Skip to content
View perfectlylogical's full-sized avatar

Block or report perfectlylogical

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

HID attack payload generator for Arduinos

Python 162 47 Updated Jul 8, 2024

Six Degrees of Domain Admin

PowerShell 9,986 1,743 Updated Jun 28, 2024

A post-exploitation OS X/Linux agent written in Python 2.7

Python 868 203 Updated Aug 24, 2017

A collection of code snippets used in blog posts.

Python 54 20 Updated Oct 30, 2019

Incident Response Methodologies

1,024 216 Updated Aug 2, 2018

A curated list of tools for incident response

7,763 1,539 Updated Jul 18, 2024

A collected list of awesome security talks

4,066 490 Updated Apr 9, 2021

Next-gen BurpSuite penetration testing tool

JavaScript 459 99 Updated Jan 27, 2016

Wiki-like CTF write-ups repository, maintained by the community. 2015

CSS 1,987 720 Updated Aug 27, 2022

Wiki-like CTF write-ups repository, maintained by the community. 2014

Python 1,834 641 Updated Apr 27, 2016

CTFs as you need them

Python 5,788 2,127 Updated Dec 28, 2024

A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network

Ruby 570 140 Updated Dec 9, 2017

Metasploit Framework

Ruby 34,486 14,070 Updated Dec 30, 2024

PowerSploit - A PowerShell Post-Exploitation Framework

PowerShell 12,006 4,621 Updated Aug 17, 2020

PowerShell Module with Security cmdlets for security work

PowerShell 437 87 Updated Feb 27, 2020