Skip to content
View blshkv's full-sized avatar

Block or report blshkv

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

👻Stowaway -- Multi-hop Proxy Tool for pentesters

Go 3,179 435 Updated Apr 5, 2025

Flutter Mobile Application Reverse Engineering Tool

C++ 1,786 253 Updated Aug 11, 2025

BleachBit system cleaner for Windows and Linux

Python 3,739 300 Updated Sep 14, 2025

Secrets scanner that understands code

Python 150 12 Updated Feb 24, 2025

Generative fill in 3D.

TypeScript 745 41 Updated Dec 17, 2024

Programs to process GoPro MP4 & Generic GPX/FIT files and create video dashboards & maps

Python 485 69 Updated Aug 10, 2025

Multi-user anti-filtering panel, with an effortless installation and supporting more than 20 protocols to circumvent filtering plus the telegram proxy.

Python 7,599 881 Updated Sep 15, 2025

Instant neural graphics primitives: lightning fast NeRF and more

Cuda 16,927 2,008 Updated Aug 26, 2025

ETNA – Time-Series Library

Python 881 83 Updated Aug 9, 2023

Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices

Go 11,739 1,202 Updated Sep 15, 2025

Flutter Reverse Engineering Framework

Python 1,405 187 Updated Apr 11, 2022

Oversecured Vulnerable iOS App

Swift 227 51 Updated Jan 10, 2024

Dynamic unpacker based on PE-sieve

C 757 75 Updated Sep 13, 2025

Helper plugin for analyzing UEFI firmware

C 90 12 Updated Jun 3, 2024

An implementation of TEMPEST en GNU Radio

C++ 614 72 Updated Feb 10, 2025

Bucky (An automatic S3 bucket discovery tool)

PHP 197 28 Updated Jan 6, 2022

Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)

Python 89 22 Updated Nov 18, 2022

Runtime Security Enforcement System. Workload hardening/sandboxing and implementing least-permissive policies made easy leveraging LSMs (LSM-BPF, AppArmor).

Go 1,975 404 Updated Sep 15, 2025

HomePlugAV tools to test PLC (in)security

Python 45 13 Updated Dec 19, 2024

Remove duplicates from MASSIVE wordlist, without sorting it (for dictionary-based password cracking)

C++ 949 96 Updated May 16, 2025

AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Cobalt Strike Malleable C2 profile.

C# 228 50 Updated Feb 15, 2021

d(ockerp)wn - a docker pwn tool manager

Python 156 22 Updated Jun 8, 2021

🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡

Python 1,379 94 Updated Mar 5, 2025

Find cloud assets that no one wants exposed 🔎 ☁️

Go 348 35 Updated Jul 20, 2020

A Burp Suite extension implementing the Signing HTTP Messages draft-ietf-httpbis-message-signatures-01 draft.

Java 41 10 Updated Aug 16, 2022

Plugin to embed Ghidra Decompiler into Binary Ninja

Python 97 7 Updated Jun 8, 2022

Unlock an Android phone (or device) by bruteforcing the lockscreen PIN. Turn your Kali Nethunter phone into a bruteforce PIN cracker for Android devices! (no root, no adb)

Shell 4,412 800 Updated Oct 10, 2023

BGP Hijack Detection

Python 115 37 Updated Feb 14, 2018

Another kernel self protection

62 50 Updated May 12, 2020

Avatars for Zoom, Skype and other video-conferencing apps.

Python 16,514 4,303 Updated Aug 30, 2024
Next