SamyGhannad's Stars
evilsocket/pwnagotchi
(⌐■_■) - Deep Reinforcement Learning instrumenting bettercap for WiFi pwning.
The-Art-of-Hacking/h4cker
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artificial intelligence security, vulnerability research, exploit development, reverse engineering, and more.
chrissanders/packets
Packet Captures
streaak/keyhacks
Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.
nhn/tui.editor
🍞📝 Markdown WYSIWYG Editor. GFM Standard + Chart & UML Extensible.
bugcrowd/bugcrowd_university
Open source education content for the researcher community
thrasher-corp/gocryptotrader
A cryptocurrency trading bot and framework supporting multiple exchanges written in Golang.
Workiva/go-datastructures
A collection of useful, performant, and threadsafe Go datastructures.
emirpasic/gods
GoDS (Go Data Structures) - Sets, Lists, Stacks, Maps, Trees, Queues, and much more
Viralmaniar/Passhunt
Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors and their 2084 default passwords.
fpetru/mongodb-aspnetmvc
Using MongoDB .NET Driver with ASP.NET Core MVC
decoder-it/psgetsystem
getsystem via parent process using ps1 & embeded c#
swisskyrepo/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
euclidjda/value-investing-studies
Data Analysis Studies on Value Investing
mr-karan/awesome-investing
💸💸 Curated list of investment & finance related resources
jwasham/coding-interview-university
A complete computer science study plan to become a software engineer.
x90skysn3k/brutespray
Bruteforcing from various scanner output - Automatically attempts default creds on found services.
urbanadventurer/username-anarchy
Username tools for penetration testing
vulnersCom/nmap-vulners
NSE script based on Vulners.com API
Ekultek/WhatWaf
Detect and bypass web application firewalls and protection systems
WhitewidowScanner/whitewidow
SQL Vulnerability Scanner
Arno0x/DNSExfiltrator
Data exfiltration over DNS request covert channel
Ne0nd0g/merlin
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
richkmeli/Richkware
Framework for building Windows malware, written in C++
nccgroup/Fenrir
PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels
nccgroup/Sleipnir
Tiny payload for transfer via LOKI - Provides high speed Virtual Channel two way file transfer capabilities
nccgroup/loki
LOKI (Limited Obstructive Keyboard Impersonator) is a RDP File Transfer Tool Using Keypresses
gophish/gophish
Open-Source Phishing Toolkit
curi0usJack/luckystrike
A PowerShell based utility for the creation of malicious Office macro documents.
PowerShellMafia/PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework