Skip to content
View n3m1sys's full-sized avatar

Block or report n3m1sys

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Dynamic and static analysis with Real Time Malware Analysis with Antivirus for Windows, including open-source XDR (3 EDR projects), ClamAV, YARA-X, machine learning AI, behavioral analysis, Unpacke…

YARA 180 16 Updated Apr 18, 2026

Bringing together SBOMs and advisories.

Rust 51 44 Updated Apr 17, 2026

An E-Ink PDA device using the ESP32 S3.

C++ 1,805 98 Updated Apr 16, 2026

Vulnerability scanner for Caido

TypeScript 45 15 Updated Mar 26, 2026

Sync notes between local and cloud with smart conflict: S3 (Amazon S3/Cloudflare R2/Backblaze B2/...), Dropbox, webdav (NextCloud/InfiniCLOUD/Synology/...), OneDrive, Google Drive (GDrive), Box, pC…

TypeScript 7,248 371 Updated Nov 10, 2024

BountyDash is a tool to combine your rewards from all platforms, giving you insights about your progress and bug hunting patterns.

JavaScript 1 Updated Nov 21, 2024

My Notes about Penetration Testing

PowerShell 734 168 Updated Jan 17, 2026

streaming opengl commands, for the benefit of virtual machines

C 9 Updated May 28, 2022

dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!

Python 2,203 192 Updated Oct 6, 2025

"Can I take over DNS?" — a list of DNS providers and how to claim vulnerable domains.

1,087 102 Updated Mar 3, 2025

A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference

Python 5,645 1,143 Updated Aug 6, 2023

"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.

Python 5,628 798 Updated Feb 8, 2025

The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices

Python 641 89 Updated Jul 7, 2025

The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices

Shell 330 51 Updated Jul 11, 2025

Fast passive subdomain enumeration tool.

Go 13,457 1,535 Updated Apr 18, 2026

The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, ffuf, masscan, nuclei, meg and many more!

Shell 4,366 715 Updated Sep 30, 2024

httpx is a fast and multi-purpose HTTP toolkit that allows running multiple probes using the retryablehttp library.

Go 9,822 1,054 Updated Apr 15, 2026

Recursos y material para la asignatura de Estrategias de Programación y Estructuras de Datos del grado de Ingeniería Informática en la UNED

Java 9 2 Updated May 24, 2021

SkySafe Miscellaneous Reverse Engineering Blog

774 54 Updated Jan 11, 2024

MobSF Remote code execution (via CVE-2024-21633)

80 5 Updated Jan 7, 2024

Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing

Python 3,050 470 Updated Mar 7, 2026

Flipper Zero Unleashed Firmware

C 21,409 1,855 Updated Apr 1, 2026

A collective of different IRs for the Flipper

4,041 1,335 Updated Apr 12, 2026

A private Certificate Authority for internal (lab) use, based on the open source ACME Automated Certificate Management Environment implementation from Let's Encrypt (tm).

Go 762 56 Updated Apr 9, 2026

A script to automate privilege escalation with CVE-2023-22809 vulnerability

Shell 164 35 Updated Feb 15, 2023

PlayStation 2 DVD Player Exploit

C 2,439 157 Updated Feb 2, 2022

Relatively Insecure System for Keys and Secrets

HTML 13 2 Updated Apr 2, 2019
Next