Skip to content
View Mayth3m's full-sized avatar
🦾
أمي كم أهواها، أشتاق لمرآها وأحن لألقاها، وأقبّل يمناها.
🦾
أمي كم أهواها، أشتاق لمرآها وأحن لألقاها، وأقبّل يمناها.
  • SystemsLTD
  • UAE, cpx.net
  • Joined Jun 17, 2024
Block or Report

Block or report Mayth3m

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

SeImpersonate privilege escalation tool for Windows 8 - 11 and Windows Server 2012 - 2022 with extensive PowerShell and .NET reflection support.

C# 2 Updated May 16, 2024

JWT brute force cracker written in C

C 2,336 251 Updated Jun 2, 2023

VenomRAT-HVNC 5.6, this is the latest version with a working HVNC module !

C# 91 18 Updated Dec 10, 2022

آموزش رایگان و دائمی فعال‌سازی آنتن در آیفون ۱۴ و ۱۵ بدون ردگیری و بسته شدن با دو روش مختلف، به همراه سورس کد و فایل ساخت UUID یکتا

Python 458 155 Updated Jul 1, 2024

Mouse Jiggler is a very simple piece of software whose sole function is to "fake" mouse input to Windows, and jiggle the mouse pointer back and forth.

Python 3 Updated Jun 16, 2024

Help automate the process of the selecting program. Identify email addresses or domain names

Kotlin 9 Updated Mar 12, 2024

Prevent users from accessing connected online services

C 3 Updated Jun 10, 2024

欢迎阅读我的简历,期待能有机会和您共事。

18 23 Updated May 31, 2023

A curated list of awesome Hacking tutorials, tools and resources

12,410 1,518 Updated Jun 2, 2024

ALL IN ONE Hacking Tool For Hackers

Python 43,431 4,782 Updated Jun 25, 2024

Collection of malware source code for a variety of platforms in an array of different programming languages.

Assembly 15,357 1,705 Updated May 9, 2024

Research code & papers from members of vx-underground.

C 1,065 218 Updated Dec 7, 2021

For educational purposes only, samples of old & new malware builders including screenshots!

371 98 Updated Jun 17, 2024

proxychains ng (new generation) - a preloader which hooks calls to sockets in dynamically linked programs and redirects it through one or more socks/http proxies. continuation of the unmaintained p…

C 9,564 1,068 Updated Jun 20, 2024

Kerberos attack, obtain a password hash. MassachusettsKerberos focuses on the acquisition of TGS, specifically those related to services operating under user accounts in Active Directory, excluding…

Python 15 Updated Apr 29, 2024

Given the increasing acceptance of online informations. This malware is often used to form botnets or enabling initial access for the Conti ransomware or Ryuk banking trojan. 7R0J4N is developed an…

C 14 1 Updated May 4, 2024

Performing a ( hard-core ) force attack to get the correct credentials in under one minute

C 18 1 Updated Jun 29, 2024

WannaCry ransomware 𓆰𓆪

C 21 4 Updated May 15, 2024

data and exploit collector for SharpHound to BloodHound. harpoonhound will help to automatically determine what domain your current user belongs to, find a domain controller for that domain, and st…

C# 23 Updated May 17, 2024

Seven Degrees of Domain Admin, used by advanced and professional red teamer to catch ( Big fish ), enumerate, attacks, or poisoning target inside an Active Directory ( All OS/2 ) activity and netwo…

C 21 3 Updated Jul 2, 2024

Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code with KICS by Checkmarx.

Open Policy Agent 1 Updated Aug 16, 2021

USB MitM Wifi keylogger with keyboard and mouse injection capabilities

C++ 1 1 Updated Dec 5, 2019

Security Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.

725 116 Updated Apr 12, 2022

The OWASP Vulnerable Web Applications Directory project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available.

1 Updated Apr 12, 2024

Organize your API security assessment by using MindAPI. It's free and open for community collaboration.

792 157 Updated Jun 26, 2024

Simple OWASP-ZAP API that makes spider and scanner in your web application.

Python 10 3 Updated Feb 27, 2024

A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.

1,359 201 Updated Jun 24, 2024

A collection of essential and foundational cybersecurity knowledge, thoughtfully organized for easy comprehension.

Python 804 65 Updated Apr 12, 2024

This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks, …

5,429 575 Updated Nov 4, 2023
Next