Skip to content
View 12345qwert123456's full-sized avatar
🦊
Don't enter it...
🦊
Don't enter it...

Block or report 12345qwert123456

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Oh my tmux! My self-contained, pretty & versatile tmux configuration made with 💛🩷💙🖤❤️🤍

Shell 22,648 3,402 Updated Feb 27, 2025

Скрипт генерируют из русскоязычных ФИО возможные варианты e-mail адресов для дальнейшего перечисления на уязвимых сервисах.

Python 4 Updated Sep 26, 2022

evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)

Pascal 1,443 236 Updated Dec 21, 2023

Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.

C++ 1,127 220 Updated Jul 5, 2023

PowerTools is a collection of PowerShell projects with a focus on offensive operations.

PowerShell 2,094 812 Updated Dec 28, 2021

The Network Execution Tool

Python 3,634 416 Updated Mar 4, 2025

Python's http.server extended to include a file upload page

Python 262 50 Updated Feb 16, 2025

GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems

HTML 11,313 1,360 Updated Oct 28, 2024

Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.

JavaScript 9,610 2,809 Updated Feb 25, 2025

Various scripts for penetration testing

PowerShell 141 47 Updated Feb 15, 2025

Common User Passwords Profiler (CUPP)

Python 4,664 1,194 Updated Nov 20, 2023

CeWL is a Custom Word List Generator

Ruby 2,143 278 Updated Oct 28, 2024

Shared library implementations that transform the containing process into a shell when loaded (useful for privilege escalation, argument injection, file overwrites, LD_PRELOAD, etc.). This fork fix…

C 6 Updated Apr 3, 2024

Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging

C 530 79 Updated Mar 8, 2024

Collection of various malicious functionality to aid in malware development

C++ 1,595 260 Updated Feb 28, 2024

An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.

Go 3,207 328 Updated Mar 3, 2025

Crack legacy zip encryption with Biham and Kocher's known plaintext attack.

C++ 1,784 167 Updated Jan 26, 2025

The Leading Security Assessment Framework for Android.

Python 4,088 793 Updated Jan 29, 2025

The ultimate WinRM shell for hacking/pentesting

Ruby 4,743 625 Updated Dec 2, 2024

WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.

HTML 1,492 173 Updated Jun 10, 2024

An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws

Python 3,398 350 Updated Feb 25, 2025

SQLAlchemy Admin for FastAPI and Starlette

Python 2,060 209 Updated Feb 20, 2025

Automation for internal Windows Penetrationtest / AD-Security

PowerShell 3,430 533 Updated Nov 26, 2024

PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)

C# 16,997 3,172 Updated Mar 1, 2025

A fast TCP/UDP tunnel over HTTP

Go 14,233 1,451 Updated Sep 28, 2024

Netcat for windows 32/64 bit

C 633 144 Updated Apr 3, 2024

CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 180 other CMSs

Python 2,375 503 Updated Apr 9, 2024

Windows system utilities to maximize productivity

C# 115,558 6,810 Updated Mar 6, 2025

A semi-interactive PHP shell compressed into a single file.

PHP 930 194 Updated Feb 14, 2018
Next