Skip to content
View Big-J87's full-sized avatar

Block or report Big-J87

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

50 results for forked starred repositories
Clear filter

Intel, AMD, VIA & Freescale CPU Microcode Repositories

3 Updated Sep 9, 2025

World's fastest and most advanced password recovery utility

C 2 Updated Apr 26, 2025

The Magic Mask for Android

C++ 2 Updated Oct 11, 2024

Miscellaneous documents

6 1 Updated Aug 21, 2024

This python program gets all the saved passwords, credit cards and bookmarks from chromium based browsers supports chromium 80 and above!

Python 2 Updated Jul 12, 2024

A swiss army knife for pentesting networks

Python 21 1 Updated Mar 16, 2023

UNIX-like reverse engineering framework and command-line toolset

C 2 Updated Nov 23, 2022

This OSINT Notebook provides an overview of the tools, techniques, and resources that I use for a variety of situations when it comes to performing reconaissance and OSINT operations. This Notebook…

3 Updated Nov 21, 2022

A curated checklist of tasks to be done during engagements

2 Updated Oct 29, 2022

Elastic.co products hands-on training materials

HTML 12 1 Updated Sep 13, 2022

Sniffcon has a wide list of powerful online bug bounty tools which can be used to find security vulnerabilities.

1 Updated Jul 12, 2022

Interactive Tutorials

Python 1 Updated Jul 1, 2022

The motive to build this repo is to help beginner to start learn Android Pentesting by providing a roadmap.

1 Updated Jun 27, 2022

A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud

1 Updated May 24, 2022

Digital Forensics Guide

Python 1 Updated May 1, 2022

🔮 Uncover parts of mutuals followers of an instagram private account

Python 16 Updated Mar 31, 2022

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…

PHP 12 4 Updated Aug 22, 2021

holehe allows you to check if the mail is used on different sites like twitter, instagram and will retrieve information on sites with the forgotten password function.

Python 40 Updated Feb 11, 2021

A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.

PowerShell 1 Updated Nov 14, 2020

NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewall, just by the victim visiting a website

Perl 1 Updated Nov 1, 2020

🐚 Use your terminal shell to do awesome things.

1 Updated Oct 27, 2020

OSINT Tool for Mails

Python 1 Updated Oct 25, 2020

A fast sub domain brute tool for pentesters

Python 1 Updated Oct 16, 2020

code version py3 of Black Hat Python book🏴‍☠️

Python 1 1 Updated Oct 13, 2020

The Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.

Shell 1 Updated Oct 6, 2020

A single script for all the tools you need for bug bounty

Shell 1 Updated Oct 2, 2020
Next