- Malaysia
-
21:23
(UTC +08:00) - fhpetroleum.com
Block or Report
Block or report fyezool
Contact GitHub support about this user’s behavior. Learn more about reporting abuse.
Report abuseStars
Language: Shell
Sort by: Most stars
Run macOS VM in a Docker! Run near native OSX-KVM in Docker! X11 Forwarding! CI/CD for OS X Security Research! Docker mac Containers.
A pure Unix shell script implementing ACME client protocol
A docker-powered PaaS that helps you build and manage the lifecycle of applications
🖼️ A command-line system information tool written in bash 3.2+
OSS-Fuzz - continuous fuzzing for open source software.
The Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in production.
Some setup scripts for security research tools.
A collection of android security related resources
Scripted Local Linux Enumeration & Privilege Escalation Checks
Mac setup and configuration via Ansible.
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
High-speed download of LLaMA, Facebook's 65B parameter GPT model
The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, ffuf, masscan, nuclei, meg and many more!
Unlock an Android phone (or device) by bruteforcing the lockscreen PIN. Turn your Kali Nethunter phone into a bruteforce PIN cracker for Android devices! (no root, no adb)
A repository with 3 tools for pwn'ing websites with .git repositories available
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, detections…
Docker media and home server stack with Docker Compose, Traefik, Swarm Mode, Google OAuth2/Authelia, and LetsEncrypt
📦 Build code for NextcloudPi: Raspberry Pi, Odroid, Rock64, curl installer...
YouTube script to add the new Ads list for Pi-hole
HiddenVM — Use any desktop OS without leaving a trace.
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileg…