Skip to content
View royharoush's full-sized avatar

Block or report royharoush

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

188 results for sponsorable starred repositories
Clear filter

AI featured threat modeling and security review project

Python 16 5 Updated Nov 17, 2024

BloodyAD is an Active Directory Privilege Escalation Framework

Python 2,032 195 Updated Dec 11, 2025

Use a LLM to create the ultimate Leek AI for Leek Wars! 🥬

Python 17 4 Updated May 2, 2024

Repurpose your YouTube videos by converting them into blog posts.

Python 173 13 Updated May 1, 2024

List of ngrok/Cloudflare Tunnel alternatives and other tunneling software and services. Focus on self-hosting.

3 Updated Apr 24, 2024

Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI

HTML 990 118 Updated May 10, 2025

An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws

Python 3,825 408 Updated Oct 4, 2025

Active Directory and Internal Pentest Cheatsheets

HTML 1,923 358 Updated Nov 27, 2025

A modular C2 framework

JavaScript 497 90 Updated Dec 4, 2025

Template-Driven AV/EDR Evasion Framework

Assembly 1,754 277 Updated Nov 3, 2023

evilginx3 + gophish

Go 1,924 375 Updated Jun 15, 2024

Source code for modules placed in PowerShell Gallery and on my https://doitpshway.com blog.

PowerShell 109 18 Updated Dec 17, 2025

Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information

PowerShell 77 18 Updated Dec 7, 2025

A crossplatform mDNS enumeration tool.

HTML 362 21 Updated Sep 25, 2022

latest version of scanners for IIS short filename (8.3) disclosure vulnerability

Java 1,606 268 Updated Sep 3, 2023

AzureRT - A Powershell module implementing various Azure Red Team tactics

PowerShell 236 31 Updated Jun 17, 2022

TikTok Scraper. Download video posts, collect user/trend/hashtag/music feed metadata, sign URL and etc.

TypeScript 46 6 Updated Dec 19, 2021

a drop-in replacement for Nmap powered by shodan.io

Go 3,149 299 Updated May 1, 2025

OpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, Constrained Language Mode and Script Block Logging disabled at startup

C# 538 65 Updated Sep 18, 2022

Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube

Python 107 20 Updated Dec 28, 2023

Monitor creation, deletion and changes to LDAP objects live during your pentest or system administration!

C# 898 74 Updated Oct 30, 2025

Quiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.

Shell 213 42 Updated Jun 23, 2020

How to exploit a double free vulnerability in 2021. Use After Free for Dummies

Python 1,374 66 Updated Jan 31, 2025

The Hunting ELK

Jupyter Notebook 3,902 699 Updated Jun 1, 2024

Golang client for querying SecurityTrails API data

Go 575 62 Updated Sep 5, 2023

Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application

Go 4,960 535 Updated Dec 21, 2024

A docker-powered PaaS that helps you build and manage the lifecycle of applications

Shell 31,628 2,013 Updated Dec 19, 2025

roadmap for a self-taught hacker

2,347 273 Updated Dec 21, 2023

🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes with a neat web app 🔥

Python 1,619 110 Updated Dec 19, 2025
Next