LuisDeSantana
All about tools and projects. IT/OT/SCADA/ICS/IIoT/IoT/ Robots and Cloud - Aerospace and Alien activities
Oblivion SecurityLondon_UK
LuisDeSantana's Stars
AtsushiSakai/PythonRobotics
Python sample codes for robotics algorithms.
enaqx/awesome-pentest
A collection of awesome penetration testing resources, tools and other shiny things
sundowndev/hacker-roadmap
A collection of hacking tools, resources and references to practice ethical hacking.
kgretzky/evilginx2
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
nasa-jpl/open-source-rover
A build-it-yourself, 6-wheel rover based on the rovers on Mars!
WebGoat/WebGoat
WebGoat is a deliberately insecure application
A-poc/RedTeam-Tools
Tools and Techniques for Red Team / Penetration Testing
dsasmblr/game-hacking
Tutorials, tools, and more as related to reverse engineering video games.
frdel/agent-zero
Agent Zero AI framework
V33RU/IoTSecurity101
A Curated list of IoT Security Resources
Nate711/StanfordDoggoProject
Stanford Doggo is an open source quadruped robot that jumps, flips, and trots!
dreddsa5dies/goHackTools
Hacker tools on Go (Golang)
o-gs/dji-firmware-tools
Tools for handling firmwares of DJI products, with focus on quadcopters.
BitMaker-hub/NerdMiner_v2
Improved version of first ESP32 NerdMiner
mushorg/conpot
ICS/SCADA honeypot
screetsec/Brutal
Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device ( Payload Teensy )
h4r5h1t/webcopilot
An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for vulnerabilities.
xaitax/SploitScan
SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.
Viralmaniar/I-See-You
ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exact location coordinates an attacker can perform preliminary reconnaissance which will help them in performing further targeted attacks.
deptofdefense/hack-a-sat-library
Public library of space documents and tutorials
asset-group/5ghoul-5g-nr-attacks
5G NR Attacks against Qualcomm and Mediatek smartphones. Fuzzer included⚡
digitalbond/Redpoint
Digital Bond's ICS Enumeration Tools
gl4ssesbo1/Nebula
Nebula is a cloud C2 Framework, which at the moment offers reconnaissance, enumeration, exploitation, post exploitation on AWS, but still working to allow testing other Cloud Providers and DevOps Components.
7h30th3r0n3/Evil-M5Core2
Evil-M5Project is an innovative tool developed for ethical testing and exploration of WiFi networks. It's compatible with Cardputer, Atoms3, Fire, core2. You can scan, monitor, and interact with WiFi networks in a controlled environment. This project is designed for educational purposes, aiding in understanding network security and vulnerabilities.
m5stack/M5Cardputer
google-research/robel
ROBEL: Robotics Benchmarks for Learning with low-cost robots
osrf/rmf_demos
Demos to showcase the capabilities of RMF
cutaway-security/cutsec_tools
Scripts and other tools to helps parse data or gather information
utilsec/QuickStart-Guides
iotdesignshop/dexhand-mechanical-build
Mechanical, BOM, and Instructional Materials for Building the DexHand Open Source Dexterous Humanoid Robot Hand