Skip to content
View perfectlylogical's full-sized avatar

Block or report perfectlylogical

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

HID attack payload generator for Arduinos

Python 159 47 Updated Jul 8, 2024

Six Degrees of Domain Admin

PowerShell 9,780 1,721 Updated Jun 28, 2024

A post-exploitation OS X/Linux agent written in Python 2.7

Python 868 203 Updated Aug 24, 2017

A collection of code snippets used in blog posts.

Python 54 20 Updated Oct 30, 2019

Incident Response Methodologies

1,021 217 Updated Aug 2, 2018

A curated list of tools for incident response

7,559 1,520 Updated Jul 18, 2024

A collected list of awesome security talks

3,999 483 Updated Apr 9, 2021

Next-gen BurpSuite penetration testing tool

JavaScript 454 102 Updated Jan 27, 2016

Wiki-like CTF write-ups repository, maintained by the community. 2015

CSS 1,979 721 Updated Aug 27, 2022

Wiki-like CTF write-ups repository, maintained by the community. 2014

Python 1,831 645 Updated Apr 27, 2016

CTFs as you need them

Python 5,583 2,067 Updated Oct 2, 2024

A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network

Ruby 568 137 Updated Dec 9, 2017

Metasploit Framework

Ruby 33,870 13,918 Updated Oct 2, 2024

PowerSploit - A PowerShell Post-Exploitation Framework

PowerShell 11,817 4,595 Updated Aug 17, 2020

PowerShell Module with Security cmdlets for security work

PowerShell 435 86 Updated Feb 27, 2020