Skip to content
View auteqia's full-sized avatar

Highlights

  • Pro

Block or report auteqia

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

A cross-version Python bytecode decompiler

Python 4,180 449 Updated Nov 28, 2025

Volatility 3.0 development

Python 3,776 610 Updated Dec 22, 2025

Fast Incident Response

JavaScript 1,972 516 Updated Dec 8, 2025

Incident Response Methodologies 2022

1,091 183 Updated Apr 11, 2025

FAME Automates Malware Evaluation

Python 921 173 Updated Dec 16, 2025

A phone number can reveal whether a device is active, in standby or offline (and more). This PoC demonstrates how delivery receipts + RTT timing leak sensitive device-activity patterns. (WhatsApp /…

TypeScript 1,421 263 Updated Dec 19, 2025

Digging Deeper....

Go 3,634 576 Updated Dec 23, 2025

The multi-platform memory acquisition tool.

C 911 136 Updated Oct 14, 2025

Repository of yara rules

YARA 4,634 1,056 Updated Apr 17, 2024

C++ python bytecode disassembler and decompiler

C++ 4,201 789 Updated Aug 30, 2025

Python decompiler for 3.7-3.8 Stripped down from uncompyle6 so we can refactor and start to fix up some long-standing problems

Python 1,230 163 Updated Nov 18, 2025

Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static a…

JavaScript 20,031 3,545 Updated Dec 16, 2025

Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.

Go 5,455 846 Updated Apr 17, 2025

Post-exploitation agent for Merlin

Go 202 67 Updated Apr 16, 2025

Noninvasive debugging plugin for X64Dbg

C++ 109 22 Updated Nov 21, 2024

💥 A collection of all documents leaked by former NSA contractor and whistleblower Edward Snowden.

1,274 184 Updated Jan 14, 2020

A few STUXNET samples and live traffic captures from July 2010 while many stuxnet implants were still operational.

29 4 Updated Sep 17, 2024

A list of all Active Directory machines from HackTheBox

189 16 Updated Nov 23, 2025

Privilege escalation to root using sudo chroot, NO NEED for gcc installed.

Shell 44 9 Updated Oct 6, 2025

The IKE Scanner

C 404 62 Updated Sep 15, 2024

A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incident responders in identifying, containing, eradicating, and r…

Jupyter Notebook 152 10 Updated Nov 15, 2023

Transparent proxy through Tor for Kali Linux OS

Shell 1,179 250 Updated Apr 18, 2024

Firepwn is a tool made for testing the Security Rules of a firebase application.

JavaScript 607 35 Updated Oct 19, 2025

🐍 A toolkit for testing, tweaking and cracking JSON Web Tokens

Python 6,278 751 Updated May 1, 2025

A Burp Suite extension for creating and editing JSON Web Tokens. This tool supports signing and verification of JWS, encryption and decryption of JWE and automation of several well-known attacks ag…

Java 39 8 Updated Apr 30, 2025

cbonsai is a bonsai tree generator, written in C using ncurses

Ruby 219 5 Updated Sep 6, 2023

HashDB API hash lookup plugin for IDA Pro

Python 346 47 Updated Oct 9, 2025

Diablo devolved - magic behind the 1996 computer game

C++ 8,939 930 Updated Sep 15, 2025

Diaphora, the most advanced Free and Open Source program diffing tool.

Python 4,124 402 Updated Nov 24, 2024

Workshop: Forensic Analysis of eBPF based Linux Rootkits

C 12 2 Updated Mar 13, 2024
Next