d4rk5id3r
🔒Security Researcher || 🔐Cybersecurity Enthusiast || 🖥️Developer || 🔍Penetration Tester
Nigeria
Pinned Repositories
Blockchain-Voting-System-Research
blog
Build a Jekyll blog in minutes, without touching the command line.
d4rk5id3r
d4rk5id3r.github.io
Decepti-WiFi
freevps34
Installs
plugins_downloader
pov
StealthLink
With StealthLink, you can easily create a convincing mask for your phishing URLs, making them indistinguishable from legitimate websites. This tool is designed to provide a professional-level of obfuscation to any phishing URL, making it virtually impossible for users to detect.
d4rk5id3r's Repositories
d4rk5id3r/StealthLink
With StealthLink, you can easily create a convincing mask for your phishing URLs, making them indistinguishable from legitimate websites. This tool is designed to provide a professional-level of obfuscation to any phishing URL, making it virtually impossible for users to detect.
d4rk5id3r/d4rk5id3r
d4rk5id3r/Blockchain-Voting-System-Research
d4rk5id3r/blog
Build a Jekyll blog in minutes, without touching the command line.
d4rk5id3r/d4rk5id3r.github.io
d4rk5id3r/Decepti-WiFi
d4rk5id3r/freevps34
d4rk5id3r/plugins_downloader
d4rk5id3r/pov
d4rk5id3r/report
d4rk5id3r/vahiwe
d4rk5id3r/Windows-Penetration-Testing
Technical notes, AD pentest methodology, list of tools, scripts and Windows commands that I find useful during internal penetration tests and assumed breach exercises (red teaming)
d4rk5id3r/wordpress-plugins
d4rk5id3r/XSS-Scanner