Skip to content
View th3k3ymak3r's full-sized avatar

Block or report th3k3ymak3r

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

34 stars written in HTML
Clear filter

A list of public penetration test reports published by several consulting firms and academic security groups.

HTML 8,573 1,967 Updated Jun 6, 2024

reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous …

HTML 7,589 1,146 Updated Nov 12, 2024

Automate the creation of a lab environment complete with security tooling and logging best practices

HTML 4,669 995 Updated Jul 6, 2024

8 Lessons, Kick-start Your Cybersecurity Learning.

HTML 4,574 530 Updated Aug 1, 2024

Social engineering tool [Access Webcam & Microphone & Location Finder] With {Py,JS,PHP}

HTML 3,529 1,291 Updated Oct 12, 2024

Windows System Call Tables (NT/2000/XP/2003/Vista/7/8/10/11)

HTML 2,186 333 Updated Oct 25, 2024

ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the current state of the target AD environment.

HTML 1,730 285 Updated Jun 15, 2020

Configuration guidance for implementing the Windows 10 and Windows Server 2016 DoD Secure Host Baseline settings. #nsacyber

HTML 1,557 286 Updated Dec 24, 2022

A collection of bookmarks for penetration testers, bug bounty hunters, malware developers, reverse engineers and anyone who is just interested in infosec topics.

HTML 899 70 Updated Aug 30, 2023

Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)

HTML 850 236 Updated Dec 28, 2018

Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI

HTML 553 62 Updated Jul 28, 2024

Post Exploitation Wiki

HTML 515 112 Updated Dec 18, 2019

Weaponized Browser-in-the-Middle (BitM) for Penetration Testers

HTML 427 42 Updated Nov 21, 2024

A RedTeam Toolkit

HTML 384 50 Updated Oct 22, 2024

HTML smuggling is not an evil, it can be useful

HTML 383 46 Updated Feb 19, 2024

This is a collection of phishing templates and a landing page to be used with goPhish

HTML 381 170 Updated Apr 29, 2022

IPFuscator - A tool to automatically generate alternative IP representations

HTML 355 56 Updated Jan 12, 2024

A crossplatform mDNS enumeration tool.

HTML 345 15 Updated Sep 25, 2022

A library of pretexts to use on offensive phishing engagements.

HTML 332 76 Updated Aug 9, 2019

Wiegand data logger, replay device and micro door-controller

HTML 306 49 Updated May 4, 2023

An open-source self-hosted purple team management web application.

HTML 245 36 Updated Jul 26, 2024

Secret Magpie - Secret Detection Tool

HTML 211 22 Updated Jul 10, 2024

A vast collection of security tools and resources curated by the community.

HTML 187 23 Updated Nov 30, 2024

Collection of tools to use with Azure Applications

HTML 107 20 Updated Oct 13, 2023

OSDP attack tool (and the Elvish word for friend)

HTML 95 5 Updated Aug 15, 2023
Next