Skip to content
View drk1wi's full-sized avatar

Block or report drk1wi

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

AppSec Ezine Public Repository.

1,217 107 Updated Nov 14, 2025

Tips and Tutorials for Bug Bounty and also Penetration Tests.

1,918 430 Updated Oct 7, 2025

A list of Free Software network services and web applications which can be hosted on your own servers

290,885 13,422 Updated May 7, 2026

Qubes containerization on Windows

Python 129 10 Updated Apr 21, 2021

Guidance for mitigation web shells. #nsacyber

YARA 979 203 Updated Jun 18, 2023

Impacket is a collection of Python classes for working with network protocols.

Python 15,696 3,907 Updated May 6, 2026

A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.

Assembly 13,557 1,283 Updated May 7, 2026

Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android

C++ 1,343 148 Updated Mar 2, 2026

List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.

Shell 9,449 1,576 Updated Apr 17, 2026

Binary Ninja Syscall Annotator

Python 47 14 Updated May 18, 2022

Digital forensic acquisition tool for Windows based incident response.

Python 348 51 Updated May 7, 2024

Detect Frida for Android

C 796 153 Updated Jun 12, 2021

Command line utility for inserting a dylib load command into a Mach-O binary

C 2,063 373 Updated Mar 29, 2025

A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.

219,232 13,154 Updated Nov 19, 2024

Attack and defend active directory using modern post exploitation adversary tradecraft activity

4,824 1,085 Updated Jul 29, 2025

A library that enables dynamically rebinding symbols in Mach-O binaries running on iOS.

C 5,404 989 Updated Aug 1, 2024

An on-path blackbox network traffic security testing tool

Python 2,943 412 Updated Oct 3, 2022

A post-exploitation powershell tool for extracting juicy info from memory.

PowerShell 1,864 332 Updated Jun 28, 2024

Whitebox AES implementation in C++. Chow, Karroumi.

C++ 379 115 Updated Feb 23, 2023

Generate sandboxes for C/C++ libraries automatically

C++ 1,745 195 Updated May 7, 2026

Multi Tool Subdomain Enumeration

Python 723 154 Updated Apr 11, 2021

The history of Windows Internals via symbols.

C 181 32 Updated Nov 4, 2021

signed-loaders documents Windows executables that can be used for side-loading DLLs.

PureBasic 70 31 Updated Jan 7, 2019

Class materials for a distributed systems lecture series

9,704 714 Updated Mar 18, 2025

Awesome XSS stuff

JavaScript 5,106 779 Updated Oct 30, 2024

A collection of LLDB aliases/regexes and Python scripts to aid in your debugging sessions

Python 1,877 207 Updated Jul 23, 2025

My Chrome and Safari exploit code + write-up repo

JavaScript 533 104 Updated Nov 5, 2021

An updated collection of resources targeting browser-exploitation.

834 114 Updated Mar 8, 2021

Convert an APK to an Android Studio Project using multiple open-source decompilers

Java 391 73 Updated Sep 18, 2023
Next