Stars
An audio deepfake is when a “cloned” voice that is potentially indistinguishable from the real person’s is used to produce synthetic audio.
Clone a voice in 5 seconds to generate arbitrary speech in real-time
A GUI application for managing Solo v2 security keys
OSINT tool to find breached emails, databases, pastes, and relevant information
Poll all vehicles currently in inventory at each of the Pull-A-Part locations, full vehicle details including location and row for single or multiple yards with actual vehicle listings (including V…
The smart contract security training ground for developers, security researchers and educators.
A do-it-yourself thermal imager, compatible with the FLIR Lepton 2.5, 3.1R and 3.5 sensor with Arduino firmware
A suite of WiFi/Bluetooth offensive and defensive tools for the ESP32
Convert Audible's .aax filetype to MP3, FLAC, M4A, or OPUS
Retrieves your activation data (activation_bytes) from Audible servers. Using https://github.com/inAudible-NG/tables project instead is recommended.
source code for the SeteroLepton/ThermalReality board
P4wnP1 A.L.O.A. by MaMe82 is a framework which turns a Rapsberry Pi Zero W into a flexible, low-cost platform for pentesting, red teaming and physical engagements ... or into "A Little Offensive Ap…
Uno Shield for grblDD: closed loop spindle VFD + 4 stepper drivers
Defdist / grbl1v1g_GG3_GrBLDC3v0
Forked from gnea/grblAn open source, embedded, high performance g-code-parser and CNC milling controller written in optimized C that will run on a straight Arduino
A list of resources for those interested in getting started in bug bounties
Deep Learning model to analyze a large corpus of clear text passwords.
Notes for Beginner Network Pentesting Course
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
🏎 An online formulae browser for Homebrew
Striker is an offensive information and vulnerability scanner.
An automation framework for running multiple open sourced subdomain bruteforcing tools (in parallel) using your own wordlists via Docker Compose
Cloudflare DNS Enumeration Tool for Pentesters
Empire is a PowerShell and Python post-exploitation agent.
general framework for creating robots, worms, and backdoors
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…