Skip to content
View perfectlylogical's full-sized avatar

Block or report perfectlylogical

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
13 results for source starred repositories
Clear filter

HID attack payload generator for Arduinos

Python 162 47 Updated Jul 8, 2024

Six Degrees of Domain Admin

PowerShell 9,991 1,743 Updated Jun 28, 2024

A collection of code snippets used in blog posts.

Python 54 20 Updated Oct 30, 2019

Incident Response Methodologies

1,024 216 Updated Aug 2, 2018

A curated list of tools for incident response

7,773 1,539 Updated Jul 18, 2024

A collected list of awesome security talks

4,068 490 Updated Apr 9, 2021

Next-gen BurpSuite penetration testing tool

JavaScript 459 99 Updated Jan 27, 2016

Wiki-like CTF write-ups repository, maintained by the community. 2015

CSS 1,987 720 Updated Aug 27, 2022

Wiki-like CTF write-ups repository, maintained by the community. 2014

Python 1,833 641 Updated Apr 27, 2016

CTFs as you need them

Python 5,797 2,133 Updated Dec 28, 2024

A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network

Ruby 571 139 Updated Dec 9, 2017

Metasploit Framework

Ruby 34,521 14,081 Updated Jan 2, 2025

PowerShell Module with Security cmdlets for security work

PowerShell 437 87 Updated Feb 27, 2020