Febi Mudiyanto's repositories
python-project
semua project python
awesome-security-hardening
A collection of awesome security hardening guides, tools and other resources
badusb
Flipper Zero ducky payload repo
ESP32Marauder
A suite of WiFi/Bluetooth offensive and defensive tools for the ESP32
esp_wifi_repeater
A full functional WiFi Repeater (correctly: a WiFi NAT Router)
exploitation-course
Offensive Software Exploitation Course
face-matching
powered by deepface
FLIPPER-JAMM
Looking for those jamming files that were removed from custom firmwares? Here they are. Only for educational purposes, of course.
Flipper-Zero-Sub-GHz-Jamming
Looking for those jamming files that were removed from custom firmwares? Here they are. Only for educational purposes, of course.
Flipper_Zero_Badusb_hack5_payloads
hack5 badusb payloads moded for be played with flipper zero
flipperzero-chat-esp32
A Sketch for the ESP32 that allows chatting with flippers over a CC1101
flipperzero-firmware-with-wifi-marauder-companion
Flipper Zero firmware source code with WiFi Marauder companion app
GFPGAN
GFPGAN aims at developing Practical Algorithms for Real-world Face Restoration.
malware-samples
Malware samples, analysis exercises and other interesting resources.
Penetration-Testing-Tools
A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT Security audits purposes.
PMAT-labs
Labs for Practical Malware Analysis & Triage
pywhisker
Python version of the C# tool for "Shadow Credentials" attacks
Red-Team-Playbooks
!!! WORK IN PROGRESS !!! This repository contains cutting-edge open-source security notes and tools that will help you during your Red Team assessments.
RedTeaming-Tactics-and-Techniques
Red Teaming Tactics and Techniques
web-scraping
repositori ini untuk dokumentasi web scrapping yang telah dilakukan.
Whisker
Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, effectively adding "Shadow Credentials" to the target account.
wordlists
Real-world infosec wordlists, updated regularly
WSuspicious
WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations
zip2Animation
Utility to assist in creating flipper zero animations.