Lists (1)
Sort Name ascending (A-Z)
Starred repositories
Decryptor for HTTP Custom configuration files (WIP)
This article will teach you how to secure a Golang API by implementing two-factor authentication (2FA) using TOTP codes generated by an authenticator app like Google Authenticator or Authy.
Automatic SSRF fuzzer and exploitation tool
"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
In-depth attack surface mapping and asset discovery
Checks to see if you are running the latest version of Go.
A Python Hacking Library consisting of network scanner, arp spoofer and detector, dns spoofer, code injector, packet sniffer, network jammer, email sender, downloader, wireless password harvester c…
Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails, phone numbers and more
Free VMware Workstation Pro 17 full license keys. We've meticulously organized thousands of keys, catering to all major versions of VMware Workstation Pro 17 Choose from our curated selection to en…
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.
The recursive internet scanner for hackers. 🧡
🌐 The Internet Computer! Free, Open-Source, and Self-Hostable.
Chiasmodon is an OSINT tool designed to assist in the process of gathering information about a target domain. Its primary functionality revolves around searching for domain-related data, including …
Simulate the behavior of AV/EDR for malware development training.
A MySQL-compatible relational database with a storage agnostic query engine. Implemented in Go.
Ekultek / IntRec-Pack
Forked from NullArray/IntRec-PackIntelligence and Reconnaissance Package/Bundle installer.
Red Team Attack Lab for TTP testing & research
Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, build your taylor-made EASM tool, co…
This tool is used for backdoor,shellcode generation,Information retrieval and POC arrangement for various architecture devices