Lists (1)
Sort Name ascending (A-Z)
Starred repositories
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
A comprehensive toolbox for model inversion attacks and defenses, which is easy to get started.
A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware—mirror of https://github.com/processhacker2/processhacker.git
Deep Packet Inspection • Traffic Forensics • Network Threat Detection
E-books related to hacking helps you to know more about hacking
Agentic pentest tooling. Currently achieving 80% (KIMI K2.5) on XBOW's benchmark in full black-box. Completely Self-hosted. Every model available on LiteLLM (Ollama, anthropic, openai...)
Pixel Sorter Studio is an application that lets you create pixel sorted images with a lot of parameters, stacking, undo, and file save. Now supports recording/executing user input sequence!
Gather results of dorks across a number of search engines
A Convolutional Neural Network implemented entirely from scratch in x86-64 assembly using AVX-512, performing cat vs dog image classification without any ML frameworks or libraries.
Study Notes for the OSCP Content You will find notes from various resources like OSCP from Nakerah Network, Practical Ethical Hacking(PEH) course from TCM security, and more
graphw00f is GraphQL Server Engine Fingerprinting utility for software security professionals looking to learn more about what technology is behind a given GraphQL endpoint.
Tool for Active Directory Certificate Services enumeration and abuse
Python version of the C# tool for "Shadow Credentials" attacks
Open-source Windows and Office activator featuring HWID, Ohook, TSforge, and Online KMS activation methods, along with advanced troubleshooting.
A feature-rich command-line audio/video downloader
real time face swap and one-click video deepfake with only a single image
A collection of code snippets built to assist with breaking chains.
PEN-300 collection to help you on your exam.
A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.