Skip to content
View nyxgeek's full-sized avatar

Highlights

  • Pro

Block or report nyxgeek

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
64 stars written in C
Clear filter

TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.

C 25,158 3,190 Updated Jun 5, 2025

A little tool to play with Windows security

C 21,116 4,009 Updated May 11, 2025

John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs

C 12,406 2,405 Updated Dec 12, 2025

proxychains ng (new generation) - a preloader which hooks calls to sockets in dynamically linked programs and redirects it through one or more socks/http proxies. continuation of the unmaintained p…

C 10,399 1,221 Updated Oct 18, 2025

Direct Memory Access (DMA) Attack Software

C 7,286 961 Updated Dec 3, 2025

Defeating Windows User Account Control

C 7,204 1,404 Updated Dec 14, 2025

Transmits AM radio on computers without radio transmitting hardware.

C 6,642 402 Updated Sep 25, 2024

xrdp: an open source RDP server

C 6,438 1,737 Updated Dec 3, 2025

Custom firmware for the HackRF+PortaPack H1/H2/H4

C 4,688 794 Updated Dec 18, 2025

A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC/RFID) readers. It can disable Chip&PIN and predict AMEX car…

C 4,077 618 Updated Jul 3, 2022

A tool to dump the login password from the current linux user

C 4,058 650 Updated Sep 5, 2025

Tutorial: Writing a "bare metal" operating system for Raspberry Pi 4

C 3,690 272 Updated Feb 3, 2025

Portable OpenSSH

C 3,622 1,991 Updated Dec 19, 2025

Proxmark 3

C 3,397 938 Updated Feb 3, 2024

Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.

C 2,422 333 Updated Sep 22, 2024

A small set of tools to convert packets from capture files to hash files for use with Hashcat or John the Ripper.

C 2,284 425 Updated Dec 10, 2025

Software, firmware, and hardware designs for Ubertooth

C 2,069 444 Updated Jan 25, 2024

Small tool to capture packets from wlan devices.

C 2,051 413 Updated Dec 19, 2025

The swiss army knife of LSASS dumping

C 2,044 258 Updated Sep 17, 2024

CVE-2021-4034 1day

C 2,020 510 Updated Jun 8, 2022

Unified repository for different Metasploit Framework payloads

C 1,932 713 Updated Dec 3, 2025

Tools for handling firmwares of DJI products, with focus on quadcopters.

C 1,928 465 Updated Nov 9, 2025

Python interface to Bluetooth LE on Linux

C 1,633 492 Updated Jun 24, 2024

Post Exploitation Collection

C 1,573 360 Updated May 1, 2020

TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.

C 1,304 279 Updated Jan 31, 2022

Ncrack network authentication tool

C 1,178 260 Updated Apr 14, 2024

Crack and decrypt BLE encryption

C 941 132 Updated Aug 26, 2021

general-purpose software audio FSK modem

C 940 124 Updated Apr 17, 2024

Medusa is a speedy, parallel, and modular, login brute-forcer.

C 831 193 Updated May 14, 2025

IEEE 802.15.4/ZigBee Security Research Toolkit

C 824 227 Updated Sep 12, 2023
Next