Starred repositories
C++ library for building Wayland compositors.
Burp Suite extension that mutates ciphers to bypass TLS-fingerprint based bot detection
DNS stub resolver, proxy and router with support for DoT, DoH, DoQ, and DTLS
Docker container for forwarding emails to another email address / domain / server
📺 Automatically capture all potentially useful information about each executed command (as well as its output) and get powerful querying mechanism
JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.
The easiest way to run WireGuard VPN + Web-based Admin UI.
rasta-mouse / ThreatCheck
Forked from matterpreter/DefenderCheckIdentifies the bytes that Microsoft Defender / AMSI Consumer flags on.
Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens
A swiss army knife for pentesting networks
Fully featured and community-driven hacking environment
A machine learning-based video super resolution and frame interpolation framework. Est. Hack the Valley II, 2018.
🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes with a neat web app 🔥
📄 Awesome CV is LaTeX template for your outstanding job application
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
CTFNote is a collaborative tool aiming to help CTF teams to organise their work.
1kb single-page http server, static binary for linux x86_64
A tool for predicting the output of random number generators
A little tool to play with Windows security
Herramienta para evadir disable_functions y open_basedir
Epreuves de sélection de la TeamFR pour l'ECSC 2019.