Block or Report
Block or report threeskimo
Contact GitHub support about this user’s behavior. Learn more about reporting abuse.
Report abuseStars
Language
Sort by: Recently starred
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
A list of public penetration test reports published by several consulting firms and academic security groups.
Monitor linux processes without root permissions
</> htmx - high power tools for HTML
Loading Remote AES Encrypted PE in memory , Decrypted it and run it
proxychains - a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy. Supported auth-types: "user/pass" fo…
Statically-linked ssh server with reverse shell functionality for CTFs and such
Linux privilege escalation auditing tool
netshell features all in version 2 powershell
UI Library for Design Engineers. Animated components and effects you can copy and paste into your apps. Free. Open Source.
🍵 Drop-in semantic styling library in pure CSS. Highly customizable and perfect for simple websites and prototyping web apps!
Hashtopolis - distributed password cracking with Hashcat
Chris Titus Tech's Windows Utility - Install Programs, Tweaks, Fixes, and Updates
Website Cloner - Utilizes powerful Go routines to clone websites to your computer within seconds.
Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS
Impacket is a collection of Python classes for working with network protocols.
An open-source alternative to Ngrok, designed to serve production traffic and be simple to host (particularly on Kubernetes)
PowerSploit - A PowerShell Post-Exploitation Framework
Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities
Veil 3.1.X (Check version info in Veil at runtime)