Lists (1)
Sort Name ascending (A-Z)
Stars
This sample code is to guide the developer how to integrate the Network Kit.It incorporates Huawei's experience in far-field network communications, and utilizes scenario-based RESTful APIs as wellβ¦
Information gathering framework for phone numbers
WP REST API FNS <= 1.0.0 - Privilege Escalation
Open-source Windows and Office activator featuring HWID, Ohook, TSforge, and Online KMS activation methods, along with advanced troubleshooting.
DetectDee: Hunt down social media accounts by username, email or phone across social networks.
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
π Reference guide for scanning networks with Nmap.
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, seβ¦
Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.
I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrates how file extension spoofing can be used to evade detection.
These are all of notes from David Bombal's CCNA Start course
Code examples for David Bombal's Python Videos
Powershell scripts used in David Bombal's YouTube videos.
A Public available archive of the leaked Vault 7 archive files
WikiLeaks Vault 7 CIA Hacking Tools
A curated list of awesome data sources related to elections, electoral reforms, and democratic political systems.
π Freely available programming books
Master programming by recreating your favorite technologies from scratch.
Curated list of project-based tutorials
π A collection of interesting, funny, and depressing search queries to plug into shodan.io π©βπ»