Skip to content
View ihebski's full-sized avatar
🔥
drunk ! 🍻
🔥
drunk ! 🍻

Block or report ihebski

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

45 results for forked starred repositories written in Arduino
Clear filter

An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the raw data, and give data in multiple formats.

Python 3,184 443 Updated May 23, 2020

Identify email addresses or domains names that belong to colleges or universities. Help automate the process of approving or rejecting academic discounts.

Kotlin 2,104 31,104 Updated Nov 10, 2025

HTTP file upload scanner for Burp Proxy

Perl 415 66 Updated Apr 20, 2023

A Win7 RDP exploit

Python 112 48 Updated May 17, 2019

Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR

C 104 6 Updated Jul 22, 2021

DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. It will automatically generate a userlist from the domain which excludes accounts t…

PowerShell 97 9 Updated Oct 13, 2022

Burp extension to detect alias traversal via NGINX misconfiguration at scale.

Python 54 7 Updated Dec 3, 2021

cve-2019-0604 SharePoint RCE exploit

Python 40 2 Updated Jun 26, 2019

A collection of open source and commercial tools that aid in red team operations.

36 24 Updated May 2, 2018

A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.

Java 34 1 Updated Sep 19, 2016

Collection of Cyber Threat Intelligence sources from the deep and dark web

19 1 Updated Mar 11, 2025

Python script that acts like the original sudo binary to fool users into entering their passwords

Python 19 14 Updated Oct 2, 2016

Issues to consider when planning a red team exercise.

15 1 Updated Aug 22, 2017

Automagically reverse-engineer REST APIs via capturing traffic

HTML 11 1 Updated Dec 12, 2024

Credentials recovery project

Python 10 8 Updated May 12, 2015

Rewrite of the popular wireless network auditor, "wifite"

Python 10 Updated Jun 26, 2017

transform your payload.exe into one fake word doc (.ppt)

Shell 8 8 Updated Jun 7, 2023

Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].

7 Updated Mar 27, 2022

Social Media OSINT collection containing - tools, techniques & tradecraft.

5 Updated May 31, 2023

Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace.

Shell 5 1 Updated Jul 27, 2019

Scripts to help with different ffuf tasks and workflows

Shell 5 Updated Jul 26, 2022

CVE-2021-22986 F5 BIG-IP iControl 命令执行漏洞

Python 4 1 Updated Mar 21, 2021

bash script for Subdomain Enumeration

Shell 3 Updated Oct 3, 2023

Active Directory and Internal Pentest Cheatsheets

HTML 3 1 Updated Mar 29, 2024

Directory transversal to remote code execution

Shell 3 1 Updated Oct 15, 2019

🏔 Love Freedom - ❌ Block Mass Surveillance

Go 2 Updated Apr 15, 2022

Detection Ideas & Rules repository.

2 Updated Aug 19, 2021

ISO 27001 Toolkit by QZ

2 Updated Dec 12, 2022
Next