Skip to content
View vsliman's full-sized avatar
  • 00:48 (UTC -05:00)

Block or report vsliman

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Creating a pocket-sized network pentesting device, offering standalone power, an LCD touch display, and flexibility to conduct on-the-go hacking procedures.📟🥷

35 4 Updated Jan 19, 2025

Codeboard App

Java 634 130 Updated Jul 14, 2025

A Text Editor inside a keyboard, drawing it's inspiration from 8pen and Vim.

Kotlin 540 70 Updated Apr 20, 2025

📑 A website to inspect and edit what's in your Torrent file or Magnet link

JavaScript 1 Updated May 4, 2024

A list of Free and Open Source Software (FOSS) for Android – saving Freedom and Privacy.

Python 8,925 406 Updated Dec 19, 2025

A curated list of GPT agents for cybersecurity

6,368 709 Updated Jul 21, 2024

ShoRAK Recon is a comprehensive tool designed for vulnerability discovery and exploitation, tailored for penetration testers and bug bounty hunters. It integrates multiple well-known cybersecurity …

Shell 7 Updated Jan 1, 2025

Jailbreaks GPT, Sora, Claude, Gemini ,deepseek this prompt unlocks rage mode

429 90 Updated Oct 14, 2025

AI-powered penetration testing assistant for automating recon, note-taking, and vulnerability analysis.

Python 831 114 Updated Dec 2, 2025

Cheat sheets to help you in daily hands-on tasks of trouble shooting, configuration, and diagnostics with Fortinet, HP/Aruba, Cisco, Checkpoint and others' gear.

HTML 347 116 Updated Mar 16, 2025

container image to single executable compiler

Zig 4,849 102 Updated Jan 2, 2025

Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabling collaboration to tackle trending vulnerabilities on the …

Go 26,181 3,016 Updated Dec 22, 2025

Simple python OSINT tool for urls recon thanks to the waybackmachine.

Python 45 7 Updated Jun 19, 2023

Reverse engineering and pentesting for Android applications

Python 1 Updated Aug 31, 2025

A FREE comprehensive reverse engineering course covering x86, x64, 32-bit ARM & 64-bit ARM architectures.

C 10 4 Updated Mar 21, 2021

This is a android spy app, android remote administration tool, android RAT which uploads user data such as contacts, messages, call log, send message(s), photos, videos, open a browser link etc.

Kotlin 38 9 Updated Mar 17, 2020

A list of useful payloads and bypass for Web Application Security and Pentest/CTF

Python 2 Updated Aug 3, 2018

Work in progress...

PHP 774 151 Updated Jun 17, 2025

Bypass 4xx HTTP response status codes and more. The tool is based on Python Requests, PycURL, and HTTP Client.

Python 251 48 Updated Sep 21, 2025

Search Google Dorks like Chad. / Broken link hijacking tool.

Python 30 5 Updated Sep 21, 2025

Work in progress...

JavaScript 457 73 Updated Nov 6, 2025

Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.

Python 101 14 Updated Oct 27, 2024

A visualized overview of the Initial Access Broker (IAB) cybercrime landscape

115 12 Updated Oct 22, 2021

pretrained BERT model for cyber security text, learned CyberSecurity Knowledge

Python 204 35 Updated Apr 28, 2023

MITRE ATT&CK Website

HTML 556 157 Updated Dec 11, 2025

Free universal database tool and SQL client

Java 47,918 3,979 Updated Dec 22, 2025

Java decompiler, assembler, and disassembler

Rust 2,162 234 Updated Jun 2, 2025

Android Mobile app to rule all Flipper's family

Kotlin 1,977 269 Updated Dec 20, 2025

The new generation chameleon based on NRF52840 makes the performance of card emulation more stable. And gave the chameleon the ability to read, write, and decrypt cards.

C 2,049 293 Updated Oct 13, 2025
Next