nachex's repositories
hosts
Extending and consolidating hosts files from several well-curated sources like adaway.org, mvps.org, malwaredomainlist.com, someonewhocares.org, and potentially others. You can optionally invoke extensions to block additional sites by category.
hacking
Source code from Hacking: The Art of Exploitation (Second Edition).
Auto-GPT
An experimental open-source attempt to make GPT-4 fully autonomous.
Dorks-collections-list
List of Github repositories and articles with list of dorks for different search engines
Complete-Python-3-Bootcamp
Course Files for Complete Python 3 Bootcamp Course on Udemy
EMAGNET
Automated hacking tool that will find leaked databases with 97.1% accurate to grab mail + password together from recent uploads from https://pastebin.com. Bruteforce support for spotify accounts, instagram accounts, ssh servers, microsoft rdp clients and gmail accounts
awesome-oscp
A curated list of awesome OSCP resources
youtube-dl
Command-line program to download videos from YouTube.com and other video sites
tech-jobs-with-relocation
All-in-one guide to getting a tech job abroad 🌎
deep-learning-with-python-notebooks
Jupyter notebooks for the code samples of the book "Deep Learning with Python"
vault-decryptor
A web app for decrypting MetaMask vault data.
public-apis
A collective list of free APIs
Awesome-WAF
🔥 Web-application firewalls (WAFs) from security standpoint.
blackhat-python3
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
safeVPN-THM
iptables rules to only have incoming connections from the machine on TryHackMe
PyPasser
Bypassing reCaptcha V3 by sending HTTP requests & solving reCaptcha V2 using speech to text engine.
violent-python3
Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
evilTrust
Herramienta ideal para el despliegue automatizado de un Rogue AP con capacidad de selección de plantilla + 2FA. No requiere de conexión cableada.
cobol-programming-course
Training materials and labs for a "Getting Started" level course on COBOL
macos-terminal-themes
Color schemes for default macOS Terminal.app
java-jagacy-ibm-3270-emulator-script
java-jagacy-ibm-3270-emulator-script
jagacy-cucumber-bdd-example
Automated Acceptance tests for Mainframe/Green Screens with Jagacy & Cucumber
books
Personal Collection
eval-hercules-mvs-3.8-turnkey-4-system
Evaluation Hercules MVS 3.8 Turn Key 4 System
eval-jagacy3270
Jagacy3270 - Demo and Evaluation project of Jagacy API interact with mainframe
brains
⚡️λ Ghosts in the Shell : Function Composition in a Network of Brains
docker-elk
The ELK stack powered by Docker and Compose.
terminal-piperita
The "Piperita" terminal theme