Stan's repositories
11builder
Scripts to build a trimmed-down Windows 11 image.
airgeddon
This is a multi-use bash script for Linux systems to audit wireless networks.
apk.sh
apk.sh makes reverse engineering Android apps easier, automating some repetitive tasks like pulling, decoding, rebuilding and patching an APK.
attackgen
AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE ATT&CK framework. The tool generates tailored incident response scenarios based on user-selected threat actor groups and your organisation's details.
BackDoorSim
BackdoorSim: An Educational into Remote Administration Tools
Bruteforce-Scanner-API--PHP
♾️ Bruteforce Scanner [v1-API] By AGC007™ -- PHP
Bruteforce-Scanner-Software--Csharp
♾️ Bruteforce Scanner [v1-Software] By AGC007™ -- C#
build-your-own-x
🤓 Build your own (insert technology here)
csaf
Cyber Security Awareness Framework (CSAF)
darkdump
Search The Deep Web Straight From Your Terminal
GONET-Scanner
Golang network scanner with arp discovery and own parser
pwndora
Massive IPv4 scanner, find and analyze internet-connected devices in minutes, create your own IoT search engine at home.
pyradm
🔮 Python Remote administration tool via telegram
remove-mdm
Steps to remove MDM (mobile device management) restrictions from an iPad
SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
SecretScanner
Find secrets and passwords in container images and file systems
SpotiFlyer
Kotlin Multiplatform Music Downloader, Supports Spotify / Gaana / Youtube Music / Jio Saavn / SoundCloud. NOTE: BEING REWRITTEN, SO STAY TUNED.
spotify-github-profile
Show your Spotify playing on your Github profile
SwaggerSpy
Automated OSINT on SwaggerHub
W3M0dP4tch32
W3M0dP4tch32 t0 P4tch W3M0d
web-hacking-playground
Web application with vulnerabilities found in real cases, both in pentests and in Bug Bounty programs.