theDARPA's Stars
hacksider/Deep-Live-Cam
real time face swap and one-click video deepfake with only a single image
collinsmc23/spy-pixel
A spy pixel which can be emedded into web pages or emails.
kgretzky/evilqr
Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.
DeaDHackS/WiFiSpy
The best WiFi spy avalaible for hire! Made for hackers, for hackers
theowni/Damn-Vulnerable-RESTaurant-API-Game
Damn Vulnerable Restaurant is an intentionally vulnerable Web API game for learning and training purposes dedicated to developers, ethical hackers and security engineers.
mikeroyal/Digital-Forensics-Guide
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
FDX100/Auto_Tor_IP_changer
change your Ip address automatically This tool based on tor project
RedTeamOperations/Advanced-Process-Injection-Workshop
devbret/website-internal-links
Use Python to map a website's internal links. And then apply D3 to visualize those connections as a network graph.
0xKayala/NucleiScanner
NucleiScanner is a Powerful Automation tool for detecting Unknown Vulnerabilities in the Web Applications
HeyPuter/puter
🌐 The Internet OS! Free, Open-Source, and Self-Hostable.
dazzyddos/HSC24RedTeamInfra
Slides and Codes used for the workshop Red Team Infrastructure Automation
noraj/The-Hacker-Recipes
This project is aimed at freely providing technical guides on various hacking topics: Active Directory services, web services, servers, intelligence gathering, physical intrusion, phishing, mobile apps, iot, social engineering, etc.
chiasmod0n/chiasmodon
Chiasmodon is an OSINT tool designed to assist in the process of gathering information about a target domain. Its primary functionality revolves around searching for domain-related data, including domain emails, domain credentials, CIDRs , ASNs , and subdomains, the tool also allows users to search Google Play application ID.
PhonePe/mantis
Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.
xaitax/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability
Microsoft-Outlook-Remote-Code-Execution-Vulnerability
h4r5h1t/webcopilot
An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for vulnerabilities.
SiddhantOffl/cam-virus
Cam VIrus shoots from the target's phone front camera or PC webcam just sending a link.
microsoft/Security-101
8 Lessons, Kick-start Your Cybersecurity Learning.
protectai/ai-exploits
A collection of real world AI/ML exploits for responsibly disclosed vulnerabilities
sAjibuu/Upload_Bypass
A simple tool for bypassing file upload restrictions.
rootecstak/Slides
All Our Online/Offline Slides are in this repo
RussianPanda95/Yara-Rules
Repository of Yara Rules
OpenInterpreter/open-interpreter
A natural language interface for computers
myshell-ai/OpenVoice
Instant voice cloning by MIT and MyShell.
americo/sqlifinder
SQL Injection Vulnerability Scanner made with Python
Genymobile/scrcpy
Display and control your Android device
moonD4rk/HackBrowserData
Extract and decrypt browser data, supporting multiple data types, runnable on various operating systems (macOS, Windows, Linux).
hoodoer/JS-Tap
JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the targeted application. Also includes a C2 for executing custom JavaScript payloads in clients, and a "mimic" feature that automatically generates custom payloads.
LiNuX-Mallu/Track-Em
GPS Location Tracer Using Malicious URL