Skip to content
View fnpial's full-sized avatar

Block or report fnpial

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

2353 results for source starred repositories
Clear filter

A tool for generating unique, compliant credit card numbers for testing and development.

JavaScript 2 Updated Nov 3, 2024

Extract and execute a PE embedded within a PNG file using an LNK file.

Python 199 29 Updated Nov 2, 2024

a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )

C# 2,111 214 Updated Nov 2, 2024

declutters url lists for crawling/pentesting

Python 1,175 143 Updated Nov 2, 2024

FaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loading

Rust 196 19 Updated Sep 26, 2024

Document (PDF) extraction and parse API using state of the art modern OCRs + Ollama supported models. Anonymize documents. Remove PII. Convert any document or picture to structured JSON or Markdown

Python 783 41 Updated Nov 4, 2024

Robofinder retrieves historical #robots.txt files from #Archive.org, allowing you to uncover previously disallowed directories and paths for any domain—essential for deepening your #OSINT and #reco…

Python 44 3 Updated Nov 2, 2024

Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection

HTML 7 1 Updated Nov 1, 2024

Not so awesome Web3 Security Reasearcher roadmap by tpiliposian

144 9 Updated Oct 29, 2024

🕸️ Blazing fast GraphQL endpoints finder using subdomain enumeration, scripts analysis and bruteforce. 🕸️

Python 183 12 Updated May 22, 2023

Command line url shortner which will obfuscate any malicious url to bypass blacklist filter. Ethical Hackers can use it for poc demo

2 Updated Nov 4, 2024

A comprehensive list of custom filters for Logger++ to identify various vulnerabilities in different API styles

210 34 Updated Oct 15, 2024

OSINT tools for Information gathering, Cybersecurity, Reverse searching, bugbounty, trust and safety, red team oprations and more.

JavaScript 485 57 Updated Oct 4, 2024

real time face swap and one-click video deepfake with only a single image

Python 39,513 5,767 Updated Nov 2, 2024

🔩 jwt-hack is tool for hacking / security testing to JWT. Supported for En/decoding JWT, Generate payload for JWT attack and very fast cracking(dict/brutefoce)

Go 761 102 Updated May 21, 2024
Python 7 2 Updated Oct 27, 2024

1337 Wordlists for Bug Bounty Hunting

788 148 Updated Nov 1, 2024

Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API keys and access tokens. Its purpose is to help developers a…

Shell 24 Updated Oct 30, 2024

Collection of Notes and CheatSheets used for Red teaming Certs

183 46 Updated Feb 13, 2023

The Ultimate Information Gathering Toolkit

Python 1,130 124 Updated Oct 8, 2024

Rust Weaponization for Red Team Engagements.

Rust 2,710 302 Updated Apr 25, 2024

This repository contains Bug Bounty writeups

31 2 Updated Nov 5, 2024

RF-modulated high fidelity laser microphone and keystroke sniffer

Python 61 3 Updated Oct 17, 2024

🐶 A curated list of Web Security materials and resources.

11,421 1,677 Updated Feb 22, 2024

A collection of slides and presentations from BSides Ahmedabad 2024, held on October 12th and 13th. This repository features key insights and topics in cybersecurity, showcasing sessions and worksh…

33 7 Updated Oct 17, 2024

best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect

Python 470 121 Updated Nov 3, 2024

TerminatorZ is a highly sophisticated and efficient web security tool that scans for top potential vulnerabilities with known CVEs in your web applications.

Shell 253 34 Updated Sep 6, 2024

awesome list of browser exploitation tutorials

2,044 288 Updated Sep 18, 2023
Go 4 1 Updated Oct 10, 2024
Next