This repository is my own list of tools / useful stuff for pentest, defensive activities, programming, lockpicking and physical security
☆64Dec 1, 2022Updated 3 years ago
Alternatives and similar repositories for Infosec-Useful-Stuff
Users that are interested in Infosec-Useful-Stuff are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Breaching physical security, and generally causing mayhem, with wireless signals☆15Mar 19, 2017Updated 9 years ago
- GoLang script that checks for password leaks by sending email address to the BreachDirectory API☆12Nov 3, 2021Updated 4 years ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆94May 20, 2025Updated 10 months ago
- Windows RPC example calling stubs generated from MS-LSAT and MS-LSAD☆28Jan 4, 2024Updated 2 years ago
- Lnk crafting and research tools☆147Mar 4, 2026Updated 3 weeks ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- CyberX-AI-Digital-Twin is an AI-powered cybersecurity platform that uses digital twin technology to simulate, detect, and analyze cyber t…☆14Feb 13, 2025Updated last year
- ☆13Mar 29, 2021Updated 4 years ago
- Improves vulnerability prioritization by enhancing CVSS scores with exploit intelligence. Combines data from CISA KEV, EPSS, Metasploit, …☆14Updated this week
- An OSINT tool for searching DuckDuckGo via Tor using search dorks.☆22May 3, 2025Updated 10 months ago
- Documentation and cheatsheets about CTF and pentest (mirror of https://gitlab.com/xanhacks/ctf-docs).☆13Aug 23, 2023Updated 2 years ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆103Mar 30, 2025Updated 11 months ago
- 几个UAC Bypass的方法☆12Apr 13, 2018Updated 7 years ago
- Speeding up identifying which binaries with a SUID flag may lead to root access☆15Aug 26, 2024Updated last year
- ☆18Oct 12, 2014Updated 11 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆13Jan 25, 2021Updated 5 years ago
- Telegram scraper for Maltego, allows from an Alias entity to find all forwarded accounts☆11Apr 25, 2023Updated 2 years ago
- Wi-Fi Hacking Workshop☆14Dec 27, 2020Updated 5 years ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- ☆145Oct 31, 2023Updated 2 years ago
- A collection of resources related to vulnerability management.☆15Aug 8, 2023Updated 2 years ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- Our fork of Iceman's fork for Proxmark III☆18Dec 14, 2024Updated last year
- Simple Golang JWT Bruteforcer 2☆10May 25, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆44Jul 9, 2022Updated 3 years ago
- Core elements of the Modern Honey Network implemented in Docker☆35Mar 28, 2022Updated 3 years ago
- (This is a fork used primarily to submit patches into upstream repository) RpcView is a free tool to explore and decompile Microsoft RPC …☆19May 27, 2023Updated 2 years ago
- Mental state inference from observable behavior☆15Dec 3, 2021Updated 4 years ago
- ☆12Jan 30, 2019Updated 7 years ago
- Scrapes Google's stock API☆17Sep 30, 2018Updated 7 years ago
- Adaptix C2 agent using Crystal Palace PIC linker and PICO module system☆67Mar 7, 2026Updated 2 weeks ago
- Limier est un petit outil en CLI permettant de trouver un flux RSS quand il est planqué sur un site.☆19Aug 6, 2023Updated 2 years ago
- Supercharged USB bootloader for various PIC24/dsPIC33 MCUs.☆12Jul 8, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Simple webinterface combining different recon tools.☆12Mar 2, 2018Updated 8 years ago
- Cracking V8 Math.random() from arbitrary bit leaks☆35Mar 16, 2026Updated last week
- Trevisor - A single guest hypervisor with full disk encryption☆18Sep 19, 2016Updated 9 years ago
- Mind Control: Why and how transhumanism is forced upon you?☆20Nov 30, 2022Updated 3 years ago
- NTrace -- a function boundary tracing tool for Windows user and kernel mode☆22Nov 1, 2013Updated 12 years ago
- Quantitative algorithms, data sources and contexts for Intuition☆20Mar 5, 2018Updated 8 years ago
- A C++ syscall ID extractor for Windows. Developed, debugged and tested on 20H2.☆21May 25, 2021Updated 4 years ago