Skip to content
View 3cr3sc3nt's full-sized avatar

Block or report 3cr3sc3nt

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

The recursive internet scanner for hackers. 🧡

Python 8,052 623 Updated Mar 3, 2025

😱 A curated list of amazingly awesome OSINT

20,355 2,953 Updated Jan 26, 2025

A collection of notebooks/recipes showcasing some fun and effective ways of using Claude.

Jupyter Notebook 10,749 1,228 Updated Feb 26, 2025

This project steals important data from all chromium and gecko browsers installed in the system and gather the data in a stealer db to be exfiltrated out. A powerful Browser Stealer

C 208 36 Updated Feb 7, 2025

A modular vulnerability scanner with automatic report generation capabilities.

Python 629 59 Updated Mar 3, 2025

Your Everyday Threat Intelligence

Python 1,817 296 Updated Mar 3, 2025

An open-source RAG-based tool for chatting with your documents.

Python 21,432 1,685 Updated Feb 14, 2025

🔥 Turn entire websites into LLM-ready markdown or structured data. Scrape, crawl and extract with a single API.

TypeScript 27,771 2,304 Updated Mar 3, 2025

📨 The ultimate social media scheduling tool, with a bunch of AI 🤖

TypeScript 18,284 2,919 Updated Feb 27, 2025

Hunt down social media accounts by username across social networks

Python 62,775 7,237 Updated Feb 17, 2025

Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>

47 1 Updated Feb 17, 2025

Zero-dollar attack surface management tool

Go 273 39 Updated Apr 16, 2024

An integrated BurpSuite vulnerability detection plug-in.

1,202 66 Updated Sep 12, 2024

A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat intelligence.

241 15 Updated Feb 28, 2025

The hacker's browser.

JavaScript 24,144 2,490 Updated Feb 25, 2025

GitHub Sensitive Information Leakage(GitHub敏感信息泄露监控)

Python 2,135 487 Updated Nov 28, 2023

Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more

Go 24,865 2,455 Updated Mar 3, 2025

MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.

Python 10,757 1,029 Updated Feb 21, 2025

A fast vulnerability scanner helps pentesters pinpoint possibly vulnerable targets from a large number of web servers

Python 2,237 581 Updated Dec 31, 2024

A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense

84 17 Updated Dec 13, 2023

Further investigation in to APT campaigns disclosed by private security firms and security agencies

85 19 Updated Jun 4, 2022

An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.

193 19 Updated Jul 3, 2024

Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/or bug bounty targets!

Go 651 49 Updated Feb 25, 2025

terminal theme for me

HTML 4 3 Updated Jan 28, 2025

A Jekyll theme for Terminal lovers

CSS 13 5 Updated Mar 19, 2017

A minimal Automad blog theme for terminal lovers

PHP 42 2 Updated May 24, 2021

The IoT security toolkit to help identify IoT related dashboards and scan them for default passwords and vulnerabilities.

Go 174 24 Updated Nov 26, 2024

Misconfiguration Manager is a central knowledge base for all known Microsoft Configuration Manager tradecraft and associated defensive and hardening guidance.

PowerShell 880 89 Updated Feb 11, 2025
Next