Sponsors
Stars
Implement a ChatGPT-like LLM in PyTorch from scratch, step by step
graphw00f is GraphQL Server Engine Fingerprinting utility for software security professionals looking to learn more about what technology is behind a given GraphQL endpoint.
A proof of concept for a clickjacking attack on macOS.
Find, verify, and analyze leaked credentials
a repository of all the CTF challenges I've made for public events
In-depth attack surface mapping and asset discovery
Find broken links, missing images, etc within your HTML.
Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!
Real-time face swap for PC streaming or video calls
Run individual configuration, compliance and security controls or full compliance benchmarks for CIS across all of your GCP projects using Powerpipe and Steampipe.
a structural diff that understands syntax 🟥🟩
A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.
Leaked Windows processes handles identification tool
A POC for DNS spoofing in kubernetes clusters. Runs with minimum capabilities, on default installations of kuberentes.
Peas create serialized payload for deserialization RCE attack on python driven applications where pickle ,pyYAML, ruamel.yaml or jsonpickle module is used for deserialization of serialized data. I …
Prototype Pollution and useful Script Gadgets
Slack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace
Where's My Browser? Learn hacking WebViews (Android Mobile App)
Where's My Browser? Learn hacking WebViews (iOS Mobile App)
Magicleaks it's a python script that checks if an email or a list of email accounts was compromised
An Object Graph Mapper (OGM) for the Neo4j graph database.
Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware