Skip to content
View HockeyInJune's full-sized avatar

Block or report HockeyInJune

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
20 stars written in Shell
Clear filter

Prevents you from committing secrets and credentials into git repositories

Shell 12,576 1,187 Updated Apr 15, 2024

Quickly create and run optimised Windows, macOS and Linux virtual machines

Shell 11,294 495 Updated Jan 20, 2025

List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.

Shell 9,053 1,533 Updated Oct 28, 2024

Various tips & tricks

Shell 3,224 417 Updated Jan 19, 2025

EMBA - The firmware security analyzer

Shell 2,844 244 Updated Jan 26, 2025

Platform for emulation and dynamic analysis of Linux-based firmware

Shell 1,860 349 Updated Jul 21, 2024

ASN / RPKI validity / BGP stats / IPv4v6 / Prefix / URL / ASPath / Organization / IP reputation / IP geolocation / IP fingerprinting / Network recon / lookup API server / Web traceroute server

Shell 1,431 167 Updated Jan 12, 2025

An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for vulnerabilities.

Shell 1,119 177 Updated Jul 18, 2024

Script for searching the extracted firmware file system for goodies!

Shell 1,091 186 Updated Aug 29, 2023

Kernel Hardening; Protect Linux User Accounts against Brute Force Attacks; Improve Entropy Collection; Strong Linux User Account Separation; Enhances Misc Security Settings - https://www.kicksecure…

Shell 526 50 Updated Jan 23, 2025

Customizable Linux Persistence Tool for Security Research and Detection Engineering.

Shell 507 53 Updated Jan 3, 2025

An automated approach to performing recon for bug bounty hunting and penetration testing.

Shell 442 103 Updated Jul 21, 2020

Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer Overflow

Shell 435 121 Updated Jul 11, 2017

Hacking tool inside a Raspberry Pi zero

Shell 318 58 Updated Apr 21, 2017

Fix stack addresses (when no ASLR) with and without debugging

Shell 179 31 Updated Jan 23, 2015

Manage, monitor and improve your cyber security posture.

Shell 87 16 Updated May 2, 2023

Loot email addresses from commit entries

Shell 56 12 Updated Aug 24, 2022

Ansible playbook to install cuckoo sandbox.

Shell 11 3 Updated Mar 8, 2019

A proof of concept to exploit the Windows Device Association Framework Denial of Service Flaw

Shell 8 Updated Apr 20, 2024

ZSH completion scripts for vivisect

Shell 1 Updated Feb 4, 2014