Skip to content
View ik777G's full-sized avatar
🏠
Working from home
🏠
Working from home

Block or report ik777G

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Beta Lists are currently in beta. Share feedback and report bugs.

Starred repositories

Showing results

Best Practices, code samples, and documentation for Computer Vision.

Jupyter Notebook 9,469 1,170 Updated Feb 16, 2024

The authentication glue you need.

Python 13,019 866 Updated Sep 29, 2024

A Suricata based IDS/IPS/NSM distro

Shell 1,447 285 Updated Aug 12, 2024

Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.

Shell 13,083 1,464 Updated Sep 26, 2024

quicmap is a simple yet quic (!) QUIC protocol scanner

Python 79 13 Updated Mar 12, 2024

Steal Telegram Session bypass 2fa using powershell script

PowerShell 67 14 Updated Aug 27, 2023

📦🔐 A lightweight Node.js private proxy registry

TypeScript 16,307 1,365 Updated Sep 29, 2024

Geolocation Spy (GeoSpy) is an OSINT analysis and research tool that is used to track and execute intelligent social engineering attacks in real time. It was created with the aim of teaching the wo…

Python 19 1 Updated Jan 27, 2021

https://wiki.seeedstudio.com/Getting_Started Seeed Studio Wiki source code

JavaScript 111 129 Updated Sep 29, 2024

Find, verify, and analyze leaked credentials

Go 15,769 1,640 Updated Sep 29, 2024

Detect file content types with deep learning

Rust 7,742 410 Updated Sep 26, 2024

Navigate the CVE jungle with ease.

Go 1,632 107 Updated Sep 23, 2024

Dependency Manager for PHP

PHP 28,547 4,532 Updated Sep 26, 2024
Python 404 39 Updated Feb 24, 2024

K8Studio: A Kubernetes IDE

800 25 Updated Jun 17, 2024

Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication

Go 10,701 1,935 Updated Aug 21, 2024

🎥 An AI-powered movie suggestion engine, built with love and Azure

Bicep 1 Updated Nov 2, 2023

🎥 An AI-powered movie suggestion engine

Bicep 5 2 Updated Sep 10, 2024

A repository of curated datasets from various attacks

Python 568 94 Updated Sep 16, 2024

This repository is for active development of the Azure SDK for Embedded C. For consumers of the SDK we recommend visiting our versioned developer docs at https://azure.github.io/azure-sdk-for-c.

C 224 120 Updated Sep 26, 2024

game of active directory

PowerShell 5,099 713 Updated Sep 26, 2024

Lab using MongoDB with Python (PyMongo driver). Created for educational use by the MongoDB for Academia program.

Jupyter Notebook 18 7 Updated Feb 22, 2022

The DevEx & Application-layer for your Internal Developer Platform ⛵

Go 1,041 41 Updated Sep 27, 2024

🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as an archive.

Python 481 89 Updated Apr 3, 2024

Cooperate Demo

TypeScript 1 Updated Oct 12, 2023

CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable reports more consistently and efficiently.

TypeScript 189 28 Updated Nov 9, 2023

Software Vulnerabilities to Weakness Mapping

Jupyter Notebook 22 8 Updated Feb 24, 2022
JavaScript 7 59 Updated Sep 18, 2023

A tool to recover from ESXiArgs ransomware

Shell 293 41 Updated Feb 10, 2023
Next