p80eye's Stars
tmux/tmux
tmux source code
nginx/nginx
The official NGINX Open Source repository.
postgres/postgres
Mirror of the official PostgreSQL GIT repository. Note that this is just a *mirror* - we don't work with pull requests on github. To contribute, please see https://wiki.postgresql.org/wiki/Submitting_a_Patch
openthread/openthread
OpenThread released by Google is an open-source implementation of the Thread networking protocol
scop/bash-completion
Programmable completion functions for bash
Hax4us/Nethunter-In-Termux
This is a script by which you can install Kali nethunter (Kali Linux) in your termux application without rooted phone
proot-me/proot
chroot, mount --bind, and binfmt_misc without privilege/setup for Linux
termux/proot-distro
An utility for managing installations of the Linux distributions in Termux.
dhondta/dronesploit
Drone pentesting framework console
warifp/FacebookToolkit
a tool to get Facebook data, and some Facebook bots, and extra tools found on Facebook Toolkit ++.
EXALAB/Anlinux-Resources
Scripts, Rootfs and other content for AnLinux
wiglenet/wigle-wifi-wardriving
Nethugging client for Android, from wigle.net
Th30neAnd0nly/Ohm
Android RAT with web panel and undetectable App
C0MPL3XDEV/E4GL30S1NT
E4GL30S1NT - Simple Information Gathering Tool
HKSSY/Drone-Hacking-Tool
Drone Hacking Tool is a GUI tool that works with a USB Wifi adapter and HackRF One for hacking drones.
pelya/debian-noroot
Debian running on Android, without rooting your phone
abdulkadir-gungor/JPGtoMalware
It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganography methods. However, since the payload in the JPG file is encrypted, it cannot be easily decrypted. It also uses the "garbage code insertion/dead-code insertion" method to prevent the payload from being caught by the antivirus at runtime.
7zx/overload
📡 Overload DoS Tool
imomaliev/tmux-bash-completion
Tmux bash completion
5bhuv4n35h/pentestmindmap
a mindmap on pentest #pentestmindmap #oscp #lpt #ecsa #ceh #bugbounty
k3b/intent-intercept
Android dev tool to view inter-app communication
AnLoMinus/Diablo
Diablo ~ Hacking / Pentesting & Reporting
bmshifat/TecSpy
Android Remote Administration Tool
xyproto/fstabfmt
:large_blue_circle: Format /etc/fstab automatically.
IAmBlackHacker/Awesome-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
Root3inspector/Evil-Storm
KTN1990/PostgreSQL--Attack-on-default-password-AUTOEXPLOITING-
xolox/python-linux-utils
Linux system administration tools for Python
R1punk/E4GL30S1NT
E4GL30S1NT - Simple Information Gathering Tool
mdnabidui/clonerit
Facebook Old Account can be Cracked Through this Tool. And Don't use this Tool for any bad Purpose.