Stars
ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminating the need for tools like accesschk.exe or other non-native …
A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compiled for educational purposes. The contents of this repository…
Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and share th…
"One must acknowledge with cryptography no amount of violence will ever solve a math problem." ― Jacob Appelbaum
A curated list of cybersecurity tools and resources.
E-books related to hacking helps you to know more about hacking.
The repository is a valuable resource for individuals looking to enhance their knowledge and skills in cybersecurity. It provides in-depth materials and guides for various cybersecurity domains.
Embed a PowerShell script within a JPG image to create a tweetable JPG-PowerShell polyglot file.
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues i…
Code that goes along with the Hacks, Leaks, and Revelations book
MCP2515 CANBUS project to the Flipper Zero
Bash script to check if a domain or list of domains can be spoofed based in DMARC records
GreyScript toolkit for Grey Hack written in TS.
Original Apollo 11 Guidance Computer (AGC) source code for the command and lunar modules.
Search WiFi geolocation data by BSSID and SSID on different public databases.
AI-powered penetration testing assistant for automating recon, note-taking, and vulnerability analysis.
Records calls from a Trunked Radio System (P25 & SmartNet)
A repo where I experiment with Phishlets for Evilginx3
A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file formats. Supports: ZIP, 7zip, PDF, ISO, IMG, CAB, VHD, VHDX
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…