LateJune's Stars
vaggelis-sudo/SMS-Location-Identification-Attack
woodruffw/shaq
A CLI client for Shazam
jagrosh/MusicBot
š¶ A Discord music bot that's easy to set up and run yourself!
AlexLynd/ESP8266-Wardriving
ESP8266 wardriving scripts & Jupyter Notebook data visualization tools
microsoft/conversational-speaker
mesquidar/ForensicsTools
A list of free and open forensics analysis tools and other resources
BitBangingBytes/gr-smart_meters
0x6d69636b/windows_hardening
HardeningKitty and Windows Hardening Settings
MicrosoftDocs/windows-itpro-docs
This repository is used for Windows client for IT Pro content on Microsoft Learn.
BankSecurity/Threat_Hunting
Some Threat Hunting queries useful for blue teamers
megadose/OnionSearch
OnionSearch is a script that scrapes urls on different .onion search engines.
gtworek/PSBits
Simple (relatively) things allowing you to dig a bit deeper than usual.
wpatoolkit/Adj-Noun-Wordlist-Generator
Outputs combinations of adjectives, nouns and digits.
ashemery/LinuxForensics
Everything related to Linux Forensics
Nheko-Reborn/nheko
Desktop client for Matrix using Qt and C++20.
arkenfox/user.js
Firefox privacy, security and anti-tracking: a comprehensive user.js template for configuration and hardening
openmiko/openmiko
Open source firmware for Ingenic T20 based devices such as WyzeCam V2, Xiaomi Xiaofang 1S, iSmartAlarm's Spot+ and others.
openai/DALL-E
PyTorch package for the discrete VAE used for DALLĀ·E.
fcwu/docker-ubuntu-vnc-desktop
A Docker image to provide web VNC interface to access Ubuntu LXDE/LxQT desktop environment.
vasturiano/globe.gl
UI component for Globe Data Visualization using ThreeJS/WebGL
Carberra/discord.py-music-tutorial
Official repo of the "Building a discord.py music bot (2020)" series.
ytisf/PyExfil
A Python Package for Data Exfiltration
microsoft/Microsoft-365-Defender-Hunting-Queries
Sample queries for Advanced hunting in Microsoft 365 Defender
davidprowe/BadBlood
BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active Directory. Each time this tool runs, it produces different results. The domain, users, groups, computers and permissions are different. Every. Single. Time.
gcla/termshark
A terminal UI for tshark, inspired by Wireshark
3mrgnc3/RouterKeySpaceWordlists
Default Router WPA KeySpace Wordlists
ManicodeSecurity/Defending-DevOps
Lab Material for the Two-Day Defending Modern DevOps Environments Course
madsky/dtapi
Rob--W/crxviewer
Add-on / web app to view the source code of Chrome / Firefox / Opera 15 extensions and zip files.
Neo23x0/signature-base
YARA signature and IOC database for my scanners and tools