- All languages
- ActionScript
- Assembly
- Batchfile
- Bicep
- BlitzBasic
- Boo
- C
- C#
- C++
- CSS
- CodeQL
- Dockerfile
- Go
- Groovy
- HCL
- HTML
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- Lua
- MDX
- Makefile
- Markdown
- Meson
- Nim
- Nix
- OCaml
- OpenEdge ABL
- PHP
- Perl
- PowerShell
- Python
- Ruby
- Rust
- SCSS
- SaltStack
- Shell
- Swift
- TeX
- TypeScript
- Vim Script
- Vue
- XSLT
- YARA
- Zig
Starred repositories
IDA Pro plugin which improves work with HexRays decompiler and helps in process of reconstruction structures and classes
A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for security professionals and CTF players.
Obtain GraphQL API schema even if the introspection is disabled
Exploits written by the Rhino Security Labs team
DNSChef - DNS proxy for Penetration Testers and Malware Analysts
Scripts I use during pentest engagements.
A Course on Intermediate Level Linux Exploitation
Collection of things made during my OSCP journey
My collection of various security tools created mostly in Python and Bash. For CTFs and Bug Bounty.
Author your AWS Lambda functions in Go, effectively.
A database of common, interesting or useful commands, in one handy referable form
Python PTY backdoors - full PTY or nothing!
Identify privilege escalation paths within and across different clouds
An archive of low-level CTF challenges developed over the years
Collection of scripts and resources for DevSecOps and Automated Incident Response Security
A curated list of intriguing open-source security tools, with my reviews and insights.
A set of Linux binary exploitation tasks for beginners on various architectures
Scripts that are useful for me on pen tests
A series of tutorials about radare2 framework from https://www.megabeets.net
Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple active information gathering phases.
Bugcrowd’s baseline priority ratings for common security vulnerabilities