Skip to content
View leaficier's full-sized avatar

Block or report leaficier

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

Showing results

BlackLotus UEFI Windows Bootkit

C 2,006 472 Updated Mar 28, 2024

Apollo for Reddit tweak with in-app configurable API keys

Objective-C 713 13 Updated Jul 26, 2024

Playground (and dump) of stuff I make or modify for the Flipper Zero

C 14,374 3,332 Updated Jan 3, 2025

A next-generation crawling and spidering framework.

Go 12,820 666 Updated Dec 30, 2024

AI-Powered Penetration Testing Assistant

TypeScript 902 52 Updated Jan 4, 2025

Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence.

Java 8,304 896 Updated Dec 31, 2024

OSS-Fuzz - continuous fuzzing for open source software.

Shell 10,707 2,273 Updated Jan 4, 2025

Material Design icons by Google (Material Symbols)

50,930 9,593 Updated Dec 6, 2024

A tool for writing better scripts

JavaScript 43,370 1,113 Updated Jan 5, 2025

A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE ATT&CK® framework.

HTML 1,151 125 Updated Dec 24, 2024

Public scripts and examples for managing JumpCloud managed systems and service endpoints

PowerShell 269 153 Updated Jan 3, 2025

This repository provides sample templates for security playbooks against various scenarios when using Amazon Web Services.

555 106 Updated Jan 4, 2025

Dependency-Track is an intelligent Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain.

Java 2,766 583 Updated Jan 5, 2025

Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more

Go 24,214 2,386 Updated Jan 3, 2025

macOS Security Compliance Project

YAML 1,851 209 Updated Dec 16, 2024

CloudMapper helps you analyze your Amazon Web Services (AWS) environments.

JavaScript 6,031 815 Updated Jul 15, 2024

🐳 Docker Image of NetBox

Python 1,930 894 Updated Dec 19, 2024

Operational information regarding the log4shell vulnerabilities in the Log4j logging library.

Python 1,899 603 Updated Jun 15, 2022

Automated Adversary Emulation Platform

Python 5,767 1,098 Updated Dec 23, 2024

A utility to safely generate malicious network traffic patterns and evaluate controls.

Go 1,275 136 Updated Apr 4, 2024

Infection Monkey - An open-source adversary emulation platform

Python 6,706 793 Updated Dec 16, 2024

Kippo - SSH Honeypot

Python 1,636 278 Updated Nov 19, 2023

The new Windows Terminal and the original Windows console host, all in the same place!

C++ 96,369 8,400 Updated Jan 2, 2025

GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems

HTML 11,068 1,346 Updated Oct 28, 2024

A tool for parsing breached passwords

Shell 1,889 540 Updated Mar 21, 2024

BIGREST - Python SDK for F5 iControl REST API

Python 26 9 Updated Mar 4, 2024

Python SDK for configuration and monitoring of F5® BIG-IP® devices via the iControl® REST API.

Python 261 134 Updated Oct 9, 2023
Next