Block or Report
Block or report dkadev
Contact GitHub support about this userβs behavior. Learn more about reporting abuse.
Report abuseLists (13)
Sort Name ascending (A-Z)
Stars
Language
Sort by: Recently starred
Remote Desktop Protocol .NET Console Application for Authenticated Command Execution
Simple, powerful and flexible site generation framework with everything you love from Next.js.
Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation firewalls en route to the target.
E-mails, subdomains and names Harvester - OSINT
Scan for secrets, endpoints, and other sensitive data after decompiling and deobfuscating Android files. (.apk, .xapk, .dex, .jar, .class, .smali, .zip, .aar, .arsc, .aab, .jadx.kts).
Autonomous software engineer right in your IDE, capable of reading/writing files, executing commands, and more with your permission every step of the way.
An AI agent for your development workflow that can search and manipulate the code base, browse the internet and interact with Github issues and pull requests
Abusing impersonation privileges through the "Printer Bug"
A recursive internet scanner for hackers.
Ashok is a OSINT Recon Tool , a.k.a π Swiss Army knife .
Protect against subdomain takeover
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
Identify hardcoded secrets in static structured text (version 2)
π The open-source synthetic monitoring platform π
Subprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains. The tool offers concurrent scanning, allowing users to define β¦
Decrypt offline windows passwords, chrome and firefox
Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework
smbclient-ng, a fast and user friendly way to interact with SMB shares.
Hide data within JPG images using this steganography-like privacy tool. Post images on Mastodon and other hosting sites.
PoC for using MS Windows printers for persistence / command and control via Internet Printing
Evilginx Phishing Engagement Infrastructure Setup Guide
Burp Plugin to Bypass WAFs through the insertion of Junk Data
serve as a reverse proxy to protect your websites from attacks and exploits.
Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI
Swift powered native macOS client for Ollama, ChatGPT and compatible API-backends