-
Code White GmbH
- Germany
- https://hesec.de
Block or Report
Block or report patrickhener
Contact GitHub support about this user’s behavior. Learn more about reporting abuse.
Report abuseLists (1)
Sort Name ascending (A-Z)
Stars
Language
Sort by: Recently starred
🦄 Record your terminal and generate animated gif images or share a web player
A tool offering templates for streamlined bug bounty reporting
rofi based frontend for KeePassXC running on Qubes OS
smartVISU is a framework to create a visualisation for a knx-installation with simple html-pages. To read and write group-telegramms special tags are used.
⚡ Transfer files over wifi from your computer to your mobile device by scanning a QR code without leaving the terminal.
ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound, and also supports full-object dumping to NDJSON.
Community Workflow for the Osmedeus Engine that describes basic reconnaissance methodology for you to build your own
Build your own reconnaissance system with Osmedeus Next Generation
The Swiss Army knife for automated Web Application Testing
A SimpleHTTPServer written in Go, enhanced with features and with a nice design - https://goshs.de
Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.
Nim-based assembly packer and shellcode loader for opsec & profit
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
A Reverse Shell which uses an XML file on an SMB share as a communication channel.
Turn your python code into a hideous mess. Ever heard of Black? This is the opposite.
These are my personal writeups and scripts for various CTFs
A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.
📙 Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report
A (hopefully) actively maintained activity-based-autosorted list of InfoSec Streamers