m8c's repositories
403bypasser
automate the procedure of 403 response code bypass
apkleaks
Scanning APK file for URIs, endpoints & secrets.
AppleJuice
Apple BLE proximity pairing message spoofing
AZ-104-MicrosoftAzureAdministrator
AZ-104 Microsoft Azure Administrator
breaking-and-pwning-apps-and-servers-aws-azure-training
Course content, lab setup instructions and documentation of our very popular Breaking and Pwning Apps and Servers on AWS and Azure hands on training!
certified-kubernetes-administrator-course
Certified Kubernetes Administrator - CKA Course
CETI
Especialización en Ciberseguridad en Entornos de las tecnologías de la Información
dvna
Damn Vulnerable NodeJS Application
EvilSelenium
EvilSelenium is a project that weaponizes the Chrome browser.
IABD
Especialización en Inteligencia Artificial y Big Data
internet-monitoring
Monitor your network and internet speed with Docker & Prometheus
iSponsorBlockTV
SponsorBlock client for all YouTube TV clients.
ivoorip
Rip Ivoox mp3
Microsoft-Activation-Scripts
A Windows and Office activator using HWID / Ohook / KMS38 / Online KMS activation methods, with a focus on open-source code and fewer antivirus detections.
modern-unix
A collection of modern/faster/saner alternatives to common unix commands.
nextcloud-adguardhome-docker-compose
Docker-compose.yml for running Nextcloud and AdGuard Home with a Nginx reverse proxy and Lets Encrypt SSL
orchestrate-with-kubernetes
Orchestrating the Cloud with Kubernetes
PhishingKitTracker
Let's track phishing kits to give to research community raw material to study !
pivpn
The Simplest VPN installer, designed for Raspberry Pi
portainer-compose
Compose setup for Portainer
rms-support-letter.github.io
An open letter in support of Richard Matthew Stallman being reinstated by the Free Software Foundation
stack-docs
Elastic Stack Documentation
subspace
A simple WireGuard VPN server GUI
TinyCheck
TinyCheck allows you to easily capture network communications from a smartphone or any device which can be associated to a Wi-Fi access point in order to quickly analyze them. This can be used to check if any suspect or malicious communication is outgoing from a smartphone, by using heuristics or specific Indicators of Compromise (IoCs). In order t
uptime-kuma
A fancy self-hosted monitoring tool
vulnx
vulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}