pu55yf3r's repositories
AIUI
AIUI is a platform enabling seamless two-way verbal communication with AI.
AutoRecon
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
bbot
OSINT automation for hackers.
BloodHound
Six Degrees of Domain Admin
BloodHound-c
Six Degrees of Domain Admin
CloudBrute
Awesome cloud enumerator
Coercer
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.
commix
Automated All-in-One OS Command Injection Exploitation Tool.
counter-osint-guide-ru
Исчерпывающее руководство по приватности и контр-ОСИНТ для Рунета и всего СНГ 🇷🇺
cve
Gather and update all available and newest CVEs with their PoC.
DEX-Arbitrage
Example arbitrage trading bot
EnigmaCracker
EnigmaCracker is a tool for brute forcing crypto wallets
ethereum-wallet-generator
Blazing fast multiple Ethereum and Crypto vanity wallet generator💰 Generate a ten thousand beautiful crypto wallets in a sec ⚡️🎨 Awesome ethereum vanity address generator🤩
Exegol
Fully featured and community-driven hacking environment
free-proxy-list
🚀 Free HTTP, SOCKS4, & SOCKS5 Proxy List * Updated every 5 minutes *
godoh
🕳 godoh - A DNS-over-HTTPS C2
HatSploit
Modular penetration testing platform that enables you to write, test, and execute exploit code.
Havoc
The Havoc Framework.
legba
A multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷
Malcolm
Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.
metabigor
OSINT tools and more but without API key
Mevbot
Ethereum MEV Sandwich Bot: Use AI to Make Passively | MEV Bot Guide
Mindmap
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them
public-apis
A collective list of free APIs
pwnat
The only tool/technique to punch holes through firewalls/NATs where multiple clients & server can be behind separate NATs without any 3rd party involvement. Pwnat is a newly developed technique, exploiting a property of NAT translation tables, with no 3rd party, port forwarding, DMZ, DNS, router admin requirements, STUN/TURN/UPnP/ICE, or spoofing.
pwntools
CTF framework and exploit development library
resolvers
The most exhaustive list of reliable DNS resolvers.
SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
wapiti
Web vulnerability scanner written in Python3