Highlights
- Pro
Block or Report
Block or report djcater
Contact GitHub support about this user’s behavior. Learn more about reporting abuse.
Report abuseStars
Language
Sort by: Recently starred
Analysis of Bot Protection systems with available countermeasures 🚿. How to defeat anti-bot system 👻 and get around browser fingerprinting scripts 🕵️♂️ when scraping the web?
List of Github repositories and articles with list of dorks for different search engines
A U-Boot hacking toolkit for security researchers and tinkerers
A DHCP client simulation on linux. It can simulates multiple DHCP clients behind a network device. It can help in testing the DHCP servers or in testing switch/router by loading the device with mul…
A tool for passive data capture and reconnaissance of serial flash chips. It is used in conjunction with a Saleae logic analyzer to reconstruct flash memory contents and extract contextual informat…
a recon tool that allows searching on URLs that are exposed via shortener services
Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure DevOps release pipelines.
Active Directory Integrated DNS dumping by any authenticated user
40X/HTTP bypasser in Go. Features: Verb tampering, headers, #bugbountytips, User-Agents, extensions, default credentials...
A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for security professionals and CTF players.
Securely* send passwords, URLs or other text data from any trusted computer with a camera (Phone, Laptop, Web Cam, etc.) to an un-trusted computer with ease.
OpenSSF Scorecard - Security health metrics for Open Source
Project to enumerate proxy configurations and generate shellcode from CobaltStrike
Research on the enumeration of IAM permissions without logging to CloudTrail
Prevent cloud misconfigurations and find vulnerabilities during build-time in infrastructure as code, container images and open source packages with Checkov by Bridgecrew.
A collection of browser-based side channel attack vectors.
Vulmap Online Local Vulnerability Scanners Project
COVID19 app backend
COVID19 Android app
Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically.
Identify IP addresses owned by public cloud providers
Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.
PoC for Zerologon - all research credits go to Tom Tervoort of Secura