Skip to content
View carlospolop's full-sized avatar

Sponsors

Private Sponsor
Private Sponsor
Private Sponsor
@STMCyber
Private Sponsor
Private Sponsor
@wisconsin2992
@8kSec
Private Sponsor
@sunnywear
@MKenyon
Private Sponsor
@da-moon

Block or report carlospolop

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Implement a ChatGPT-like LLM in PyTorch from scratch, step by step

Jupyter Notebook 33,467 4,072 Updated Nov 18, 2024

graphw00f is GraphQL Server Engine Fingerprinting utility for software security professionals looking to learn more about what technology is behind a given GraphQL endpoint.

Python 579 69 Updated Sep 30, 2024

A proof of concept for a clickjacking attack on macOS.

Swift 94 18 Updated Feb 12, 2024

Set of tools to audit SIP based VoIP Systems

Python 442 87 Updated Nov 22, 2024
TypeScript 71 8 Updated Jul 9, 2024
Rust 32 3 Updated Jan 27, 2023

The Python programming language

Python 63,630 30,483 Updated Nov 24, 2024

Find, verify, and analyze leaked credentials

Go 17,351 1,718 Updated Nov 24, 2024

a repository of all the CTF challenges I've made for public events

JavaScript 50 2 Updated Sep 7, 2023

In-depth attack surface mapping and asset discovery

Go 12,117 1,891 Updated Nov 24, 2024

HTTP parameter discovery suite.

Python 5,284 797 Updated Nov 3, 2024

Find broken links, missing images, etc within your HTML.

JavaScript 1,965 305 Updated Jan 8, 2024

Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!

Go 846 109 Updated Jan 12, 2024

Real-time face swap for PC streaming or video calls

Python 26,931 67 Updated Nov 8, 2024

Run individual configuration, compliance and security controls or full compliance benchmarks for CIS across all of your GCP projects using Powerpipe and Steampipe.

Puppet 36 10 Updated Oct 24, 2024

XS-Leak Browser Test Suite

JavaScript 73 8 Updated Dec 19, 2023

a structural diff that understands syntax 🟥🟩

Rust 21,170 347 Updated Nov 16, 2024

A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.

Shell 798 83 Updated Jun 9, 2023

Leaked Windows processes handles identification tool

C++ 272 42 Updated Mar 14, 2022

A POC for DNS spoofing in kubernetes clusters. Runs with minimum capabilities, on default installations of kuberentes.

Python 74 15 Updated Aug 30, 2019

Penelope Shell Handler

Python 697 93 Updated Nov 24, 2024

Peas create serialized payload for deserialization RCE attack on python driven applications where pickle ,pyYAML, ruamel.yaml or jsonpickle module is used for deserialization of serialized data. I …

Python 101 23 Updated Nov 25, 2023

Prototype Pollution and useful Script Gadgets

1,406 202 Updated Jan 27, 2024

Slack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace

Python 729 105 Updated May 14, 2021

Where's My Browser? Learn hacking WebViews (Android Mobile App)

Java 38 7 Updated Jul 31, 2018

Where's My Browser? Learn hacking WebViews (iOS Mobile App)

Swift 39 2 Updated Jul 25, 2018

Magicleaks it's a python script that checks if an email or a list of email accounts was compromised

Python 68 12 Updated Dec 1, 2021

An Object Graph Mapper (OGM) for the Neo4j graph database.

Python 967 232 Updated Nov 22, 2024

Ethical hacking, CTF, tools & etc

PowerShell 21 2 Updated Feb 13, 2021

Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware

PowerShell 596 96 Updated Aug 27, 2024
Next