Skip to content
View VastGsm's full-sized avatar

Block or report VastGsm

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

46 results for sponsorable starred repositories
Clear filter

Tool to spam comments in Instagram Posts. Useful for winning Giveaways.

JavaScript 13 2 Updated Jul 2, 2021

A combined docker image for the unified deployment of itsToggle's, yowmamasita's, and ncw's projects -- plex_debrid, zurg, and rclone

Python 246 19 Updated Aug 18, 2025

NHLauncher is an application that makes it easier and faster to launch pentesting tools

HTML 254 20 Updated Mar 22, 2024

Share, discover, and collect prompts from the community. Free and open source — self-host for your organization with complete privacy.

TypeScript 140,110 18,586 Updated Dec 22, 2025

リアルタイムボイスチェンジャー Realtime Voice Changer

Python 19,328 2,201 Updated Aug 24, 2025

Generate a cross join, also known as a Cartesian product, from the lines of the specified files. This process is useful for creating fuzzing payloads.

Go 21 2 Updated Jun 29, 2023

A small tool built to find and fix common misconfigurations in Active Directory Certificate Services.

PowerShell 1,395 131 Updated Nov 28, 2025

Windows x64 kernel mode rootkit process hollowing POC.

C++ 189 26 Updated Jun 30, 2023

Awesome Incident Response

PowerShell 283 22 Updated Sep 27, 2025

Takes a list of URLs and returns their HTTP response codes

Go 401 47 Updated Oct 17, 2023

Simple (relatively) things allowing you to dig a bit deeper than usual.

C 3,425 553 Updated Oct 20, 2025

Mobile Hacker's Weapons / A collection of cool tools used by Mobile hackers. Happy hacking , Happy bug-hunting

Ruby 1,016 165 Updated Dec 18, 2025

reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities

Shell 6,997 1,101 Updated Dec 11, 2025

Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoconfiguration enabled by default (every major OS), will start…

Lua 105 5 Updated Nov 6, 2023

During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Here is a simple way to evade anti-virus …

746 85 Updated Oct 25, 2025

Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!

Ruby 1,834 229 Updated Dec 15, 2025

All about bug bounty (bypasses, payloads, and etc)

6,543 1,235 Updated Sep 8, 2023

Cloning apk for bypassing code tampering detection, Google Safety Net and scanning vulnerable plugins

Python 84 10 Updated Jun 16, 2023

A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more

Shell 9,885 933 Updated Dec 10, 2025

Collection of android malware samples

Shell 1,173 375 Updated Jul 12, 2025

🔪Swiss-army knife for Android testing and development 🔪 ⛺

Python 1,337 83 Updated Dec 18, 2025

A collection of android security related resources

Shell 9,032 1,527 Updated Dec 22, 2025

Identify virtual hosts by similarity comparison

Go 133 21 Updated Aug 12, 2024

iCloud Activation iOS 12.5.1 bypass tool for macOS (iOS 12.4, iOS 12.4+, iOS 12.5, iOS 12.5+, iOS 12.5.1, iOS 12.5.2, iOS 12.5.3, iOS 12.5.4, iOS 12.5.5, iOS 12.5.6, iOS 12.5.7, iOS 12.5.8, iOS 12.…

Shell 300 70 Updated Oct 28, 2021

A list of useful payloads and bypass for Web Application Security and Pentest/CTF

Python 73,214 16,383 Updated Dec 12, 2025

Script OBS with PowerShell

PowerShell 69 4 Updated Nov 11, 2025

This repository is a collection of powershell functions every hacker should know

PowerShell 1,410 170 Updated Jun 16, 2024

Threadless Process Injection through entry point hijacking

Rust 349 35 Updated Sep 10, 2024

Run PowerShell command without invoking powershell.exe

Python 1,525 256 Updated Mar 23, 2023
Next