Block or Report
Block or report IronTortoise
Contact GitHub support about this user’s behavior. Learn more about reporting abuse.
Report abuseStars
Language
Sort by: Recently starred
An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws
holehe allows you to check if the mail is used on different sites like twitter, instagram and will retrieve information on sites with the forgotten password function.
Open-source tool to bypass windows and linux passwords from bootable usb
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
NVR with realtime local object detection for IP cameras
You didn't think I'd go and leave the blue team out, right?
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
A Windows and Office activator using HWID / Ohook / KMS38 / Online KMS activation methods, with a focus on open-source code and fewer antivirus detections.
💊 Application to use ReVanced on Android
Impacket is a collection of Python classes for working with network protocols.
Open source security data lake for threat hunting, detection & response, and cybersecurity analytics at petabyte scale on AWS
Automating situational awareness for cloud penetration tests.
Ultimate Internet of Things/Industrial Control Systems reconnaissance tool.
The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power schedules, MOpt mutators, unicorn_mode, and a lot more!
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Official Twitter/X account @PersistSniper. Made w…
A daily updated summary of the most frequent types of security advisories currently being reported from different sources.
Google Cloud Platform Certification resources.
During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Whether accomplished by phishing emails, …
Run individual controls or full compliance benchmarks for CIS, PCI, NIST, HIPAA and more across all of your AWS accounts using Powerpipe and Steampipe.
Arsenal is just a quick inventory and launcher for hacking programs