Skip to content
View tibinary25's full-sized avatar
😃
😃

Highlights

  • Pro

Block or report tibinary25

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

A list of useful payloads and bypass for Web Application Security and Pentest/CTF

Python 75,145 16,620 Updated Feb 2, 2026

Hunt down social media accounts by username across social networks

Python 72,647 8,617 Updated Feb 12, 2026

🐙 Guides, papers, lessons, notebooks and resources for prompt engineering, context engineering, RAG, and AI Agents.

MDX 70,270 7,506 Updated Feb 1, 2026

PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)

C# 19,285 3,344 Updated Feb 12, 2026

Impacket is a collection of Python classes for working with network protocols.

Python 15,448 3,863 Updated Feb 9, 2026

A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.

Assembly 13,230 1,208 Updated Feb 9, 2026

This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.

10,115 2,338 Updated Sep 29, 2025

Main Sigma Rule Repository

Python 10,112 2,540 Updated Feb 10, 2026

A curated list of tools for incident response

8,808 1,646 Updated Jul 18, 2024

Scripted Local Linux Enumeration & Privilege Escalation Checks

Shell 7,821 2,032 Updated Sep 6, 2023

game of active directory

PowerShell 7,432 1,026 Updated Jul 16, 2025

An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.

CSS 5,894 1,223 Updated Oct 20, 2025

AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.

Python 5,506 601 Updated Feb 8, 2026

The Network Execution Tool

Python 5,255 661 Updated Feb 12, 2026

⭐️ A curated list of awesome forensic analysis tools and resources

4,902 712 Updated Feb 5, 2026

List of Awesome CobaltStrike Resources

4,384 764 Updated Sep 20, 2023

C++ python bytecode disassembler and decompiler

C++ 4,289 807 Updated Aug 30, 2025

A cross-version Python bytecode decompiler

Python 4,220 452 Updated Feb 8, 2026

MemProcFS

C 4,004 510 Updated Feb 7, 2026

Digging Deeper....

Go 3,757 596 Updated Feb 12, 2026

A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.

Python 3,416 524 Updated Jan 19, 2025

Collaborative forensic timeline analysis

Python 3,267 641 Updated Feb 12, 2026

Mimikatz implementation in pure Python

Python 3,245 416 Updated Jan 2, 2026

Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loading of a library from memory into a host process.

C 3,225 824 Updated Sep 3, 2022

This map lists the essential techniques to bypass anti-virus and EDR

3,145 348 Updated Mar 28, 2025

Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.

Rust 3,018 257 Updated Feb 4, 2026

Malware Configuration And Payload Extraction

Python 3,001 540 Updated Feb 11, 2026

The Official Bash Bunny Payload Repository

PowerShell 2,889 1,488 Updated Feb 2, 2026

My musings with PowerShell

PowerShell 2,705 764 Updated Nov 19, 2021

Personal Website & Blog Theme for Hugo

HTML 2,609 674 Updated Feb 11, 2026
Next