Skip to content
View nyxgeek's full-sized avatar

Highlights

  • Pro

Block or report nyxgeek

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
66 stars written in C
Clear filter

TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.

C 25,498 3,199 Updated Mar 31, 2026

A little tool to play with Windows security

C 21,391 4,054 Updated May 11, 2025

John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs

C 12,960 2,468 Updated Apr 9, 2026

proxychains ng (new generation) - a preloader which hooks calls to sockets in dynamically linked programs and redirects it through one or more socks/http proxies. continuation of the unmaintained p…

C 10,554 1,207 Updated Jan 11, 2026

Direct Memory Access (DMA) Attack Software

C 7,552 986 Updated Apr 8, 2026

Defeating Windows User Account Control

C 7,483 1,420 Updated Feb 17, 2026

Transmits AM radio on computers without radio transmitting hardware.

C 6,665 402 Updated Mar 18, 2026

xrdp: an open source RDP server

C 6,573 1,752 Updated Apr 7, 2026

The firmware for the HackRF+PortaPack H1/H2/H4/H4M

C 5,021 860 Updated Apr 10, 2026

A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC/RFID) readers. It can disable Chip&PIN and predict AMEX car…

C 4,109 622 Updated Jul 3, 2022

A tool to dump the login password from the current linux user

C 4,088 648 Updated Sep 5, 2025

Portable OpenSSH

C 3,781 2,063 Updated Apr 2, 2026

Tutorial: Writing a "bare metal" operating system for Raspberry Pi 4

C 3,740 274 Updated Feb 3, 2025

Proxmark 3

C 3,466 944 Updated Jan 2, 2026

Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.

C 2,481 339 Updated Sep 22, 2024

A small set of tools to convert packets from capture files to hash files for use with Hashcat or John the Ripper.

C 2,358 434 Updated Apr 2, 2026

Small tool to capture packets from wlan devices.

C 2,114 416 Updated Apr 6, 2026

The swiss army knife of LSASS dumping

C 2,087 263 Updated Sep 17, 2024

Software, firmware, and hardware designs for Ubertooth

C 2,085 448 Updated Mar 19, 2026

CVE-2021-4034 1day

C 2,037 511 Updated Jun 8, 2022

Tools for handling firmwares of DJI products, with focus on quadcopters.

C 2,024 485 Updated Nov 9, 2025

Unified repository for different Metasploit Framework payloads

C 1,987 721 Updated Apr 3, 2026

Python interface to Bluetooth LE on Linux

C 1,635 490 Updated Jun 24, 2024

Post Exploitation Collection

C 1,572 359 Updated May 1, 2020

TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.

C 1,315 278 Updated Jan 31, 2022

Ncrack network authentication tool

C 1,201 264 Updated Apr 14, 2024

general-purpose software audio FSK modem

C 961 127 Updated Apr 17, 2024

Crack and decrypt BLE encryption

C 954 134 Updated Aug 26, 2021

Repository hosting the bluehammer vulnerability

C 860 310 Updated Apr 9, 2026

Medusa is a speedy, parallel, and modular, login brute-forcer.

C 855 197 Updated May 14, 2025
Next