Skip to content
View Mrhax0rr's full-sized avatar

Block or report Mrhax0rr

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

Showing results

nwipe secure disk eraser

C 691 79 Updated Sep 14, 2024

For educational purposes only, samples of 400+ classic/modern trojan builders including screenshots.

487 128 Updated Sep 17, 2024

Impacket is a collection of Python classes for working with network protocols.

Python 14 1 Updated Jun 27, 2024

HYDRAX, Advanced Malware Generation, Stealth and Evasion Techniques, Exploit Development, Botnet Command and Control (C&C), Payload Customization, Dynamic Obfuscation, Rootkit Development, Adaptive…

6 2 Updated May 28, 2024

Complete Malware Index - Use at your own Risk!

9 1 Updated Sep 2, 2024

Cyber-Security Bible! Theory and Tools, Kali Linux, Penetration Testing, Bug Bounty, CTFs, Malware Analysis, Cryptography, Secure Programming, Web App Security, Cloud Security, Devsecops, Ethical H…

33 7 Updated Sep 15, 2024

A comprehensive collection of CyberSecurity PDFs. Guides, Research Papers, Education, Information Security, Network Security, Cryptography, Malware Analysis, Penetration Testing, Ethical Hacking, D…

9 3 Updated Sep 16, 2024

A curated collection of free or freemium web-based penetration testing and vulnerability analysis tools. These tools assist security professionals and enthusiasts in discovering, assessing, and man…

3 1 Updated Sep 18, 2024

ChatGPT Jailbreaks, GPT Assistants Prompt Leaks, GPTs Prompt Injection, LLM Prompt Security, Super Prompts, Prompt Hack, Prompt Security, Ai Prompt Engineering, Adversarial Machine Learning.

961 113 Updated Sep 18, 2024

A list of Free Software network services and web applications which can be hosted on your own servers

195,221 9,475 Updated Sep 16, 2024

A list of Free Software network services and web applications which can be hosted on your own servers

JavaScript 3 1 Updated Oct 3, 2022

🖧🔍 WIFI / LAN intruder detector. Scans for devices connected to your network and alerts you if new and unknown devices are found.

HTML 2,716 158 Updated Sep 19, 2024

Jam all wifi clients/routers.

Shell 551 81 Updated Feb 13, 2020

📢 🔒 Exploit manager for attack-defense CTF competitions

CSS 281 74 Updated May 24, 2022

All about bug bounty (bypasses, payloads, and etc)

5,756 1,128 Updated Sep 8, 2023

Create randomly insecure VMs

Python 2,622 316 Updated Sep 18, 2024

A curated list of CTF frameworks, libraries, resources and softwares

JavaScript 9,615 1,473 Updated Jul 22, 2024

ScanMan is the amalgamation of Masscan, Metasploit Framework (MSF) and Nmap Scripting Engine (NSE).

Python 51 5 Updated Feb 26, 2024

WPScan WordPress security scanner. Written for security professionals and blog maintainers to test the security of their WordPress websites. Contact us via [email protected]

Ruby 8,507 1,252 Updated Sep 9, 2024

Rewrite of the popular wireless network auditor, "wifite"

Python 6,344 1,298 Updated Aug 20, 2024

Virtual Machine for Adversary Emulation and Threat Hunting

1,235 192 Updated Jul 13, 2020

Command-line tools for speech and intent recognition on Linux

Python 1,089 63 Updated Mar 7, 2024

A fast, local neural text to speech system

C++ 5,832 425 Updated Aug 7, 2024

A reference of Windows API function calls, including functions for file operations, process management, memory management, thread management, dynamic-link library (DLL) management, synchronization,…

70 108 Updated Nov 22, 2023

Bash Tool for creating Macros for products microsoft office

Python 6 Updated Feb 27, 2024

The simplest example of an obfuscator library

C# 1 Updated Sep 13, 2024

Builder for executable file that injects into legitimate processes

C# 8 1 Updated Jul 29, 2024

Just an example of an obfuscator with custom methods

C# 8 1 Updated Aug 1, 2024

T-Converter Free v1.0

Python 17 5 Updated Jul 31, 2024

Pre-Auth Exploit for CVE-2024-40711

C# 19 6 Updated Sep 15, 2024
Next