Skip to content
View drk1wi's full-sized avatar

Block or report drk1wi

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

AppSec Ezine Public Repository.

1,209 105 Updated Nov 14, 2025

Tips and Tutorials for Bug Bounty and also Penetration Tests.

1,621 391 Updated Oct 7, 2025

A list of Free Software network services and web applications which can be hosted on your own servers

264,807 12,170 Updated Dec 12, 2025

Qubes containerization on Windows

Python 130 10 Updated Apr 21, 2021

Guidance for mitigation web shells. #nsacyber

YARA 983 209 Updated Jun 18, 2023

Impacket is a collection of Python classes for working with network protocols.

Python 15,252 3,836 Updated Dec 22, 2025

A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.

Assembly 13,036 1,188 Updated Dec 25, 2025

Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android

C++ 1,275 143 Updated Oct 20, 2025

List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.

Shell 9,363 1,575 Updated Oct 16, 2025

Binary Ninja Syscall Annotator

Python 46 14 Updated May 18, 2022

Digital forensic acquisition tool for Windows based incident response.

Python 347 51 Updated May 7, 2024

Detect Frida for Android

C 793 151 Updated Jun 12, 2021

Command line utility for inserting a dylib load command into a Mach-O binary

C 2,001 366 Updated Mar 29, 2025

A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.

199,805 12,183 Updated Nov 19, 2024

Attack and defend active directory using modern post exploitation adversary tradecraft activity

4,775 1,093 Updated Jul 29, 2025

A library that enables dynamically rebinding symbols in Mach-O binaries running on iOS.

C 5,374 986 Updated Aug 1, 2024

An on-path blackbox network traffic security testing tool

Python 2,943 416 Updated Oct 3, 2022

A post-exploitation powershell tool for extracting juicy info from memory.

PowerShell 1,864 333 Updated Jun 28, 2024

Whitebox AES implementation in C++. Chow, Karroumi.

C++ 368 116 Updated Feb 23, 2023

Generate sandboxes for C/C++ libraries automatically

C++ 1,723 195 Updated Oct 16, 2025

Multi Tool Subdomain Enumeration

Python 724 156 Updated Apr 11, 2021

The history of Windows Internals via symbols.

C 181 32 Updated Nov 4, 2021

signed-loaders documents Windows executables that can be used for side-loading DLLs.

PureBasic 70 31 Updated Jan 7, 2019

Class materials for a distributed systems lecture series

9,252 683 Updated Mar 18, 2025

Awesome XSS stuff

JavaScript 5,039 778 Updated Oct 30, 2024

A collection of LLDB aliases/regexes and Python scripts to aid in your debugging sessions

Python 1,861 208 Updated Jul 23, 2025

My Chrome and Safari exploit code + write-up repo

JavaScript 531 106 Updated Nov 5, 2021

An updated collection of resources targeting browser-exploitation.

822 114 Updated Mar 8, 2021

Convert an APK to an Android Studio Project using multiple open-source decompilers

Java 391 72 Updated Sep 18, 2023
Next