Skip to content
View gellin's full-sized avatar
  • Denver, CO

Highlights

  • Pro

Block or report gellin

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Open source software that helps you create and deploy high-frequency crypto trading bots

Python 12,073 3,356 Updated Mar 28, 2025

ZMap is a fast single packet network scanner designed for Internet-wide network surveys.

C 5,725 935 Updated Mar 26, 2025

A curated list of CTF frameworks, libraries, resources and softwares

JavaScript 10,196 1,520 Updated Jul 22, 2024

Web CTF CheatSheet 🐈

Ruby 2,753 556 Updated Mar 23, 2025

A PHP backdoor management and generation tool/C2 featuring end to end encrypted payload streaming designed to bypass WAF, IDS, SIEM systems.

C# 268 46 Updated Sep 14, 2022

bash poc scripts to exploit open fpm ports

Shell 60 14 Updated Jul 31, 2019

A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.

907 120 Updated Jul 25, 2019

Hook system calls, context switches, page faults and more.

C++ 2,513 503 Updated May 9, 2023

A Bring Your Own Land Toolkit that Doubles as a WMI Provider

C# 285 58 Updated Oct 31, 2018
C++ 1 Updated Jan 10, 2019

Server-Side Template Injection and Code Injection Detection and Exploitation Tool

Python 3,897 683 Updated Apr 21, 2024

GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems

HTML 11,422 1,376 Updated Oct 28, 2024

Herramienta para evadir disable_functions y open_basedir

Python 414 89 Updated Sep 5, 2023

The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.

Python 3,062 825 Updated Mar 6, 2025

SocksSharp provides support for Socks4/4a/5 proxy servers to HttpClient

C# 87 34 Updated Dec 14, 2019

Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique present…

Python 3,807 815 Updated Jan 24, 2024

A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.

BlitzBasic 3,768 1,193 Updated Sep 27, 2021

Impacket is a collection of Python classes for working with network protocols.

Python 14,076 3,655 Updated Mar 28, 2025

IDA Pro plugin to examine the glibc heap, focused on exploit development

Python 746 88 Updated Jul 25, 2022

Arbitrary code execution with kernel privileges using CVE-2018-8897.

C++ 410 100 Updated May 18, 2018

Veil 3.1.X (Check version info in Veil at runtime)

Python 4,074 889 Updated Oct 9, 2023

The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool is intended for BOTH red and blue team.

Python 1,126 201 Updated Feb 10, 2021

List of PowerShell scripts conjured up for my consumption (you are welcome to use)

PowerShell 36 15 Updated Oct 17, 2013

exe2powershell - exe2bat reborn for modern Windows

C++ 172 44 Updated Oct 15, 2020

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…

PHP 61,697 24,233 Updated Mar 28, 2025

Dirty Cow exploit - CVE-2016-5195

C 880 427 Updated Apr 8, 2021

Python antivirus evasion tool

Python 1,405 337 Updated Oct 21, 2023

TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.

C 24,239 3,109 Updated Dec 13, 2024

IOHIDFamily 0day

C 443 82 Updated Jan 10, 2023

NSE script based on Vulners.com API

Lua 3,289 552 Updated Apr 3, 2024
Next
Showing results