Pinned Repositories
584F525F.github.io
Sharing my knowledge, tips and tricks as a Network and a Software Engineer. Also from my Cyber Security Learning Journy sharing related knowledge to Pentesting, Enumeration, other Tools and commands.
Async-DirBuster
🔒A Python script for efficiently brute-forcing directories and files on a target website using asynchronous programming with aiohttp. It supports custom headers, status code filtering, response size matching, and more.
Auto_Wordlists
awesome-appsec
A curated list of resources for learning about application security
awesome-malware-analysis
awesome-osint
:scream: A curated list of amazingly awesome OSINT
awesome-pcaptools
A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for the original authors.
awesome-pentest
A collection of awesome penetration testing resources, tools and other shiny things
awesome-reversing
A curated list of awesome reversing resources
awesome-threat-detection
✨ A curated list of awesome threat detection and hunting resources 🕵️♂️
584F525F's Repositories
584F525F/584F525F.github.io
Sharing my knowledge, tips and tricks as a Network and a Software Engineer. Also from my Cyber Security Learning Journy sharing related knowledge to Pentesting, Enumeration, other Tools and commands.
584F525F/Async-DirBuster
🔒A Python script for efficiently brute-forcing directories and files on a target website using asynchronous programming with aiohttp. It supports custom headers, status code filtering, response size matching, and more.
584F525F/Auto_Wordlists
584F525F/awesome-appsec
A curated list of resources for learning about application security
584F525F/awesome-malware-analysis
584F525F/awesome-osint
:scream: A curated list of amazingly awesome OSINT
584F525F/awesome-pcaptools
A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for the original authors.
584F525F/awesome-pentest
A collection of awesome penetration testing resources, tools and other shiny things
584F525F/awesome-reversing
A curated list of awesome reversing resources
584F525F/awesome-threat-detection
✨ A curated list of awesome threat detection and hunting resources 🕵️♂️
584F525F/awesome-threat-intelligence
A curated list of Awesome Threat Intelligence resources
584F525F/Blog
Blog
584F525F/breach-parse
A tool for parsing breached passwords
584F525F/Cyber-Orange-Cyberdefense-Arsenal
Arsenal is just a quick inventory and launcher for hacking programs
584F525F/GhostArp
An Address Resolution Protocol manipulator that allows for MITM attacks and DOS attacks
584F525F/hacktricks
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
584F525F/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
584F525F/red-python-scripts
584F525F/T-Pot-Honeypot
🍯 T-Pot - The All In One Honeypot Platform 🐝
584F525F/crossbreeder
Bulk firmware changing and basic action tool for standalone Ruckus Access Points
584F525F/juniper-config-converter
Convert Juniper configurations to 'set-style'
584F525F/juniper_display_set
Script to translate a Junos configuration file into a list of 'set' commands
584F525F/pe-sieve
Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).
584F525F/pyWhat
🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell you what it is! 🧙♀️
584F525F/Rootme
Rootme: A React-based reverse shell generator. Enter an IP address and port number to generate a variety of reverse shells in multiple languages. Ideal for ethical hacking and penetration testing.
584F525F/SSH-Bruteforcer
The SSH Bruteforce repository consists of two Python scripts designed for password cracking on SSH servers. One script employs asynchronous programming, adopting a modern approach, while the other utilizes multithreading with locks to accomplish the same task.
584F525F/tig-stack
The Telegraf, InfluxDB, & Grafana stack (TIG) powered by Docker & Docker Compose.
584F525F/Wireshark-Malware-Analysis-Settings
Wireshark Settings for Malware Network Analysis Based on Malware-Traffic-Analysis.net