-
President at @Cyber-Info
- Everywhere
- w33t.io
- https://orcid.org/0009-0007-9245-0939
- @w33t_io
Highlights
Lists (14)
Sort Name ascending (A-Z)
Stars
TTS Generation Web UI (Bark, MusicGen + AudioGen, Tortoise, RVC, Vocos, Demucs, SeamlessM4T, MAGNet, StyleTTS2, MMS, Stable Audio, Mars5, F5-TTS, ParlerTTS)
A collaborative, multi-platform, red teaming framework
💎 🐳 A super customizable Jekyll theme for personal site, team site, blog, project, documentation, etc.
Looking for those jamming files that were removed from custom firmwares? Here they are. Only for educational purposes, of course.
List of Google Dorks for sites that have responsible disclosure program / bug bounty program
Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!
Decoders and Rules for Fortigate in Wazuh
FaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loading
Malware persistence via COM DLL hijacking. C++ implementation example
A curated list of awesome malware persistence tools and resources.
Collection of malware persistence and hunting information. Be a persistent persistence hunter!
Demos of various (also non standard) persistence methods used by malware
A collection of scripts I've written to help red and blue teams with malware persistence techniques.
Zero-Day Code Injection and Persistence Technique
Resources About Persistence, Multiple Platforms. Including ~80 Tools and 300+ Posts.
Source-available license based on MIT/ISC that restricts harmful free-riding.
A Pluggable Authentication Module (PAM) which allows the establishment of alternate passwords that can be used to perform actions to clear sensitive data, notify IT/Security staff, close off sensit…
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
A (hopefully) actively maintained activity-based-autosorted list of InfoSec Streamers
SSH server & client security auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)