marcoacheron's Stars
thex1le/glados-tts
A GLaDOS TTS, using Forward Tacotron and HiFiGAN. Inference is fast and stable, even on the CPU. A low quality vocoder model is included for mobile use. Rudimentary TTS script included. Works perfectly on Linux, partially on Maybe someone smarter than me can make a GUI.
ephes/kptncook
Fetch receipts from kptncook API and export them to mealie or paprika
tomascardososerra/fallback-chatgpt3-skill
bisq-network/bisq
A decentralized bitcoin exchange network
seth586/guides
MycroftAI/skill-pandora
Mycroft AI official Pandora Skill - listen to Pandora music
MycroftAI/enclosure-picroft
Mycroft interface for Raspberry Pi environment
rxhanson/Rectangle
Move and resize windows on macOS with keyboard shortcuts and snap areas
nicolashery/mac-dev-setup
A beginner's guide to setting up a development environment on macOS
darkoperator/Posh-SecMod
PowerShell Module with Security cmdlets for security work
kkkgo/KMS_VL_ALL
🔑KMS_VL_ALL - Smart Activation Script
vanhoefm/krackattacks-scripts
trustedsec/social-engineer-toolkit
The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.
screetsec/Brutal
Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device ( Payload Teensy )
RavenProject/Ravencoin
Ravencoin Core integration/staging tree
byt3bl33d3r/MITMf
Framework for Man-In-The-Middle attacks
EmpireProject/Empire
Empire is a PowerShell and Python post-exploitation agent.
threat9/routersploit
Exploitation Framework for Embedded Devices
quasar/Quasar
Remote Administration Tool for Windows
wifiphisher/wifiphisher
The Rogue Access Point Framework
DanMcInerney/net-creds
Sniffs sensitive data from interface or pcap
danielmiessler/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
Veil-Framework/Veil
Veil 3.1.X (Check version info in Veil at runtime)
samratashok/nishang
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
PowerShellMafia/PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework
codingo/NoSQLMap
Automated NoSQL database enumeration and web application exploitation tool.
SpiderLabs/Responder
Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.
beefproject/beef
The Browser Exploitation Framework Project
leebaird/discover
Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload creation using Metasploit. For use with Kali Linux.
sqlmapproject/sqlmap
Automatic SQL injection and database takeover tool