Pinned Repositories
BlackStone
Pentesting & Ethical Hacking Reporting Tool
EnumeRannden
A comprehensive automation script for penetration testing and reconnaissance.
fuse4me
Fuse4Me is a tool to fuse dictionaries removing duplicates and creating new one ready for the action.
Hashcat-Cheatsheet
Hashcat Cheatsheet for OSCP
Impacket
Impacket is a collection of Python classes for working with network protocols.
Kali-AutoBSPWM
Bash script that perform all the setup for BSPWM installation, including polybar, picom, pywal,nvchad, with multiple color schemes and a really cool wallpaper.
linkedin2username
OSINT Tool: Generate username lists for companies on LinkedIn
star-tup
Welcome to *tup, a tool to optimize the start-up in Linux envoirments, feel free to change what do you want, happy coding and/or hacking!
Lex-Case's Repositories
Lex-Case/star-tup
Welcome to *tup, a tool to optimize the start-up in Linux envoirments, feel free to change what do you want, happy coding and/or hacking!
Lex-Case/BlackStone
Pentesting & Ethical Hacking Reporting Tool
Lex-Case/EnumeRannden
A comprehensive automation script for penetration testing and reconnaissance.
Lex-Case/fuse4me
Fuse4Me is a tool to fuse dictionaries removing duplicates and creating new one ready for the action.
Lex-Case/Hashcat-Cheatsheet
Hashcat Cheatsheet for OSCP
Lex-Case/Impacket
Impacket is a collection of Python classes for working with network protocols.
Lex-Case/Kali-AutoBSPWM
Bash script that perform all the setup for BSPWM installation, including polybar, picom, pywal,nvchad, with multiple color schemes and a really cool wallpaper.
Lex-Case/linkedin2username
OSINT Tool: Generate username lists for companies on LinkedIn
Lex-Case/net-creds
Sniffs sensitive data from interface or pcap
Lex-Case/Nishang
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
Lex-Case/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Lex-Case/Plaintext-Resources
Lex-Case/PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework
Lex-Case/static-binaries
Various *nix tools built as statically-linked binaries
Lex-Case/trufflehog
Find, verify, and analyze leaked credentials