Skip to content
View Hamid-K's full-sized avatar

Block or report Hamid-K

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
43 stars written in HTML
Clear filter

🎓 Path to a free self-taught education in Computer Science!

HTML 199,244 24,787 Updated Aug 23, 2025

Community guide to using YubiKey for GnuPG and SSH - protect secrets with hardware crypto.

HTML 12,080 1,240 Updated Dec 13, 2025

A list of public penetration test reports published by several consulting firms and academic security groups.

HTML 9,287 2,122 Updated Nov 24, 2025

8 Lessons, Kick-start Your Cybersecurity Learning.

HTML 5,969 789 Updated Dec 19, 2025

Automate the creation of a lab environment complete with security tooling and logging best practices

HTML 4,878 1,017 Updated Jul 6, 2024

Windows Events Attack Samples

HTML 2,479 423 Updated Jan 24, 2023

Windows System Call Tables (NT/2000/XP/2003/Vista/7/8/10/11)

HTML 2,470 353 Updated Apr 27, 2025

RootMyTV is a user-friendly exploit for rooting/jailbreaking LG webOS smart TVs.

HTML 2,397 67 Updated Jan 5, 2025

🔐CNCF Security Technical Advisory Group -- secure access, policy control, privacy, auditing, explainability and more!

HTML 2,248 572 Updated Dec 8, 2025

HTTPLeaks - All possible ways, a website can leak HTTP requests

HTML 2,076 206 Updated Oct 23, 2024

All CPU and MCU documentation in one place

HTML 1,967 187 Updated Nov 4, 2022

ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the current state of the target AD environment.

HTML 1,879 296 Updated Jun 15, 2020

CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA tokens.

HTML 1,380 303 Updated May 22, 2020

Track the GPS location of the user's smartphone or PC and capture a picture of the target, along with IP and device information.

HTML 1,236 260 Updated Mar 14, 2025

Tracking interesting Linux (and UNIX) malware. Send PRs

HTML 1,201 94 Updated May 10, 2025

*DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM

HTML 1,099 278 Updated Aug 21, 2018

Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI

HTML 990 118 Updated May 10, 2025

A Nmap XSL implementation with Bootstrap.

HTML 961 184 Updated Nov 13, 2023

All releases of the security research group (a.k.a. hackers) The Hacker's Choice

HTML 742 191 Updated Sep 3, 2025

This tool downloads, installs, and configures a shiny new copy of Chromium.

HTML 470 80 Updated Apr 3, 2024

Content hijacking proof-of-concept using Flash, PDF and Silverlight

HTML 384 97 Updated May 16, 2019

Android application fuzzing framework with fuzzers and crash monitor.

HTML 292 76 Updated Oct 2, 2020

Chrome address spoofing vulnerability proof-of-concept for HTTPS. (Original by David Leo.)

HTML 208 29 Updated Jul 2, 2015

Kubernetes Auto Analyzer

HTML 191 23 Updated Dec 11, 2019

A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office365 users.

HTML 165 20 Updated Jul 31, 2025

A guide + python notebook that helps to collect, analyse and visualise requests sent by a mobile device while using some app.

HTML 142 6 Updated Apr 22, 2025

A static-code-analysis tool for performing security-focused code reviews. It enables an auditor to swiftly map the attack-surface of a large application, with an emphasis on identifying development…

HTML 141 24 Updated Jul 9, 2024

Bluetooth Security Assessment Methodology

HTML 140 16 Updated May 23, 2024
HTML 123 29 Updated Dec 17, 2025
Next