Pinned Repositories
awesome-osint
:scream: A curated list of amazingly awesome OSINT
BerconMaps-forked
BerconMaps is a 3rd party texture plugin for Autodesk 3ds Max
Big-Ass-Data-Broker-Opt-Out-List
CheatSheetSeries
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
domains
World’s single largest Internet domains dataset
DumpItBluePlus
Complement to DumpItBlue tool
EzWindSLIC
An activator for Windows 7/Vista(SP1+)/Server 2008-2022 for UEFI-GPT systems, based on WindSLIC but this one is more user friendly.
GFPGAN
GFPGAN aims at developing Practical Algorithms for Real-world Face Restoration.
illegalwords-english
English Google Translation of banned olympics phrases
instaloader
Download pictures (or videos) along with their captions and other metadata from Instagram.
feathered-arch's Repositories
feathered-arch/awesome-osint
:scream: A curated list of amazingly awesome OSINT
feathered-arch/BerconMaps-forked
BerconMaps is a 3rd party texture plugin for Autodesk 3ds Max
feathered-arch/Big-Ass-Data-Broker-Opt-Out-List
feathered-arch/CheatSheetSeries
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
feathered-arch/domains
World’s single largest Internet domains dataset
feathered-arch/DumpItBluePlus
Complement to DumpItBlue tool
feathered-arch/EzWindSLIC
An activator for Windows 7/Vista(SP1+)/Server 2008-2022 for UEFI-GPT systems, based on WindSLIC but this one is more user friendly.
feathered-arch/GFPGAN
GFPGAN aims at developing Practical Algorithms for Real-world Face Restoration.
feathered-arch/illegalwords-english
English Google Translation of banned olympics phrases
feathered-arch/instaloader
Download pictures (or videos) along with their captions and other metadata from Instagram.
feathered-arch/OSINTsources
This is a repo containing several osint sources
feathered-arch/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
feathered-arch/security-study-plan
Complete Practical Study Plan to become a successful cybersecurity engineer based on roles like Pentest, AppSec, Cloud Security, DevSecOps and so on...
feathered-arch/tinyproxy
tinyproxy - a light-weight HTTP/HTTPS proxy daemon for POSIX operating systems
feathered-arch/torghost
TorGhost is an anonymization script. TorGhost redirects all internet traffic through SOCKS5 tor proxy. DNS requests are also redirected via tor, thus preventing DNSLeak. The scripts also disables unsafe packets exiting the system. Some packets like ping request can compromise your identity.
feathered-arch/xmlrpc-bruteforcer
This script is a PoC for the "Brute Force Amplification Attack" exploit against XMLRPC interfaces