![macos logo](https://raw.githubusercontent.com/github/explore/868696fc547869eb5de5add3b3695abdd43bb9dc/topics/macos/macos.png)
Lists (2)
Sort Name ascending (A-Z)
Starred repositories
Connect your devices into a secure WireGuard®-based overlay network with SSO, MFA and granular access controls.
DOMXSS Scanner is an online tool to scan source code for DOM based XSS vulnerabilities
Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs and exploits but also gather all the technology running behi…
A suite of Tools to aid Incidence Response and Live Forensics for - Windows (Powershell) | Linux (Bash) | MacOS (Shell)
Extract and execute a PE embedded within a PNG file using an LNK file.
Implementing the ghostly hollowing PE injection technique using tampered syscalls.
Utilizing TLS callbacks to execute a payload without spawning any threads in a remote process
Reduce Entropy And Obfuscate Youre Payload With Serialized Linked Lists
Collection of malware source code for a variety of platforms in an array of different programming languages.
A curated list of cyber security resources and tools.
Hacking resources and cheat sheets. References, tools, scripts, tutorials, and other resources that help offensive and defensive security professionals.
🗺 MapSCII is a Braille & ASCII world map renderer for your console - enter => telnet mapscii.me <= on Mac (brew install telnet) and Linux, connect with PuTTY on Windows
30 days of Python programming challenge is a step-by-step guide to learn the Python programming language in 30 days. This challenge may take more than100 days, follow your own pace. These videos ma…
holehe allows you to check if the mail is used on different sites like twitter, instagram and will retrieve information on sites with the forgotten password function.
Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and share th…
Exploitation Framework for Embedded Devices