[go: nahoru, domu]

Skip to content
View alien-keric's full-sized avatar
  • cloudstechn.com
  • anonymous
Block or Report

Block or report alien-keric

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Beta Lists are currently in beta. Share feedback and report bugs.

Starred repositories

105 results for source starred repositories
Clear filter

💻 🍚 🔳 🔲 My riced-up Kali dotfiles – off-white | dark leet | chrome lambo

Shell 87 9 Updated May 2, 2022

Dotfiles for solarized theme Kali

Shell 26 2 Updated Sep 19, 2019

ysoserial.net docker image

Shell 26 6 Updated Feb 9, 2024

Python3 script to quickly get various information from a domain controller through his LDAP service.

Python 145 32 Updated Mar 25, 2024

A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse shell connection with a target system. Use responsibly for e…

Nim 63 21 Updated Jan 23, 2024

my kali desktop setup

Shell 250 79 Updated Jun 13, 2024

WebSocket cat

JavaScript 2,131 217 Updated May 19, 2024

Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 9…

C 2,179 284 Updated Apr 17, 2024

Microsoft-Outlook-Remote-Code-Execution-Vulnerability

Python 650 144 Updated Feb 19, 2024

A minimal Hugo Theme

HTML 931 289 Updated Jul 3, 2024

An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.

Go 2,402 245 Updated Jul 11, 2024

Collection of Cyber Threat Intelligence sources from the deep and dark web

4,080 735 Updated Jul 12, 2024

We have made you a wrapper you can't refuse

Python 25,403 5,154 Updated Jul 12, 2024

This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.

3,202 602 Updated Feb 11, 2023

An LDAP based Active Directory user and group enumeration tool

Python 303 68 Updated Feb 10, 2023

Openfire Console Authentication Bypass Vulnerability with RCE plugin

Python 36 10 Updated Mar 7, 2024

Impacket is a collection of Python classes for working with network protocols.

Python 13,007 3,497 Updated Jul 12, 2024

A PoC exploit for CVE-2023-32315 - Openfire Authentication Bypass

Python 3 2 Updated May 17, 2024

Minecraft-client networking library in Python

Python 803 185 Updated Feb 4, 2024

A list of interesting payloads, tips and tricks for bug bounty hunters.

5,652 1,518 Updated Sep 14, 2023

Open Cyber Threat Intelligence Platform

JavaScript 5,183 820 Updated Jul 12, 2024

A multi-purposed password management tool

Python 9 1 Updated May 18, 2023

How to exploit SeImpersonatePrivilege with different ways

4 2 Updated Apr 20, 2024

Windows Privilege Escalation

2 2 Updated Jun 7, 2022

series of sherlock walkthrough

1 Updated Apr 23, 2024

some addition script that were usufull while solving napper and hard to get them

Go 1 Updated Apr 12, 2024

Extract phone numbers from an audio recording of the dial tones.

Python 278 45 Updated May 17, 2024

simple google map written in java

Java 1 Updated Apr 12, 2024

Java client library for Google Maps API Web Services

Java 1,696 942 Updated Jun 10, 2024

A curation of awesome security tools, exploits security projects developed by Tanzanian Cybersecurity Enthusiasts

CSS 10 3 Updated Apr 14, 2024
Next