Skip to content
View Cryptekshots's full-sized avatar

Block or report Cryptekshots

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

IB Trader API and a number of prototype and scripts. Most are based on the C# API.

C# 5 2 Updated Feb 16, 2018

Python Jupyter Notebooks for Financial Portfolio Optimization

Jupyter Notebook 37 10 Updated Aug 25, 2018

"High Frequency" style trading algo based on the Dempster-Shafer fusion theory in C# using the Interactive Brokers API.

C# 34 20 Updated Apr 27, 2019

Python quantitative trading strategies including VIX Calculator, Pattern Recognition, Commodity Trading Advisor, Monte Carlo, Options Straddle, Shooting Star, London Breakout, Heikin-Ashi, Pair Tra…

Python 9,027 1,679 Updated Apr 14, 2024

A drone engineered to autonomously seek out, hack, and wirelessly take full control over any other Parrot or 3DR drones within wireless or flying distance, creating an army of zombie drones under y…

JavaScript 1,797 426 Updated Nov 21, 2017

BlackEye Phishing Kit in Python w Serveo Subdomain Creation | Educational Purposes Only

HTML 547 271 Updated Sep 4, 2023

Paypal phishing tool

HTML 30 15 Updated Jul 1, 2018

A low pin count sniffer for ICEStick - targeting TPM chips

Verilog 170 28 Updated Jun 8, 2020

Full shell scripts for the second edition of Wicked Cool Shell Scripts

Shell 253 87 Updated Jul 19, 2017

An analysis on cryptocurrency mining malware embedded via JavaScript.

JavaScript 14 7 Updated Mar 19, 2018

Scripts to create your own MITM'ing, packet sniffing WiFi access point

Python 149 31 Updated Aug 21, 2015

Android tool to calculate the required length of the random number used in Paypass Magstripe mode CVC calculation

Java 33 14 Updated Mar 23, 2015

An input element that only allows cvc codes

HTML 8 14 Updated Jan 29, 2025

Hackpad is a web-based realtime wiki.

Java 3,670 521 Updated May 22, 2023

TensorFlow Tutorial and Examples for Beginners (support TF v1 & v2)

Jupyter Notebook 43,786 14,819 Updated Jul 26, 2024

Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and users through SMB.

Python 573 103 Updated Jun 19, 2024

Malicious USB

C 176 35 Updated Nov 4, 2023

P4wnP1 is a highly customizable USB attack platform, based on a low cost Raspberry Pi Zero or Raspberry Pi Zero W.

Python 4,331 666 Updated Aug 12, 2024

PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2

Python 1,205 276 Updated Feb 6, 2022

The Rogue Access Point Framework

Python 14,372 2,721 Updated Feb 4, 2025

Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using scree…

Python 1,167 249 Updated Oct 20, 2022

Malicious WMI Events using PowerShell

PowerShell 398 69 Updated Jul 25, 2016
Python 174 37 Updated Jan 31, 2018

The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.

Python 3,150 830 Updated Mar 6, 2025

PHP_CodeSniffer tokenizes PHP files and detects violations of a defined set of coding standards.

PHP 10,789 1,459 Updated Apr 1, 2024

A framework for wireless pentesting.

Python 1,228 164 Updated Oct 14, 2020

Sniffing browser history using HSTS

JavaScript 936 105 Updated Aug 5, 2017

Sniffs sensitive data from interface or pcap

Python 1,809 441 Updated Nov 2, 2023

NetRipper - Smart traffic sniffing for penetration testers

PowerShell 1,384 314 Updated Jun 17, 2022
Next