spikedout's starred repositories
awesome-piracy
A curated list of awesome warez and piracy links
unredacter
Never ever ever use pixelation as a redaction technique
telegram-crawler
🕷 Automatically detect changes made to the official Telegram sites, clients and servers.
inthewilddb
Hourly updated database of exploit and exploitation reports
my-infosec-awesome
My curated list of awesome links, resources and tools on infosec related topics
python-tricks
Some cool Python tricks
rengine
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with minimal configuration and with the help of reNgine's correlation, it just makes recon effortless.
XLMMacroDeobfuscator
Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)
Malware-analysis-and-Reverse-engineering
Some of my publicly available Malware analysis and Reverse engineering.
debian-cis
PCI-DSS compliant Debian 10/11/12 hardening
malwoverview
Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, ThreatFox, Triage, InQuest and it is able to scan Android devices against VT.
Telegram-Trilateration
Proof of concept for abusing Telegram's "People Near Me" feature and tracking people's location
jenkins-decrypt
Credentials dumper for Jenkins
GTFOBins.github.io
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
KDE-ARBITRARY-CODE-EXECUTION-AUTOCLEAN
KDE 4 & 5 Plasma Arbitrary Code Execution, Auto Clean up PoC
SUDO_KILLER
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.
CVE-2021-4034
CVE-2021-4034 1day