Skip to content
View narbi's full-sized avatar

Block or report narbi

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…

PHP 68,952 24,914 Updated Feb 20, 2026

CloudMapper helps you analyze your Amazon Web Services (AWS) environments.

JavaScript 6,259 840 Updated Jul 15, 2024

A forensics tool to convert the data in the Windows srum (System Resource Usage Monitor) database to an xlsx spreadsheet.

Python 735 122 Updated Jun 5, 2025

Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.

140 18 Updated Jan 16, 2026

AWS API Gateway management tool for creating on the fly HTTP pass-through proxies for unique IP rotation

Python 2,214 302 Updated Apr 3, 2023

Azure and AWS Attacks

1,113 252 Updated Nov 25, 2022
Dockerfile 12 7 Updated Feb 12, 2026

A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compiled for educational purposes. The contents of this repository…

1,136 131 Updated Jul 19, 2024

Cybersecurity Career Path

1,994 212 Updated Aug 10, 2025

ALL IN ONE Hacking Tool For Hackers

Python 55,016 6,004 Updated Oct 14, 2025

💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh

Python 3,607 465 Updated Nov 14, 2025

A/D CTF services developed for ECSC 2022

Python 12 2 Updated Nov 11, 2022

Simple and standalone exploit execution toolkit

Python 10 1 Updated Nov 8, 2022

Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types

Python 411 50 Updated Mar 21, 2025

YSOSERIAL Integration with burp suite

Java 165 40 Updated Dec 16, 2022

🎓 Path to a free self-taught education in Computer Science!

HTML 201,495 25,038 Updated Feb 6, 2026

FSOP Again

C 32 Updated Apr 3, 2022

A tool to analyze the network flow during attack/defence Capture the Flag competitions

JavaScript 637 88 Updated Dec 7, 2022

Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure DevOps release pipelines.

2,776 382 Updated Feb 18, 2026

grim reaper c2

Nim 346 41 Updated Nov 19, 2022

Fastest filesystem scanner for log4shell (CVE-2021-44228, CVE-2021-45046) and other vulnerable (CVE-2017-5645, CVE-2019-17571, CVE-2022-23305, CVE-2022-23307 ... ) instances of log4j library. Excel…

Python 39 13 Updated Jun 21, 2023

A Picamera2 application to take a picture every time a movement is detected. It then uploads the image to a backend server you can setup at https://github.com/mastrolinux/raspberry-pi-security-came…

Python 6 1 Updated Apr 21, 2022

NCC Group Open Source RF Security Testing Methodology

HTML 90 23 Updated Apr 28, 2022

A fast enumeration tool for Windows Active Directory Pentesting written in Go

Go 277 37 Updated Jan 14, 2023
Python 11 3 Updated Apr 18, 2022

⭐ ⭐ ⭐ Build your own IP Attack Maps with SOUND!

HTML 1,065 240 Updated Aug 28, 2025

PEDA - Python Exploit Development Assistance for GDB

Python 6,103 828 Updated Jul 29, 2024

Gateway between a Philips Hue bridge and MQTT

Java 52 15 Updated Feb 25, 2019

The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis

JavaScript 34,082 3,845 Updated Feb 18, 2026
Next