Skip to content
View pr0b3r7's full-sized avatar

Highlights

  • Pro

Organizations

@humanaoffsec @HackerHermanos

Block or report pr0b3r7

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

ATLAS Adversarial ML

AI/ML Security: MITRE ATLAS (atlas.mitre.org) + OWASP LLM Top 10 + Google SAIF. Covers prompt injection, model tampering, data poisoning, agent security, privac
28 repositories

TA0001 Initial Access

Initial Access (TA0001): Gaining initial foothold in target networks. Includes phishing, exploiting public-facing apps, supply chain compromise, valid accounts. https://attack.mitre.org/tactics/TA0001
60 repositories

TA0002 Execution

Execution (TA0002): Running malicious code on target systems. Includes command interpreters, scripting, native APIs, exploitation for client execution. https://attack.mitre.org/tactics/TA0002
319 repositories

TA0003 Persistence

Persistence (TA0003): Maintaining access across restarts and credential changes. Includes registry run keys, scheduled tasks, bootkit, implants, account manipulation. https://attack.mitre.org/tactics/TA0003
34 repositories

TA0004 Privilege Escalation

Privilege Escalation (TA0004): Gaining higher-level permissions. Includes exploitation, access token manipulation, UAC bypass, AD escalation, sudo/setuid abuse. https://attack.mitre.org/tactics/TA0004
92 repositories

TA0005 Defense Evasion

Defense Evasion (TA0005): Avoiding detection. Includes obfuscation, disabling security tools, process injection, masquerading, AMSI/ETW bypass, rootkits. https://attack.mitre.org/tactics/TA0005
325 repositories

TA0006 Credential Access

Credential Access (TA0006): Stealing credentials. Includes password dumping, Kerberoasting, credential harvesting, brute force, keylogging, LSASS access. https://attack.mitre.org/tactics/TA0006
135 repositories

TA0007 Discovery

Discovery (TA0007): Understanding target environment. Includes network enumeration, AD recon, system info gathering, account discovery, BloodHound. https://attack.mitre.org/tactics/TA0007
151 repositories

TA0008 Lateral Movement

Lateral Movement (TA0008): Moving through the network. Includes pass-the-hash, RDP, SMB/WMI exec, SSH tunneling, pivoting, proxychains. https://attack.mitre.org/tactics/TA0008
78 repositories

TA0009 Collection

Collection (TA0009): Gathering target data. Includes screen capture, keylogging, email harvesting, clipboard data, memory dumping, secret scanning. https://attack.mitre.org/tactics/TA0009
21 repositories

TA0010 Exfiltration

Exfiltration (TA0010): Stealing data from target. Includes covert channels, DNS tunneling, steganography, encrypted transfers, cloud storage abuse. https://attack.mitre.org/tactics/TA0010
10 repositories

TA0011 Command and Control (C2)

Command and Control (TA0011): Communicating with compromised systems. Includes C2 frameworks (Cobalt Strike, Sliver), domain fronting, protocol tunneling. https://attack.mitre.org/tactics/TA0011
247 repositories

TA0040 Impact

Impact (TA0040): Disrupting availability or integrity. Includes ransomware, data destruction, defacement, resource hijacking, service disruption. https://attack.mitre.org/tactics/TA0040
6 repositories

TA0042 Resource Development

Resource Development (TA0042): Building attack infrastructure. Includes payload development, infrastructure setup, capability acquisition, tool compilation. https://attack.mitre.org/tactics/TA0042
419 repositories

TA0043 Reconnaissance

Reconnaissance (TA0043): Gathering target information. Includes OSINT, subdomain enumeration, network scanning, social engineering research. https://attack.mitre.org/tactics/TA0043
168 repositories

Threat Hunting

Threat Hunting related repositories
123 repositories

Starred repositories

195 stars written in Shell
Clear filter

🙃 A delightful community-driven (with 2,400+ contributors) framework for managing your zsh configuration. Includes 300+ optional plugins (rails, git, macOS, hub, docker, homebrew, node, php, python…

Shell 186,036 26,339 Updated Apr 7, 2026

A black hole for Internet advertisements

Shell 56,474 3,008 Updated Apr 6, 2026

A Zsh theme

Shell 53,667 2,400 Updated Mar 14, 2026

Run macOS VM in a Docker! Run near native OSX-KVM in Docker! X11 Forwarding! CI/CD for OS X Security Research! Docker mac Containers.

Shell 52,398 2,901 Updated Nov 11, 2025

Fish-like autosuggestions for zsh

Shell 35,244 1,926 Updated Jun 24, 2025

🔧 .files, including ~/.macos — sensible hacker defaults for macOS

Shell 31,294 8,561 Updated Aug 5, 2024

Oh my tmux! My self-contained, pretty & versatile tmux configuration made with 💛🩷💙🖤❤️🤍

Shell 24,643 3,563 Updated Feb 21, 2026

Fish shell like syntax highlighting for Zsh.

Shell 22,476 1,368 Updated Feb 8, 2026

Set up your own OpenVPN server on Debian, Ubuntu, Fedora, CentOS, Arch Linux and more

Shell 15,722 3,292 Updated Mar 26, 2026

Tmux Plugin Manager

Shell 14,459 484 Updated Aug 5, 2024

Persists tmux environment across system restarts.

Shell 12,633 499 Updated Aug 13, 2024

OSS-Fuzz - continuous fuzzing for open source software.

Shell 12,072 2,687 Updated Apr 8, 2026

The official Pi-hole Docker image from pi-hole.net

Shell 10,942 1,227 Updated Apr 4, 2026

A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more

Shell 10,429 999 Updated Apr 8, 2026

Attack Surface Management Platform

Shell 9,650 2,041 Updated Feb 15, 2026

List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.

Shell 9,428 1,578 Updated Oct 16, 2025

Testing TLS/SSL encryption anywhere on any port

Shell 8,983 1,118 Updated Apr 7, 2026

Scripted Local Linux Enumeration & Privilege Escalation Checks

Shell 7,889 2,022 Updated Sep 6, 2023

reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities

Shell 7,423 1,147 Updated Mar 25, 2026

Mac setup and configuration via Ansible.

Shell 6,919 1,883 Updated Feb 3, 2026

🤖 Real-time type-ahead completion for Zsh. Asynchronous find-as-you-type autocompletion.

Shell 6,498 186 Updated Apr 1, 2026

Linux privilege escalation auditing tool

Shell 6,451 1,159 Updated Mar 20, 2026

A next-generation plugin manager for zsh — manage plugins, commands, and themes from GitHub, Bitbucket, oh-my-zsh, prezto, and more with parallel installation and lazy loading.

Shell 6,004 228 Updated Mar 4, 2026

Zim Framework: The Zsh configuration framework with blazing speed and modular extensions.

Shell 4,581 183 Updated Jan 8, 2026

The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, ffuf, masscan, nuclei, meg and many more!

Shell 4,367 717 Updated Sep 30, 2024

📁 A simple file manager written in bash.

Shell 4,177 191 Updated Feb 29, 2024

Mona Sans, a variable font from GitHub

Shell 4,025 111 Updated Mar 17, 2026

Linux enumeration tool for pentesting and CTFs with verbosity levels

Shell 3,882 607 Updated Dec 25, 2023

Various *nix tools built as statically-linked binaries

Shell 3,662 617 Updated Aug 21, 2023

A script that you can run in the background!

Shell 3,060 856 Updated Jul 30, 2024
Next