Mandex's repositories
learn_gnuawk
Example based guide to mastering GNU awk
hardware-hacking
Some stuff about Hardware Hacking
deksterecon
Web Application recon automation
HackBar
HackBar is a security audit tool that will enable you to pentest websites more easily. ... You can use it to check site security by performing SQL injections, XSS holes and more. It also has a user-friendly interface that makes it easy for you to do fuzz testing, hash generation, encoding and more.
Scanners-Box
A powerful hacker toolkit collected more than 10 categories of open source scanners from Github - 安全行业从业者自研开源扫描器合辑
gatee
⛔️ Advanced protection for your Telegram chat
gitjacker
🔪 :octocat: Leak git repositories from misconfigured websites
How-To-Ask-Questions-The-Smart-Way
本文原文由知名 Hacker Eric S. Raymond 所撰寫,教你如何正確的提出技術問題並獲得你滿意的答案。
Cryptoggy
Cryptoggy is an open source, fully python ransomware .
xss-cheatsheet-data
This repository contains all the XSS cheatsheet data to allow contributions from the community.
captcha_bypass
Captcha bypassing methods for Selenium
php-credit-card-validator
Validates popular debit and credit cards numbers against regular expressions and Luhn algorithm. Also validates the CVC and the expiration date.
ultimate-python
Ultimate Python study guide for newcomers and professionals alike. :snake: :snake: :snake:
kb
A minimalist knowledge base manager
GitHub-Dark
:octocat: Dark GitHub style
halo
💫 Beautiful spinners for terminal, IPython and Jupyter
The-Hacker-Recipes
This project is aimed at freely providing technical guides on various hacking topics: Active Directory services, web services, servers, intelligence gathering, physical intrusion, phishing, mobile apps, iot, social engineering, etc.
Fake-Sandbox-Artifacts
This script allows you to create various artifacts on a bare-metal Windows computer in an attempt to trick malwares that looks for VM or analysis tools
ezXSS
ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.
Invoke-ZeroLogon
Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls on their behalf.
bbht
A script to set up a quick Ubuntu 17.10 x64 box with tools I use.
Cheat-Sheets
Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)
Practical-Ethical-Hacking---The-Complete-Course-Notes-and-Resources-
Practical Ethical Hacking - The Complete Course (Notes and Resources)
SecGen
Create randomly insecure VMs