Skip to content
View e-zk's full-sized avatar

Block or report e-zk

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Stars

blue

46 repositories

A tool for secrets management, encryption as a service, and privileged access management

Go 33,834 4,508 Updated Jan 16, 2026

CFSSL: Cloudflare's PKI and TLS toolkit

Go 9,340 1,143 Updated Feb 26, 2025

Extended ssh-agent which supports git commit signing and yubikey signing over ssh

Go 20 3 Updated Apr 29, 2024

Using a Yubikey for SSH Authentication on Windows Seamlessly

Go 567 65 Updated Jun 6, 2024

OpenBSD disk shredding utility

C 8 Updated Mar 25, 2022

a drop-in replacement for Nmap powered by shodan.io

Go 3,160 300 Updated May 1, 2025

Files for HackRF + Portapack MAYHEM firmware to open any and all Tesla vehicle charging ports in range!

149 35 Updated Mar 14, 2022

Dangerously fast DNS/network/port scanner

Rust 919 87 Updated Mar 18, 2022

oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging.

Python 3,261 591 Updated Jun 5, 2025

KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default settings).

C# 1,625 211 Updated Aug 6, 2022

Automagically reverse-engineer REST APIs via capturing traffic

HTML 9,203 343 Updated Dec 15, 2025

A fast reverse proxy to help you expose a local server behind a NAT or firewall to the internet.

Go 103,566 14,804 Updated Jan 14, 2026

A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.

C 1,932 240 Updated Apr 7, 2024

A tool to kill antimalware protected processes

C 1,500 249 Updated Jun 19, 2021

Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication

Go 14,476 2,542 Updated Oct 6, 2025

Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.

C 14,493 2,117 Updated Jan 17, 2026

Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.

Python 2,316 404 Updated Jan 8, 2026
PowerShell 183 63 Updated Aug 23, 2024

Recon MindMap (RMM)

Go 168 18 Updated May 26, 2024

A tool for checking the security hardening options of the Linux kernel

Python 2,030 177 Updated Dec 27, 2025

Maximizing BloodHound. Max is a good boy.

Python 529 63 Updated Apr 25, 2025

Dradis Framework: Collaboration and reporting for IT Security teams

Ruby 771 214 Updated Jan 16, 2026

An open-source self-hosted purple team management web application.

HTML 296 54 Updated Jan 11, 2026

A lightweight tool to quickly extract valuable information from the Active Directory environment for both attacking and defending.

C# 630 78 Updated Oct 18, 2025

PowerShell Script Analyzer

Python 70 8 Updated Oct 26, 2023

HellPot is a cross-platform portal to endless suffering meant to punish unruly HTTP bots.

Go 1,092 50 Updated Dec 19, 2025

NTLM Hash Generator

Python 10 1 Updated Apr 2, 2021

Trend Micro XDR/Vision One Hunting Recipies

17 8 Updated Apr 7, 2021

APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover su…

Python 1,398 251 Updated Nov 7, 2024

Advanced vulnerability scanning with Nmap NSE

Lua 3,703 688 Updated Sep 11, 2024