Skip to content
View n3m1sys's full-sized avatar

Block or report n3m1sys

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Dynamic and static analysis with Real Time Malware/Executable Analysis Platform for Windows, including open-source XDR (2 EDR projects), ClamAV, YARA-X, machine learning AI, behavioral analysis, Un…

YARA 171 14 Updated Apr 1, 2026

Bringing together SBOMs and advisories.

Rust 48 43 Updated Mar 31, 2026

An E-Ink PDA device using the ESP32 S3.

C++ 1,768 98 Updated Mar 31, 2026

Vulnerability scanner for Caido

TypeScript 44 15 Updated Mar 26, 2026

Sync notes between local and cloud with smart conflict: S3 (Amazon S3/Cloudflare R2/Backblaze B2/...), Dropbox, webdav (NextCloud/InfiniCLOUD/Synology/...), OneDrive, Google Drive (GDrive), Box, pC…

TypeScript 7,090 351 Updated Nov 10, 2024

BountyDash is a tool to combine your rewards from all platforms, giving you insights about your progress and bug hunting patterns.

JavaScript 1 Updated Nov 21, 2024

My Notes about Penetration Testing

PowerShell 732 168 Updated Jan 17, 2026

streaming opengl commands, for the benefit of virtual machines

C 9 Updated May 28, 2022

dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!

Python 2,203 192 Updated Oct 6, 2025

"Can I take over DNS?" — a list of DNS providers and how to claim vulnerable domains.

1,085 101 Updated Mar 3, 2025

A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference

Python 5,598 1,136 Updated Aug 6, 2023

"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.

Python 5,616 795 Updated Feb 8, 2025

The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices

Python 641 90 Updated Jul 7, 2025

The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices

Shell 329 52 Updated Jul 11, 2025

Fast passive subdomain enumeration tool.

Go 13,339 1,522 Updated Mar 25, 2026

The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, ffuf, masscan, nuclei, meg and many more!

Shell 4,360 720 Updated Sep 30, 2024

httpx is a fast and multi-purpose HTTP toolkit that allows running multiple probes using the retryablehttp library.

Go 9,758 1,048 Updated Mar 31, 2026

Recursos y material para la asignatura de Estrategias de Programación y Estructuras de Datos del grado de Ingeniería Informática en la UNED

Java 9 2 Updated May 24, 2021

SkySafe Miscellaneous Reverse Engineering Blog

772 54 Updated Jan 11, 2024

MobSF Remote code execution (via CVE-2024-21633)

80 5 Updated Jan 7, 2024

Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing

Python 3,034 470 Updated Mar 7, 2026

Flipper Zero Unleashed Firmware

C 21,304 1,844 Updated Apr 1, 2026

A collective of different IRs for the Flipper

4,004 1,322 Updated Mar 25, 2026

A private Certificate Authority for internal (lab) use, based on the open source ACME Automated Certificate Management Environment implementation from Let's Encrypt (tm).

Go 747 55 Updated Mar 20, 2026

A script to automate privilege escalation with CVE-2023-22809 vulnerability

Shell 163 35 Updated Feb 15, 2023

PlayStation 2 DVD Player Exploit

C 2,433 157 Updated Feb 2, 2022

Relatively Insecure System for Keys and Secrets

HTML 13 2 Updated Apr 2, 2019
Next