TonyStark's repositories
Binance.Net
Some improvements on a Binance.net main repo for specific tasks. Merged to the main brunch
bitburner-scripts
My own scripts for playing bitburner
Blackbone
Windows memory hacking library
Blacknet
Blacknet source
byob
An open-source post-exploitation framework for students, researchers and developers.
Cl0neMast3r
Git all your favorite tools in one click
fsociety
fsociety Hacking Tools Pack – A Penetration Testing Framework
GitDorker
A Python program to scrape secrets from GitHub through usage of a large repository of dorks.
gitGraber
gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, Github, Mailgun, Facebook, Twitter, Heroku, Stripe...
Goohak
Automatically Launch Google Hacking Queries Against A Target Domain
gpt4all
gpt4all: a chatbot trained on a massive collection of clean assistant data including code, stories and dialogue
hacker101
Source code for Hacker101.com - a free online web and mobile security class.
IPGeoLocation
Retrieve IP Geolocation information
JackTheVideoRipper
Download YouTube videos or audio easily with a few point and clicks. Desktop GUI for youtube-dl fork yt-dlp. Designed for Windows 10/11.
Keylogger-sources
keyloggers sources
Legacy-Botnets-Source-Code-Collection
legacy Botnets source code Forked from github.com/malwares
locatarr
My intent is to locate all the *arr apps that are out there in the world, like Sonarr, Radarr, etc. Thus, locatarr
metasploit-framework
Metasploit Framework
pdfs
Technically-oriented PDF Collection (Papers, Specs, Decks, Manuals, etc)
plex-reshare
Re-share Plex's shared libraries with you further to other users on your server
port-forwarding
Tunneling and Port Forwarding Cheat Sheet
RATS-sources
Rats sources
RootKits-List-Download
This is the list of all rootkits found so far on github and other sites.
SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
Sn1per
Attack Surface Management Platform
WhatWaf
Detect and bypass web application firewalls and protection systems
Zeus-Scanner
Advanced reconnaissance utility
Zombie-Content-management-systems-exploitation-Bot-Source
Zombie Content management systems exploitation Bot Source