Skip to content
View okanonur84's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report okanonur84

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

Showing results

Interactive roadmaps, guides and other educational content to help developers grow in their careers.

TypeScript 342,804 43,296 Updated Nov 5, 2025

OSINT Framework

JavaScript 9,744 1,607 Updated Jun 16, 2025

OSINT Tool Selection Wizard attempt to use a guided approach that connects you to the perfect tools quickly. It serves beginners who feel overwhelmed by available tools and experienced professional…

HTML 1 Updated Aug 8, 2025

Osintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickname

Python 11,716 2,594 Updated Aug 25, 2025

Common User Passwords Profiler (CUPP)

Python 5,052 1,255 Updated Nov 20, 2023

Powerline is a statusline plugin for vim, and provides statuslines and prompts for several other applications, including zsh, bash, tmux, IPython, Awesome and Qtile.

Python 14,632 1,004 Updated Sep 30, 2024

Customize your Bash Prompt by setting the PS1 variable.

TypeScript 765 35 Updated Jun 15, 2025

Rewrite of the popular wireless network auditor, "wifite"

Python 7,363 1,534 Updated Aug 20, 2024

Socket over DNS tunnel

C 85 20 Updated Oct 3, 2019

DeNiSe is a proof of concept for tunneling TCP over DNS in Python

Python 35 14 Updated Dec 17, 2021

proxychains - a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy. Supported auth-types: "user/pass" fo…

C 7,522 669 Updated Jun 8, 2024

Veil 3.1.X (Check version info in Veil at runtime)

Python 4,168 908 Updated Oct 9, 2023

Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.

Python 3,789 827 Updated May 20, 2025

Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren't popular!

9,105 1,620 Updated Oct 4, 2023

Tool to find metadata and hidden information in the documents.

C# 3,330 596 Updated Dec 8, 2022

Ultimate Python study guide 🐍 🐍 🐍

Python 5,670 584 Updated Nov 2, 2025

An opinionated list of awesome Python frameworks, libraries, software and resources.

Python 267,877 26,641 Updated Oct 16, 2025

Dradis Framework: Collaboration and reporting for IT Security teams

Ruby 754 210 Updated Nov 5, 2025

Curated list of public penetration test reports released by several consulting firms and academic security groups

C 71 29 Updated May 15, 2017

Six Degrees of Domain Admin

PowerShell 10,401 1,784 Updated Aug 1, 2025

Empire is a PowerShell and Python post-exploitation agent.

PowerShell 7,720 2,909 Updated Jan 19, 2020

PowerSploit - A PowerShell Post-Exploitation Framework

PowerShell 12,686 4,712 Updated Aug 17, 2020
PHP 3,735 628 Updated Mar 14, 2024

A fully featured backdoor that uses Twitter as a C&C server

Python 785 223 Updated Sep 30, 2020

TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.

C 1,301 278 Updated Jan 31, 2022

DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any machine, powershell modules, and Dropbox servers as a means o…

PowerShell 305 90 Updated Oct 27, 2017

This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported is translated into a WMI-equivalent for use on a network/rem…

PowerShell 832 149 Updated Jun 25, 2024

A WebSocket C2 Tool

Python 409 87 Updated Nov 24, 2017

Hunt for security weaknesses in Kubernetes clusters

Python 4,962 604 Updated Mar 19, 2024

Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark

Go 7,783 1,309 Updated Nov 5, 2025
Next