice, and presenters
Metasploit Framework
Proxmark3 Lua script for attacking vulnerable Protectimus SLIM NFC TOTP hardware tokens
The new generation chameleon based on NRF52840 makes the performance of card emulation more stable. And gave the chameleon the ability to read, write, and decrypt cards.
A GUI for the Chameleon Ultra written in Flutter for crossplatform
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
Rust tool to detect cell site simulators on an orbic mobile hotspot
This code repository offers downloads for the latest images of various uConsole models, along with kernel patches, firmware for the keyboard and 4G expansion module, hardware schematics, assembly i…
jbohack / nyanBOX
Forked from cifertech/nRFBoxA compact ESP32 Wroom32U toolkit for wireless security—scan, analyze, and spoof RF, Wi-Fi, and BLE protocols, all from an intuitive menu-driven interface. No complex commands or coding required. De…
Open-source ESP32-powered tool to scan, jam, spoof, and master BLE, Wi-Fi, and 2.4GHz networks.