Dvir S.'s starred repositories

zed

Code at the speed of thought – Zed is a high-performance, multiplayer code editor from the creators of Atom and Tree-sitter.

Language:RustLicense:NOASSERTIONStargazers:42771Issues:193Issues:6991

nuclear

Streaming music player that finds free music for you

Language:TypeScriptLicense:AGPL-3.0Stargazers:11817Issues:146Issues:892

OpenGFW

OpenGFW is a flexible, easy-to-use, open source implementation of GFW (Great Firewall of China) on Linux

Language:GoLicense:MPL-2.0Stargazers:9321Issues:66Issues:67

homarr

Customizable browser's home page to interact with your homeserver's Docker containers (e.g. Sonarr/Radarr)

Language:TypeScriptLicense:MITStargazers:5617Issues:17Issues:990

nuclei-wordfence-cve

The EXCLUSIVE Collection of 38,000+ Nuclei templates based on Wordfence intel. Daily updates for bulletproof WordPress security.

local-llms-analyse-finance

In this project, I explored how local LLMs can be used to label data and support analyses. Specifically, I used Llama2 model to automatically categorise my bank transaction data.

Language:Jupyter NotebookLicense:MITStargazers:742Issues:15Issues:2

pwnagotchi

(⌐■_■) - Deep Reinforcement Learning instrumenting bettercap for WiFi pwning.

Language:JavaScriptLicense:NOASSERTIONStargazers:705Issues:43Issues:74

GraphStrike

Cobalt Strike HTTPS beaconing over Microsoft Graph API

ocreeb-mk-2

Modular Macro Keyboard System

Language:PythonLicense:NOASSERTIONStargazers:369Issues:28Issues:10

X1Plus

Custom firmware for Bambu Lab X1 and X1 Carbon 3D printers

Language:PythonLicense:NOASSERTIONStargazers:308Issues:10Issues:185

ContainYourself

A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.

Evil-M5Core2

Evil-M5Core2 is an innovative tool developed for ethical testing and exploration of WiFi networks. You can scan, monitor, and interact with WiFi networks in a controlled environment. This project is designed for educational purposes, aiding in understanding network security and vulnerabilities.

deoptimizer

Evasion by machine code de-optimization.

Language:RustLicense:MITStargazers:287Issues:6Issues:1

Microsoft-Analyzer-Suite

A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID

Language:PowerShellLicense:GPL-3.0Stargazers:236Issues:9Issues:1

CVE-2024-32002

CVE-2024-32002 RCE PoC

parley

Tree of Attacks (TAP) Jailbreaking Implementation

Language:PythonLicense:MITStargazers:86Issues:4Issues:0

DiscoHash

Pwnagotchi plugin to convert pcaps to hashcat mode 22000 hashes, analyse them, grab the GPS location and post the information to Discord using a web hook.

jetson-nano-image-maker

Create sd-card ready jetson nano images using Docker and Github Actions

fingerprinter

Web application designed to raise user awareness and fortify online identities against tracking techniques.

Language:HTMLStargazers:21Issues:1Issues:0

user-bambulab-firmware

Bambu Lab printer firmware URL repository.

Language:PythonStargazers:20Issues:0Issues:0

Mini_Excavator

This repository includes the code for the 3D Printed RC Excavator Project

Language:C++Stargazers:20Issues:0Issues:0

Defcon31-Badge

DCZia DC31 Badge

zeroone

Zero/One is a Vue.js configuration software for NanoD devices

Language:VueStargazers:12Issues:5Issues:0

Scamstroyer

Scamstroyer is a python based application that lets you run or control the target user computer without them knowing.

Language:HTMLStargazers:11Issues:1Issues:0

assyrian_dictionary_web

sargonsays English to Assyrian dictionary front end web app

Language:JavaScriptLicense:MITStargazers:10Issues:1Issues:3
Language:JavaScriptLicense:MITStargazers:4Issues:0Issues:0

Brute_SnusBase

SnusBase Scrap brute force

Language:PythonStargazers:2Issues:0Issues:0