- Northern Hemisphere
Highlights
- Pro
Starred repositories
Simplified Rust implementation of the WirelessKeyView tool from the Windows sysinternals toolkit. Used to extract the WiFi networks, authentication standards, and passwords from Windows systems.
DarkScout is a simple, nimble subdomain enumeration tool written in Rust language. It is designed to help bug bounty hunters, security professionals and penetration testers discover subdomains of a…
✨ ✨ A Simple Tool To Setup A Mac for Development✨✨
A shell script to set up a macOS laptop for web and mobile development.
A beginner's guide to setting up a development environment on macOS
Sinister is Windows/Linux Keylogger Generator which sends key-logs via email with other juicy target info
Nuclei Templates Collection
Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.
The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform
Dump NTDS with golden certificates and UnPAC the hash
🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300 other hashes ☄ Comes with a neat web app 🔥
Software to identify the different types of hashes -
Converts/manipulates/extracts data from a Nmap scan output.
In this article, I'll walk you through the process of building a backend API using the Actix web framework, SQLX, PostgreSQL, and Docker. Once we've created a powerful backend, we'll move on to bui…
In this article, you'll learn how to build a CRUD API in Rust using SQLX, Actix-web, and PostgreSQL. Learning how to build a CRUD API as a developer will equip you with valuable skills for building…
Rust Weaponization for Red Team Engagements.
Welcome to the 100 Days of Rust Coding Challenge! This challenge is designed to help you learn and improve your Rust programming skills over the course of 100 days.
A list of practical knowledge-building projects.
USB drop framework to check-in to an attacker controlled server if successful.
VBS macro template that can be easily modified per engagement to ensure stealth.
Collection of GoPhish templates available for legitimate usage.
Repository containing useful links for all things Physical Security. Please contribute!
Node graphs, OSINT data mining, and plugins. Connect unstructured and public data for transformative insights
Applied offensive security with Rust - https://kerkour.com/black-hat-rust
[POC] Asynchronous reverse shell using the HTTP protocol.