- Athens, Greece
- https://stasinopoulos.github.io/
- @ancst
Stars
📚 Freely available programming books
A collection of various awesome lists for hackers, pentesters and security researchers
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
The Moby Project - a collaborative project for the container ecosystem to assemble container-based systems
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
Original Apollo 11 Guidance Computer (AGC) source code for the command and lunar modules.
Run macOS VM in a Docker! Run near native OSX-KVM in Docker! X11 Forwarding! CI/CD for OS X Security Research! Docker mac Containers.
The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.
Automatic SQL injection and database takeover tool
Certbot is EFF's tool to obtain certs from Let's Encrypt and (optionally) auto-enable HTTPS on your server. It can also act as a client for any other CA that uses the ACME protocol.
A book-in-progress about the Linux kernel and its insides.
Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabling collaboration to tackle trending vulnerabilities on the …
Over 450 terminal color schemes/themes for iTerm/iTerm2. Includes ports to Terminal, Konsole, PuTTY, Xresources, XRDB, Remmina, Termite, XFCE, Tilda, FreeBSD VT, Terminator, Kitty, MobaXterm, LXTer…
World's fastest and most advanced password recovery utility
A collection of awesome penetration testing resources, tools and other shiny things
Find, verify, and analyze leaked credentials
Run macOS on QEMU/KVM. With OpenCore + Monterey + Ventura + Sonoma support now! Only commercial (paid) support is available now to avoid spammy issues. No Mac system is required.
🐬 A collection of awesome resources for the Flipper Zero device.
Community guide to securing and improving privacy on macOS.
A little tool to play with Windows security
Pre-Built Vulnerable Environments Based on Docker-Compose
The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.
ZeroNet - Decentralized websites using Bitcoin crypto and BitTorrent network
Build and run Docker containers leveraging NVIDIA GPUs
A web-based collaborative LaTeX editor
NVIDIA Linux open GPU kernel module source