Skip to content
View JCBrown602's full-sized avatar
:octocat:
:octocat:
  • JETCAN LABS
  • Phoenix, Arizona

Block or report JCBrown602

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Graph visualization of wireless client and access point relationships

Vue 117 14 Updated Dec 14, 2022

A collection of CTF write-ups, pentesting topics, guides and notes. Notes compiled from multiple sources and my own lab research. Topics also support OSCP, Active Directory, CRTE, eJPT and eCPPT.

499 103 Updated Oct 10, 2024
Python 33 3 Updated Aug 11, 2022

The Rogue Access Point Framework

Python 13,171 2,585 Updated Dec 17, 2023

Monitorize all the hardware sensors of your PC using Java

Java 126 31 Updated Aug 23, 2021

Probe for hardware, check operability and find drivers

Perl 738 64 Updated Aug 20, 2024

This repo contains driver samples prepared for use with Microsoft Visual Studio and the Windows Driver Kit (WDK). It contains both Universal Windows Driver and desktop-only driver samples.

C 1 Updated Nov 2, 2018

lightweight hypervisor SDK written in C++ with support for Windows, Linux and UEFI

C++ 1,349 206 Updated Aug 14, 2024

Tool for using wireless signals to see if you're being followed.

Python 630 65 Updated Nov 22, 2022

A text-based RPG written in Java

Java 60 59 Updated Sep 3, 2023

Some setup scripts for security research tools.

Shell 8,434 1,884 Updated Nov 21, 2023

Legion is an open source, easy-to-use, super-extensible and semi-automated network penetration testing tool that aids in discovery, reconnaissance and exploitation of information systems.

Python 1,014 169 Updated Jul 10, 2024

A shorter, less intimidating list of infosec resources helpful for anyone trying to learn.

525 66 Updated Nov 20, 2022

A Go library for implementing command-line interfaces.

Go 1,730 122 Updated Jul 22, 2024

Good to know, easy to forget information about binaries and their exploitation!

66 10 Updated Sep 23, 2017

detect stegano-hidden data in PNG & BMP

Ruby 1,284 140 Updated Mar 25, 2024

Instructions on how to create your very own Pwnbox, originally created by HTB

Scheme 384 72 Updated Sep 22, 2022

🍯 T-Pot - The All In One Multi Honeypot Platform 🐝

C 6,718 1,070 Updated Oct 8, 2024

Exploit Development and Reverse Engineering with GDB Made Easy

Python 7,472 878 Updated Oct 10, 2024

Pillar - Bootstrap 5 Resume/CV Theme for Developers

CSS 220 197 Updated Jun 30, 2023

gpp-decrypt

Ruby 26 6 Updated Apr 15, 2017

Active Directory Group Policy Preferences cpassword cracker/decrypter.

Python 23 10 Updated Apr 14, 2021

Standalone binaries for Linux/Windows of Impacket's examples

Python 715 92 Updated Jul 25, 2023

Open Source Repo for Integrated Web Systems blog samples

C# 69 33 Updated Sep 10, 2013

Sushy is a small Python library to communicate with Redfish based systems. Mirror of code maintained at opendev.org.

Python 36 40 Updated Oct 2, 2024

Corelan Repository for mona.py

Python 1,695 563 Updated Mar 26, 2024

Scripted Local Linux Enumeration & Privilege Escalation Checks

Shell 6,970 1,985 Updated Sep 6, 2023

Linux post exploitation enumeration and exploit checking tools

Shell 176 49 Updated Apr 13, 2020
Next