Ivannoe Báez's starred repositories
IntroLabsRemastered
Intro Labs Remastered
rockyou2024.txt
Magnet Link for Downloading
reggaetonBeGone
Detects reggaeton genre with Machine Learning and sends packets to disable BT speakers (hopefully)
vulnerable-AD-plus
Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab
BLUETOOTH-DOS-ATTACK-SCRIPT
Script for quick and easy DOS-attacks on bluetooth devices for pentest purposes
Least-Privilege-Windows
Todo lo relacionado al menor privilegio posible en Windows General.
BlackHat-C-C-For-Pentesters
BlackHat C++ : C++ For Pentesters, by EC-Council
HHW_HackConRD2024
HackConRD 2024 Badge
safeVPN-THM
iptables rules to only have incoming connections from the machine on TryHackMe
ISC2-CC-Study-Material
ISC2-CC-Study-Material
Evil-M5Core2
Evil-M5Project is an innovative tool developed for ethical testing and exploration of WiFi networks. It's compatible with Cardputer, Atoms3, Fire, core2. You can scan, monitor, and interact with WiFi networks in a controlled environment. This project is designed for educational purposes, aiding in understanding network security and vulnerabilities.
WSL-Handbook
Guía definitiva para Windows Subsystem for Linux
VMware-Workstation-Pro-17-Licence-Keys
Free VMware Workstation Pro 17 full license keys. We've meticulously organized thousands of keys, catering to all major versions of VMware Workstation Pro 17 Choose from our curated selection to enhance your virtualization experience.
Datos-Rep-Dom
Provincias, Municipios y Sectores de República Dominicana en formato JSON y SQL
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
pentesting-active-directory
Active Directory pentesting mind map
RemoveAdblockThing
The intrusive "Ad blocker are not allowed on YouTube" message is annoying. This open-source project aims to address this issue by providing a solution to bypass YouTube's ad blocker detection
ESP32-Sour-Apple
Crashes iOS 17 Devices using a really any device
RedTeam-Physical-Tools
Red Team Toolkit - A curated list of tools that are commonly used in the field for Physical Security, Red Teaming, and Tactical Covert Entry.
Hacking-Security-Ebooks
Top 100 Hacking & Security E-Books (Free Download)
AppleJuice
Apple BLE proximity pairing message spoofing