Skip to content
View LucaReggiannini's full-sized avatar

Block or report LucaReggiannini

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

⛅ The right way to check the weather

Python 28,798 1,208 Updated Oct 13, 2025

A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compiled for educational purposes. The contents of this repository…

1,134 131 Updated Jul 19, 2024

Single-file PHP shell

PHP 2,715 687 Updated Aug 11, 2025

Penetration testing notes consolidated from many sources including courses, certifications, videos, and other documented notes

48 5 Updated Nov 23, 2024

Main Sigma Rule Repository

Python 10,118 2,542 Updated Feb 16, 2026

Small and highly portable detection tests based on MITRE's ATT&CK.

C 11,588 3,060 Updated Feb 16, 2026

UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It automates the collection of artifacts from a wide range of U…

Shell 1,239 178 Updated Feb 5, 2026

🎲 An open source app to choose randomly between numbers, answers, options and so on

Java 197 20 Updated Sep 14, 2025

Grab cam shots & GPS location from target's phone front camera or PC webcam just sending a link.

HTML 4,533 1,239 Updated Apr 29, 2025

Cross-Platform Android Remote Administration Tool | Official maintained repository for the AhMyth R.A.T Project | A dedicated revival of the original repository at https://GitHub.com/AhMyth/AhMyth-…

Smali 1,300 328 Updated Jan 27, 2026

Research notes

Jupyter Notebook 132 13 Updated Dec 6, 2024

Tool to extract indicators of compromise from security reports in PDF format

Python 439 173 Updated Feb 24, 2023

Sample queries for Advanced hunting in Microsoft 365 Defender

Jupyter Notebook 2,050 571 Updated Feb 17, 2022

QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login with QR code” feature as a secure way to login into account…

Python 1,507 657 Updated Aug 7, 2025

VLC extension to remove videos from the filesystem

Lua 107 19 Updated Dec 25, 2025

Suckless Shop Front using Hugo

HTML 37 9 Updated Sep 30, 2025

A curated list of Awesome Threat Intelligence Blogs

497 56 Updated Feb 16, 2026

a replacement for the image viewing mode built into Firefox and Chrome-based web browsers.

TypeScript 457 23 Updated Aug 2, 2025

A zero dependencies, customizable, pure Javascript widget for navigating, managing, uploading, and downloading files and folders or other hierarchical object structures on any modern web browser.

JavaScript 294 54 Updated Jul 2, 2024

a small statically-linked linux system

Roff 3,034 88 Updated Feb 8, 2026

Various Process Injection Techniques

C++ 163 24 Updated Jun 14, 2022

x64dbg plugin to bypass Themida 3.x Anti-Debugger / VM / Monitoring programs checks (x64)

C 554 104 Updated May 7, 2021

🏡 A Book for Anyone to Get Started with Unix

CSS 1,304 2,254 Updated Aug 3, 2024