Lists (2)
Sort Name ascending (A-Z)
Stars
Black-Hat SEO R&D Engine - Traffic simulation and infrastructure diagnostics framework for owned domains. Research toolkit for analyzing cloaking detection, proxy behavior, UA patterns, and redirec…
Google Penguin is a codename[1] for a Google algorithm update that was first announced on April 24, 2012. The update is aimed at decreasing search engine rankings of websites that violate Google's …
Security research analyzing black hat SEO techniques and cloaking detection for defensive purposes
written to increase website visits and in case of excessive use of it, the website will be blacklisted by Google.
CVE-2025-3464: LPE exploit for ASUS AsIO3.sys
List of Hacker/Infosec/CyberSec Discord servers
Hisilicon SDK for SoC Hi3798Mv100 / Hi3798Cv200 / Hi3798Mv200 / Hi3798Mv300.
A little tool to play with Windows security
Raptor turns Claude Code into a general-purpose AI offensive/defensive security agent. By using Claude.md and creating rules, sub-agents, and skills, and orchestrating security tool usage, we confi…
Yet another barcode scanner for Android
Platform independent Near Field Communication (NFC) library
IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly found vulnerabilities in IoT devices.
This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used in Obsidian
HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux
A Hardware Hacking Tool with Web-Based CLI That Speaks Every Protocol
This is the report that goes with my mock full-scope red team engagement against Game of Active Directory.
This script checks for the presence of the **CVE-2025-20281** vulnerability in Cisco Identity Services Engine (ISE) and ISE-PIC, which allows **unauthenticated remote code execution (RCE)** as root…