Skip to content
View jamesb5959's full-sized avatar

Highlights

  • Pro

Block or report jamesb5959

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.

Go 411 38 Updated Sep 26, 2025

A Flipper Zero clone, but cheapest, DIY and simply Open Source, made with Arduino IDE

C++ 1,503 62 Updated Jul 14, 2025

Drone pentesting framework console

Python 1,612 267 Updated Nov 23, 2024

repo of my sizecoding entries

Assembly 173 6 Updated Feb 18, 2025

Impacket is a collection of Python classes for working with network protocols.

Python 15,083 3,816 Updated Nov 7, 2025

game of active directory

PowerShell 7,086 983 Updated Jul 16, 2025

Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. [email protected]

PowerShell 7,398 1,335 Updated Oct 16, 2025

This is a multi-use bash script for Linux systems to audit wireless networks.

Shell 7,279 1,260 Updated Nov 9, 2025

Official repository for community contributed blocklets

Python 1,378 497 Updated Aug 4, 2024

Pywal-like color palette generator, but faster and in C

C++ 788 20 Updated Sep 4, 2025

real time face swap and one-click video deepfake with only a single image

Python 75,610 10,991 Updated Nov 10, 2025

A Lightweight Face Recognition and Facial Attribute Analysis (Age, Gender, Emotion and Race) Library for Python

Python 20,997 2,855 Updated Oct 21, 2025

Code for Command-Line Rust (O'Reilly, 2024, ISBN 9781098109417)

Rust 1,871 298 Updated Aug 6, 2024

Complete Hands-On YOLO Object Detection Tutorial

Jupyter Notebook 200 73 Updated Dec 18, 2023

Linux Kernel Hacking

C 745 136 Updated Apr 10, 2024

Chess Encryption 🔑

Python 430 47 Updated Dec 20, 2024

dwm config made with flexipatch

C 38 3 Updated Nov 30, 2021

Powerful framework for rogue access point attack.

Python 2,308 329 Updated Jan 9, 2024

Know the dangers of credential reuse attacks.

Python 2,074 411 Updated Oct 14, 2024

A memory-based evasion technique which makes shellcode invisible from process start to end.

C 1,195 144 Updated Oct 16, 2023

A vulnerability scanner for container images and filesystems

Go 10,989 707 Updated Nov 8, 2025

Malware attacks/techniques explained

C++ 192 38 Updated Jul 6, 2025

This repository contains several applications, demonstrating the Meltdown bug.

C 4,156 523 Updated May 30, 2022

GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers -- USENIX Security'24

C 269 21 Updated Jun 21, 2024

A curated list of useful resources that cover Offensive AI.

HTML 1,295 142 Updated Oct 11, 2025

A PoC backdoor that uses Gmail as a C&C server

Python 1,341 424 Updated Nov 16, 2018