Skip to content
View Arikius's full-sized avatar
🦍
🦍
  • Honey Badger Security

Sponsoring

@thomaspatzke
@rkalis
@zricethezav
@joshhighet

Block or report Arikius

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Here we discuss how one can investigate crypto hacks and security incidents, and collect all the possible tools and manuals! PRs are welcome! If any tool is missing - please open PR!

1,468 182 Updated Jun 22, 2024

Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!

329 36 Updated Aug 13, 2024

Xbox controller support for StarCraft 1, StarCraft II, WarCraft II: Remastered and WarCraft III.

C# 12 Updated Dec 8, 2024

Docker configuration to quickly setup your own Canarytokens.

Dockerfile 615 118 Updated Feb 17, 2025

Canarytokens helps track activity and actions on your network.

HTML 1,815 263 Updated Feb 27, 2025

A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate suspicious activities.

Python 153 11 Updated Feb 9, 2025

Bazzite is a custom Fedora Atomic image built with cloud native technology that brings the best of Linux gaming to all of your devices - including your favorite handheld.

Shell 4,835 335 Updated Mar 10, 2025

Generate massive amounts of fake data in the browser and node.js

TypeScript 13,547 953 Updated Mar 10, 2025

This repository provides tutorials and implementations for various Generative AI Agent techniques, from basic to advanced. It serves as a comprehensive guide for building intelligent, interactive A…

Jupyter Notebook 8,746 1,137 Updated Mar 9, 2025

Parser for NOTAM (Notice to Air Missions)

Ruby 14 1 Updated Dec 27, 2024

A curated list of resources dedicated to open source GitHub repositories related to ChatGPT and OpenAI API

2,394 281 Updated Mar 9, 2025

Public release of Telepathy, an OSINT toolkit for investigating Telegram chats.

Python 1,076 142 Updated Jul 12, 2024

Collection of Cyber Threat Intelligence sources from the deep and dark web

4,864 844 Updated Mar 10, 2025

User-friendly AI Interface (Supports Ollama, OpenAI API, ...)

JavaScript 82,283 9,910 Updated Mar 10, 2025

Get up and running with Llama 3.3, DeepSeek-R1, Phi-4, Gemma 2, and other large language models.

Go 132,090 10,892 Updated Mar 10, 2025

Automatically created C2 Feeds

REXX 587 49 Updated Mar 10, 2025

Cybersecurity's lighter side: a collection of the most amusing misunderstandings and missteps from newcomers to offensive security tools. A repository where naiveté in infosec is met with humor.

57 4 Updated Nov 13, 2023

Search for sensitive data in Postman public library.

Python 199 31 Updated Jan 3, 2025

Monitors Github for leaked secrets

Python 196 43 Updated Oct 25, 2024

🐬 A collection of awesome resources for the Flipper Zero device.

20,121 879 Updated Sep 27, 2024

Flipper Zero firmware source code

C 13,828 2,895 Updated Mar 10, 2025

Made to be used with Flipper just drag the folder into NFC

Python 3,125 267 Updated Aug 15, 2024

AutoGPT is the vision of accessible AI for everyone, to use and to build on. Our mission is to provide the tools, so that you can focus on what matters.

Python 173,061 45,291 Updated Mar 10, 2025

A list of useful payloads and bypass for Web Application Security and Pentest/CTF

Python 63,776 15,098 Updated Mar 7, 2025

Find, verify, and analyze leaked credentials

Go 18,367 1,791 Updated Mar 10, 2025

Find secrets with Gitleaks 🔑

Go 19,132 1,555 Updated Mar 7, 2025

Documentation for LimaCharlie Enterprise

Shell 9 8 Updated Apr 14, 2023

Security Analytics enables users for detecting security threats on their security event log data. It will also allow them to modify/tailor the pre-packaged solution.

Java 78 78 Updated Feb 28, 2025

TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains, IPs, and SHA256/MD5 hashes.

530 58 Updated Mar 11, 2025

Digging Deeper....

Go 3,138 508 Updated Mar 10, 2025
Next
Showing results