Skip to content
View piscessignature's full-sized avatar

Block or report piscessignature

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Abusing Self-XSS and Clickjacking to trigger XSS

HTML 130 34 Updated Mar 18, 2017

An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.

Python 38,266 4,127 Updated Mar 5, 2025

Patch Binaries via MITM: BackdoorFactory + mitmProxy.

Python 996 201 Updated Jul 31, 2021

Man in the middle testing

Python 385 63 Updated Mar 13, 2017

Resumes generated using the GitHub informations

JavaScript 62,291 1,356 Updated Feb 15, 2023

Course materials for Modern Binary Exploitation by RPISEC

C 5,612 893 Updated Dec 9, 2021

The Bug Hunters Methodology

4,016 811 Updated Aug 1, 2023

A repository for learning various heap exploitation techniques.

C 7,559 1,171 Updated Feb 21, 2025

Information gathering & website reconnaissance | https://phishstats.info/

Shell 452 75 Updated May 27, 2019

An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically

Python 489 193 Updated Sep 21, 2021

The Multiplatform Linux Sandbox

Python 261 57 Updated Jan 3, 2022

This software will emulate a smali source file generated by apktool.

Python 473 105 Updated Aug 14, 2018

novaroma .net project

C# 1 Updated Dec 24, 2015

Automatic Movie Downloading via NZBs & Torrents

Python 1 Updated Apr 15, 2016

Automatic Movie Downloading via NZBs & Torrents

Python 3,867 1,199 Updated Aug 4, 2021

Integris Security Carbonator - The Burp Suite Pro extension that automates scope, spider & scan from the command line. Carbonator helps automate the vulnerability scanning of web applications. Eith…

Python 1 Updated Jul 27, 2015

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…

PHP 61,256 24,177 Updated Mar 8, 2025

Streaming torrent client for Node.js with web ui.

JavaScript 1,306 583 Updated Jan 11, 2023

Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique present…

Python 3,798 817 Updated Jan 24, 2024

Automatically modify the User-Agent header in all Burp requests

Java 55 15 Updated Jan 11, 2018

Code samples from the book Web Scraping with Python http://shop.oreilly.com/product/0636920034391.do

Jupyter Notebook 4,513 2,511 Updated Jun 1, 2024

Capstone disassembly/disassembler framework for ARM, ARM64 (ARMv8), Alpha, BPF, Ethereum VM, HPPA, LoongArch, M68K, M680X, Mips, MOS65XX, PPC, RISC-V(rv32G/rv64G), SH, Sparc, SystemZ, TMS320C64X, T…

C 7,835 1,578 Updated Mar 3, 2025
Python 150 22 Updated Jun 30, 2023

Automated All-in-One OS Command Injection Exploitation Tool.

Python 5,157 865 Updated Mar 7, 2025