Skip to content
View theDARPA's full-sized avatar

Block or report theDARPA

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Beta Lists are currently in beta. Share feedback and report bugs.

Starred repositories

Showing results

real time face swap and one-click video deepfake with only a single image

Python 39,398 5,746 Updated Nov 2, 2024

A spy pixel which can be emedded into web pages or emails.

Python 83 16 Updated Aug 16, 2024

Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.

JavaScript 262 43 Updated Jun 18, 2024

The best WiFi spy avalaible for hire! Made for hackers, for hackers

Python 175 33 Updated Apr 23, 2019

Damn Vulnerable Restaurant is an intentionally vulnerable Web API game for learning and training purposes dedicated to developers, ethical hackers and security engineers.

Python 437 68 Updated Jul 22, 2024

Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.

Python 1,639 205 Updated Jan 4, 2024

change your Ip address automatically This tool based on tor project

Python 854 229 Updated Sep 16, 2024

Use Python to map a website's internal links. And then apply D3 to visualize those connections as a network graph.

HTML 78 7 Updated Sep 21, 2024

NucleiScanner is a Powerful Automation tool for detecting Unknown Vulnerabilities in the Web Applications

Shell 310 39 Updated Jul 4, 2024

🌐 The Internet OS! Free, Open-Source, and Self-Hostable.

JavaScript 25,667 1,687 Updated Nov 1, 2024

Slides and Codes used for the workshop Red Team Infrastructure Automation

HCL 174 38 Updated Apr 14, 2024

This project is aimed at freely providing technical guides on various hacking topics: Active Directory services, web services, servers, intelligence gathering, physical intrusion, phishing, mobile …

3 Updated Apr 17, 2024

Chiasmodon is an OSINT tool designed to assist in the process of gathering information about a target domain. Its primary functionality revolves around searching for domain-related data, including …

Python 465 39 Updated Sep 24, 2024

Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.

Python 860 104 Updated Oct 23, 2024

Microsoft-Outlook-Remote-Code-Execution-Vulnerability

Python 685 152 Updated Feb 19, 2024

An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for vulnerabilities.

Shell 1,054 170 Updated Jul 18, 2024

Cam VIrus shoots from the target's phone front camera or PC webcam just sending a link.

Shell 63 16 Updated Sep 15, 2021

8 Lessons, Kick-start Your Cybersecurity Learning.

HTML 4,330 507 Updated Aug 1, 2024

A collection of real world AI/ML exploits for responsibly disclosed vulnerabilities

Python 1,420 115 Updated Oct 23, 2024

A simple tool for bypassing file upload restrictions.

Python 781 126 Updated Jul 22, 2024

All Our Online/Offline Slides are in this repo

1 1 Updated Mar 29, 2024

Repository of Yara Rules

YARA 88 11 Updated Oct 15, 2024

A natural language interface for computers

Python 54,756 4,784 Updated Oct 31, 2024

Instant voice cloning by MIT and MyShell.

Python 29,590 2,904 Updated Aug 21, 2024

SQL Injection Vulnerability Scanner made with Python

Python 333 69 Updated Jul 27, 2023

Display and control your Android device

C 111,333 10,669 Updated Oct 31, 2024

Extract and decrypt browser data, supporting multiple data types, runnable on various operating systems (macOS, Windows, Linux).

Go 10,955 1,559 Updated Oct 28, 2024

JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the targeted application. Also includes a C2 for executing custom Java…

JavaScript 336 35 Updated Sep 3, 2024

GPS Location Tracer Using Malicious URL

Python 114 17 Updated Mar 17, 2024
Next