Skip to content
View 0xshyam's full-sized avatar

Block or report 0xshyam

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

ntlm hash cracker

Python 12 2 Updated Dec 12, 2023

Public repo to sync with security-pr

242 176 Updated Feb 3, 2026

Collection of Cyber Threat Intelligence sources from the deep and dark web

6,539 1,106 Updated Feb 4, 2026

Ask a TGS on behalf of another user without password

Pascal 480 68 Updated Mar 30, 2025

OWASP Domain Protect - prevent subdomain takeover

Python 398 64 Updated Dec 23, 2024

A tool for checking if MFA is enabled on multiple Microsoft Services

PowerShell 1,627 224 Updated Mar 4, 2025

CVE-2019-1388 UAC提权 (nt authority\system)

192 51 Updated Nov 21, 2019

📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.

7,515 1,308 Updated Feb 4, 2026

BloodHound Attack Research Kit

PowerShell 583 71 Updated Mar 18, 2025

Source Code Management Attack Toolkit

C# 225 54 Updated Sep 20, 2022

The recursive internet scanner for hackers. 🧡

Python 9,389 766 Updated Feb 3, 2026
Python 433 73 Updated Aug 17, 2022

Attack Graph Visualizer and Explorer (Active Directory) ...Who's *really* Domain Admin?

Go 2,130 209 Updated Nov 11, 2025

Monkey365 provides a tool for security consultants to easily conduct not only Microsoft 365, but also Azure subscriptions and Microsoft Entra ID security configuration reviews.

PowerShell 1,229 136 Updated Feb 4, 2026

Containing my notes, practice binaries + solutions, blog posts, etc. for the Offensive Security Exploit Developer (OSED/EXP-301)

794 148 Updated Aug 18, 2024

Source Code Management Attack Toolkit

C# 134 19 Updated Sep 20, 2022

AzureGoat : A Damn Vulnerable Azure Infrastructure

Python 912 228 Updated Oct 30, 2024

AWSGoat : A Damn Vulnerable AWS Infrastructure

PHP 1,966 1,434 Updated May 20, 2025

dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!

Python 2,189 188 Updated Oct 6, 2025

SMBeagle - Fileshare auditing tool.

C# 744 84 Updated Nov 4, 2025

A list of public penetration test reports published by several consulting firms and academic security groups.

HTML 9,351 2,131 Updated Nov 24, 2025

A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.

6,475 1,318 Updated Jan 18, 2026

Vulnerable app with examples showing how to not use secrets

Java 1,394 524 Updated Feb 4, 2026

Ultimate DevSecOps library

6,569 1,126 Updated Jul 17, 2025

☁️ ⚡ Granular, Actionable Adversary Emulation for the Cloud

Go 2,237 281 Updated Feb 4, 2026

The OWASP Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes technical processes for verifying the OWA…

Python 12,697 2,664 Updated Feb 3, 2026

Scans every git push to your Github organisations to find unwanted secrets.

Go 87 5 Updated May 1, 2025

The idea is to collect all the C# projects that are Sharp{Word} that can be used in Cobalt Strike as execute assembly command.

Batchfile 479 78 Updated May 24, 2022

A unique technique to execute binaries from a password protected zip

Go 1,039 151 Updated Jul 1, 2022
Next