Skip to content
View phosphore's full-sized avatar
🎯
Focusing
🎯
Focusing

Organizations

@RevampMovies @PequalsNP-team @nsaway @wavemm

Block or report phosphore

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Peirates - Kubernetes Penetration Testing tool

Go 1,361 123 Updated Aug 8, 2025

A Conversational Speech Generation Model

Python 14,183 1,410 Updated May 27, 2025

Differential testing framework for HTTP implementations

Python 892 80 Updated Oct 12, 2025

A Magisk/KernelSU module that automatically adds user certificates to the system root CA store

Shell 2,157 235 Updated Jun 24, 2025

BusKill's main CLI/GUI app for arming/disarming/configuring the BusKill laptop kill cord

Python 236 28 Updated Apr 21, 2025

Slack Guardian is a proactive security suite that utilizes Python, Regex and Slack API to safeguard sensitive data posted on Slack Channels, ensuring seamless collaboration within Slack.

Python 4 2 Updated Nov 9, 2023

Scans Slack for API tokens, credentials, passwords, and more using YARA rules

Python 40 5 Updated Feb 26, 2021

A deliberately-vulnerable website and exercises for teaching about the OWASP Top 10

HTML 187 350 Updated Jul 18, 2024

Updated version of the ProtoBurp Extension, with enhanced features and capabilities to encode and fuzz custom protobuf messages

Python 36 2 Updated Sep 11, 2023

Tool for building Kubernetes attack paths

Go 916 58 Updated Oct 3, 2025

Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.

C 1,637 182 Updated Oct 19, 2023

Reverse engineered TETRA cryptographic primitives

C 198 38 Updated Mar 23, 2024

A code-searching tool similar to ack, but faster.

C 27,026 1,435 Updated Jun 16, 2024

A light-weight first-stage C2 implant written in Nim (and Rust).

Rust 915 114 Updated Mar 28, 2025

The ImageMagick Security Policy Evaluator allows developers and security experts to check if an XML Security Policy is hardened against a wide set of malicious attacks. It assists with the process …

JavaScript 17 1 Updated Feb 6, 2023

Paranoid's library contains implementations of checks for well known weaknesses on cryptographic artifacts.

Python 797 48 Updated Jun 17, 2025

Frida scripts

JavaScript 46 10 Updated Aug 9, 2019

An http(s).Agent implementation that block request Private/Reserved IP addresses. Prevent SSRF.

TypeScript 23 8 Updated Sep 6, 2025

🐳 Tiny Docker image (🤏 10MB) as 🧅 Tor SOCKS5 proxy 🛡

Dockerfile 602 130 Updated May 30, 2025

GATEKEEPER: Inline and on-target defense

C 120 11 Updated Sep 1, 2022

A sample of proof of concept scripts that run Calc.exe with full source code.

C++ 96 42 Updated Sep 4, 2024

Browser In The Browser (BITB) Templates

JavaScript 2,851 482 Updated Jan 26, 2024

Dependency Confusion Security Testing Tool

Python 51 4 Updated Jul 21, 2022

A tool that can help detect and takeover subdomains with dead DNS records

Go 768 136 Updated Jan 3, 2021

The Dirty Secrets They Didn't Teach You In Pentesting Class

Ruby 13 1 Updated Oct 5, 2011

Enumerate the permissions associated with AWS credential set

Python 1,191 184 Updated Feb 5, 2024

TCP/UDP Non-HTTP Proxy Extension (NoPE) for Burp Suite.

Java 1,637 240 Updated May 25, 2024

A Mighty CLI for AWS

Go 4,978 260 Updated Aug 2, 2022

XXE Out of Band Server.

Ruby 172 34 Updated Aug 9, 2023

Meterpreter Reverse shell over TOR network using hidden services

Python 88 14 Updated Sep 23, 2021
Next