Sign up for your own profile on GitHub, the best place to host code, manage projects, and build software alongside 31 million developers.
Hide content and notifications from this user.
Contact Support about this user’s behavior.
Given an existing docker container, prints the command line necessary to run a copy of it.
SSH Server for Docker containers ~ Because every container should be accessible
A Smart Ethernet Switch for Earth
A Swiss army knife for your daily Linux network plumbing.
Process Spawn Control is a Powershell tool which aims to help in the behavioral (process) analysis of malware. PsC suspends newly launched processes, and gives the analyst the option to either keep…
This PS script will extract macro from Excel and Word files. Also checks the macro for suspecious code patterns Includes temporary DDE check for word documents
Shadow is a unique discrete-event network simulator that runs real applications like Tor, and distributed systems of thousands of nodes on a single machine. Shadow combines the accuracy of emulatio…
Typefaces for source code beautification
A curated list of tools for incident response
T-Pot Universal Installer and ISO Creator
A collection of static SSH keys (public and private) that have made their way into software and hardware products.
OpenBSD Router Boilerplate
Sublime Text package that includes a simple build system to allow direct execution of bash scripts.
Simple random DNS, HTTP/S internet traffic noise generator
An Interactive Pcap Editor (based on Scapy)
Generate vulnerable virtual machines on the fly (current team development is taking place in the cliffe/SecGen fork)
Deauthentication attack with two ESP8266 modules
An easy experiment which uses the ESP8266 wifi module to look for near smartphones around you
Extract urls from text
A cross-platform, GPU-accelerated terminal emulator
lichess.org mobile application
"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
TCP/IP packet demultiplexer. Download from:
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
💬 Bulk delete messages and files on Slack
Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can output the full wordlist as well as rules compatible with Hashcat…
“Protocol Informatics” is a project to design for automatically network protocol reverse engineering based on frame or packet analysis. "PI" is short for “Protocol Informatics”, which introduces lo…
SDR Rx/Tx software for Airspy, Airspy HF+, BladeRF, HackRF, LimeSDR, PlutoSDR, RTL-SDR, SDRplay RSP1 and FunCube
The x86 processor fuzzer