Skip to content
View okanonur84's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report okanonur84

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

Showing results

Interactive roadmaps, guides and other educational content to help developers grow in their careers.

TypeScript 343,041 43,319 Updated Nov 5, 2025

OSINT Framework

JavaScript 9,758 1,611 Updated Jun 16, 2025

OSINT Tool Selection Wizard attempt to use a guided approach that connects you to the perfect tools quickly. It serves beginners who feel overwhelmed by available tools and experienced professional…

HTML 1 Updated Aug 8, 2025

Osintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickname

Python 11,734 2,598 Updated Aug 25, 2025

Common User Passwords Profiler (CUPP)

Python 5,057 1,257 Updated Nov 20, 2023

Powerline is a statusline plugin for vim, and provides statuslines and prompts for several other applications, including zsh, bash, tmux, IPython, Awesome and Qtile.

Python 14,650 1,012 Updated Sep 30, 2024

Customize your Bash Prompt by setting the PS1 variable.

TypeScript 765 35 Updated Jun 15, 2025

Rewrite of the popular wireless network auditor, "wifite"

Python 7,372 1,531 Updated Aug 20, 2024

Socket over DNS tunnel

C 85 20 Updated Oct 3, 2019

DeNiSe is a proof of concept for tunneling TCP over DNS in Python

Python 36 14 Updated Dec 17, 2021

proxychains - a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy. Supported auth-types: "user/pass" fo…

C 7,527 670 Updated Jun 8, 2024

Veil 3.1.X (Check version info in Veil at runtime)

Python 4,170 909 Updated Oct 9, 2023

Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.

Python 3,790 827 Updated May 20, 2025

Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren't popular!

9,110 1,620 Updated Oct 4, 2023

Tool to find metadata and hidden information in the documents.

C# 3,333 597 Updated Dec 8, 2022

Ultimate Python study guide 🐍 🐍 🐍

Python 5,673 584 Updated Nov 2, 2025

An opinionated list of awesome Python frameworks, libraries, software and resources.

Python 268,324 26,664 Updated Oct 16, 2025

Dradis Framework: Collaboration and reporting for IT Security teams

Ruby 754 210 Updated Nov 7, 2025

Curated list of public penetration test reports released by several consulting firms and academic security groups

C 71 29 Updated May 15, 2017

Six Degrees of Domain Admin

PowerShell 10,404 1,784 Updated Aug 1, 2025

Empire is a PowerShell and Python post-exploitation agent.

PowerShell 7,720 2,911 Updated Jan 19, 2020

PowerSploit - A PowerShell Post-Exploitation Framework

PowerShell 12,695 4,712 Updated Aug 17, 2020
PHP 3,740 628 Updated Mar 14, 2024

A fully featured backdoor that uses Twitter as a C&C server

Python 785 223 Updated Sep 30, 2020

TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.

C 1,301 278 Updated Jan 31, 2022

DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any machine, powershell modules, and Dropbox servers as a means o…

PowerShell 305 90 Updated Oct 27, 2017

This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported is translated into a WMI-equivalent for use on a network/rem…

PowerShell 832 149 Updated Jun 25, 2024

A WebSocket C2 Tool

Python 409 87 Updated Nov 24, 2017

Hunt for security weaknesses in Kubernetes clusters

Python 4,965 605 Updated Mar 19, 2024

Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark

Go 7,788 1,311 Updated Nov 5, 2025
Next