-
Full-Stack Software Engineer @ Athari
- Nairobi
- https://frazier-se.vercel.app/
- @_frazie_
- in/frazie
- https://frazier-se.vercel.app/
Starred repositories
Complete Listing and Usage of Tools used for Ethical Hacking
FULL v0, Cursor, Manus, Same.dev, Lovable, Devin, Replit Agent, Windsurf Agent, VSCode Agent, Dia Browser & Trae AI (And other Open Sourced) System Prompts, Tools & AI Models.
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
Bug Bounty Hunting Framework Designed to Help Beginners Compete w/ the Pros
Official code repository for: Gray Hat Hacking, The Ethical Hacker's Handbook, 5th Edition.
ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.
Real-time face swap for PC streaming or video calls
A Modern Framework for Bug Bounty Hunting
Active Directory and Internal Pentest Cheatsheets
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wis…
attacksurge / ax
Forked from pry0cc/axiomThe Distributed Scanning Framework for Everybody! Control Your Infrastructure, Scale Your Scanning—On Your Terms. Easily distribute arbitrary binaries and scripts using any of our nine supported cl…
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
All about bug bounty (bypasses, payloads, and etc)
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
Daytona is a Secure and Elastic Infrastructure for Running AI-Generated Code
Hands-on ethical hacking projects for beginners, covering network scanning, web app testing, password cracking, honeypots, Wi-Fi auditing, phishing, and SQL injection.
A mobile Bitcoin wallet fit for the gods. ⚡️ Est. 563345
NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. This repository is for study purposes only, do not message me about your lame hacking attempts.
Tools and Techniques for Red Team / Penetration Testing
We write your reusable computer vision tools. 💜