Skip to content
View sweethomer's full-sized avatar

Block or report sweethomer

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminating the need for tools like accesschk.exe or other non-native …

Python 106 18 Updated Jan 15, 2025

A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compiled for educational purposes. The contents of this repository…

976 109 Updated Jul 19, 2024

Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and share th…

Python 3,966 638 Updated Jan 19, 2025

Trying to tame the three-headed dog.

C# 4,361 799 Updated Mar 28, 2025

"One must acknowledge with cryptography no amount of violence will ever solve a math problem." ― Jacob Appelbaum

52 20 Updated Sep 25, 2019

Openport Client v2

Python 6 1 Updated Mar 24, 2025

A curated list of cybersecurity tools and resources.

1,294 158 Updated Mar 28, 2025

E-books related to hacking helps you to know more about hacking.

19 2 Updated Jan 4, 2024

The repository is a valuable resource for individuals looking to enhance their knowledge and skills in cybersecurity. It provides in-depth materials and guides for various cybersecurity domains.

91 13 Updated Mar 22, 2025

Best ethical hacker's guide books

4 Updated Oct 23, 2024

Embed a PowerShell script within a JPG image to create a tweetable JPG-PowerShell polyglot file.

C 5 2 Updated Mar 19, 2025

Awesome-Cellular-Hacking

3,126 566 Updated Nov 8, 2024

Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues i…

Python 2,125 424 Updated Jul 19, 2024

EthicalHacking, Python, Nmap, Metasploit

101 35 Updated Oct 17, 2020

Code that goes along with the Hacks, Leaks, and Revelations book

Python 157 28 Updated Jan 22, 2025

MCP2515 CANBUS project to the Flipper Zero

C 80 4 Updated Dec 12, 2024

Bash script to check if a domain or list of domains can be spoofed based in DMARC records

Shell 327 59 Updated Mar 6, 2022

GreyScript toolkit for Grey Hack written in TS.

TypeScript 30 7 Updated Mar 24, 2025

A Hackers framework

Python 143 68 Updated Nov 2, 2017

Original Apollo 11 Guidance Computer (AGC) source code for the command and lunar modules.

Assembly 61,402 7,172 Updated Mar 16, 2025

Need for Speed Underground 2 Extra Options

C++ 145 14 Updated Jan 10, 2022

Search WiFi geolocation data by BSSID and SSID on different public databases.

Python 1,005 98 Updated Dec 21, 2024

AI-powered penetration testing assistant for automating recon, note-taking, and vulnerability analysis.

Python 538 59 Updated Mar 19, 2025

Records calls from a Trunked Radio System (P25 & SmartNet)

C++ 928 206 Updated Mar 29, 2025

A repo where I experiment with Phishlets for Evilginx3

3 4 Updated Sep 6, 2024

A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file formats. Supports: ZIP, 7zip, PDF, ISO, IMG, CAB, VHD, VHDX

Python 903 142 Updated Jun 10, 2024

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…

PHP 61,700 24,234 Updated Mar 28, 2025
Next
Showing results