lucabased's Stars
officialrajdeepsingh/awesome-nextjs
A curated list of awesome Nextjs-based libraries that help build small and large-scale applications with next.js.
BishopFox/sliver
Adversary Emulation Framework
nettitude/ShellcodeMutator
Bashfuscator/Bashfuscator
A fully configurable and extendable Bash obfuscation framework. This tool is intended to help both red team and blue team.
zmap/zdns
Fast DNS Lookup Library and CLI Tool
guitmz/ezuri
A Simple Linux ELF Runtime Crypter
onionltd/EndGame
EndGame DDoS filter.
infosecn1nja/Red-Teaming-Toolkit
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
dafthack/MailSniper
MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, insider intel, network architecture information, etc.). It can be used as a non-administrative user to search their own email, or by an administrator to search the mailboxes of every user in a domain.
nullfuzz-pentest/shodan-dorks
Shodan Dorks
lucabased/lucabased
My fabulous profile description (⌐■_■)
0xMarcio/cve
Latest CVEs with their Proof of Concept exploits.
Notselwyn/CVE-2024-1086
Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.
projectdiscovery/subfinder
Fast passive subdomain enumeration tool.
GhostPack/Rubeus
Trying to tame the three-headed dog.
PowerShellMafia/PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework
davidprowe/BadBlood
BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active Directory. Each time this tool runs, it produces different results. The domain, users, groups, computers and permissions are different. Every. Single. Time.
byt3bl33d3r/CrackMapExec
A swiss army knife for pentesting networks
bytecode77/r77-rootkit
Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.
comfyanonymous/ComfyUI
The most powerful and modular diffusion model GUI, api and backend with a graph/nodes interface.
aboul3la/Sublist3r
Fast subdomains enumeration tool for penetration testers
sekai-soft/nitter
Alternative Twitter front-end
xaitax/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability
Microsoft-Outlook-Remote-Code-Execution-Vulnerability
imputnet/cobalt
best way to save what you love
bpc-clone/bypass-paywalls-firefox-clean
Xetera/ghost-cursor
🖱️ Generate human-like mouse movements with puppeteer or on any 2D plane
mattnotmax/cyberchef-recipes
A list of cyber-chef recipes and curated links
belgattitude/nextjs-monorepo-example
Collection of monorepo tips & tricks
souzomain/Shaco
Shaco is a linux agent for havoc
ZeroK-RTS/Zero-K
Open source RTS game running on the Spring/Recoil engine