nobel's repositories
anonymizer
Universal tool to anonymize database. GDPR (General Data Protection Regulation) data protection act supporting tool.
docker.github.io
Source repo for Docker's Documentation
geckodriver
WebDriver for Firefox
30-Days-Of-Python
30 days of Python programming challenge is a step-by-step guide to learn the Python programming language in 30 days. This challenge may take more than100 days, follow your own pace.
Apktool
A tool for reverse engineering Android apk files
awesome-forensics
A curated list of awesome forensic analysis tools and resources
cli
the package manager for JavaScript
DVWA
Damn Vulnerable Web Application (DVWA)
Firecrack
:fire: Firecrack pentest tools: Facebook hacking random attack, deface, admin finder, bing dorking:
freecodecamp-curso-javascript
Código del curso "Aprende JavaScript - Curso Completo desde Cero" creado para freeCodeCamp.
Ghost
👻 The #1 headless Node.js CMS for professional publishing
hackingtool
ALL IN ONE Hacking Tool For Hackers
IoT-PT
A Virtual environment for Pentesting IoT Devices
lscript
The LAZY script will make your life easier, and of course faster.
OCSInventory-Server
Communication server of OCS Inventory
pentest
Image with the more used tools to create a pentest environment easily and quickly.
Power-Fx
Power Fx low-code programming language
rekall
Rekall Memory Forensic Framework
sgn
Shikata ga nai (仕方がない) encoder ported into go with several improvements
Shodanfy.py
Get ports,vulnerabilities,informations,banners,..etc for any IP with Shodan (no apikey! no rate-limit!)
TheFatRat
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .
theHarvester
E-mails, subdomains and names Harvester - OSINT
uDork
uDork is a script written in Bash Scripting that uses advanced Google search techniques to obtain sensitive information in files or directories, find IoT devices, detect versions of web applications, and so on.
volatility
An advanced memory forensics framework