Skip to content
View AZEC0x00's full-sized avatar

Block or report AZEC0x00

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

Showing results

Brain Modeling Toolkit

Python 273 88 Updated Nov 6, 2024

An EDR bypass that prevents EDRs from hooking or loading DLLs into our process by hijacking the AppVerifier layer

C++ 442 74 Updated Feb 13, 2024

Writeups for PortSwigger WebSecurity Academy

Python 264 98 Updated Feb 5, 2023

A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.

1,817 304 Updated Sep 5, 2021

🔐🌐 Privacy-respecting web frontends for popular services

1,923 35 Updated Mar 21, 2024

A web client for Reddit with authenticated logins and a variety of browsing options

TypeScript 569 83 Updated Feb 14, 2024

Whoami provides enhanced privacy, anonymity for Debian and Arch based linux distributions

Shell 1,959 165 Updated Oct 11, 2024

A very small, very simple, yet very secure encryption tool.

Go 2,443 147 Updated Jun 1, 2024
533 123 Updated Jun 19, 2024

Red team Interview Questions

594 69 Updated Jul 23, 2024

OSWE, OSEP, OSED, OSEE

2,652 551 Updated Jun 16, 2024

Tools and Resources for Physical Security Red Teaming

23 2 Updated Jul 31, 2024

A powerfull websites compiler/obfuscator for optimization or intellectual property protection purposes.

JavaScript 99 6 Updated Oct 7, 2024

Invisible network protocol sniffer

Python 719 79 Updated Aug 23, 2024

🛡️ Anonymous F2F network based on the QB-problem & GP/12 protocol stack. Uses post-quantum cryptographic functions ML-KEM, ML-DSA

Go 82 8 Updated Nov 10, 2024

VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)

Python 38 4 Updated Sep 15, 2024

RomBuster is a router exploitation tool that allows to disclosure network router admin password.

Python 480 71 Updated Jul 18, 2024

proxychains - a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy. Supported auth-types: "user/pass" fo…

C 6,779 631 Updated Jun 8, 2024

This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them

7,094 1,367 Updated Sep 25, 2024

Demonized Shell is an Advanced Tool for persistence in linux.

Shell 301 39 Updated Aug 29, 2024

Checklist of the most important security countermeasures when designing, testing, and releasing your API

22,468 2,598 Updated Apr 16, 2024

🖧🔍 WIFI / LAN intruder detector. Scans for devices connected to your network and alerts you if new and unknown devices are found.

HTML 3,054 184 Updated Nov 10, 2024

Document (PDF) extraction and parse API using state of the art modern OCRs + Ollama supported models. Anonymize documents. Remove PII. Convert any document or picture to structured JSON or Markdown

Python 1,123 63 Updated Nov 7, 2024

Killer tool is designed to bypass AV/EDR security tools using various evasive techniques.

C++ 753 117 Updated Jul 2, 2024

NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-build support

Rust 153 21 Updated Oct 24, 2024

🔥Highlighting the top ML papers every week.

10,243 598 Updated Oct 29, 2024

JPHP - an implementation of PHP on Java VM

Java 1,711 159 Updated Dec 25, 2021

best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect

Python 543 133 Updated Nov 3, 2024

RoseTTAFold2 protein/nucleic acid complex prediction

Python 333 76 Updated Jun 3, 2024
Next