Skip to content
View Mayth3m's full-sized avatar
🦾
أمي كم أهواها، أشتاق لمرآها وأحن لألقاها، وأقبّل يمناها.
🦾
أمي كم أهواها، أشتاق لمرآها وأحن لألقاها، وأقبّل يمناها.
  • SystemsLTD
  • UAE, cpx.net
  • Joined Jun 17, 2024
Block or Report

Block or report Mayth3m

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
25 results for source starred repositories
Clear filter

JWT brute force cracker written in C

C 2,338 251 Updated Jun 2, 2023

VenomRAT-HVNC 5.6, this is the latest version with a working HVNC module !

C# 91 19 Updated Dec 10, 2022

آموزش رایگان و دائمی فعال‌سازی آنتن در آیفون ۱۴ و ۱۵ بدون ردگیری و بسته شدن با دو روش مختلف، به همراه سورس کد و فایل ساخت UUID یکتا

Python 463 155 Updated Jul 1, 2024

Mouse Jiggler is a very simple piece of software whose sole function is to "fake" mouse input to Windows, and jiggle the mouse pointer back and forth.

Python 3 Updated Jun 16, 2024

Prevent users from accessing connected online services

C 3 Updated Jun 10, 2024

欢迎阅读我的简历,期待能有机会和您共事。

18 23 Updated May 31, 2023

A curated list of awesome Hacking tutorials, tools and resources

12,426 1,519 Updated Jun 2, 2024

ALL IN ONE Hacking Tool For Hackers

Python 43,460 4,783 Updated Jun 25, 2024

Collection of malware source code for a variety of platforms in an array of different programming languages.

Assembly 15,369 1,706 Updated May 9, 2024

Research code & papers from members of vx-underground.

C 1,068 218 Updated Dec 7, 2021

For educational purposes only, samples of old & new malware builders including screenshots!

377 100 Updated Jun 17, 2024

proxychains ng (new generation) - a preloader which hooks calls to sockets in dynamically linked programs and redirects it through one or more socks/http proxies. continuation of the unmaintained p…

C 9,570 1,069 Updated Jul 3, 2024

Given the increasing acceptance of online informations : This malware is often used to form botnets or enabling initial access for the Conti ransomware or Ryuk banking trojan. 7R0J4N is developed a…

C 14 1 Updated May 4, 2024

Performing a ( hard-core ) force attack to get the correct credentials in under one minute

C 19 1 Updated Jun 29, 2024

WannaCry ransomware 𓆰𓆪

C 21 4 Updated May 15, 2024

Seven Degrees of Domain Admin, used by advanced and professional red teamer to catch ( Big fish ), enumerate, attacks, or poisoning target inside an LDAP Directory ( All OS/2 ) and networks :: a de…

C 21 3 Updated Jul 3, 2024

Security Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.

725 116 Updated Apr 12, 2022

Organize your API security assessment by using MindAPI. It's free and open for community collaboration.

793 157 Updated Jun 26, 2024

Simple OWASP-ZAP API that makes spider and scanner in your web application.

Python 10 3 Updated Feb 27, 2024

A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.

1,360 201 Updated Jun 24, 2024

A collection of essential and foundational cybersecurity knowledge, thoughtfully organized for easy comprehension.

Python 806 65 Updated Apr 12, 2024

This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks, …

5,435 574 Updated Nov 4, 2023

CyberSecurityRSS: A collection of cybersecurity rss to make you better!

1,707 240 Updated May 27, 2024

:octocat: Machine Learning for Cyber Security

6,979 1,732 Updated Jun 27, 2024