Skip to content
View adde88's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report adde88

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

Showing results

Find zero-days while you sleep. DeepZero is an automated vulnerability research framework that parses, decompiles, and analyzes thousands of Windows kernel drivers for exploitable IOCTLs natively u…

Python 341 44 Updated Apr 28, 2026

LLM inference in C/C++

C++ 23 5 Updated Apr 21, 2026

Binary data analysis and visualization tool

C++ 1,232 120 Updated Jun 16, 2019

DuckDNS Updating Script for both Windows and Linux

PowerShell 2 Updated Mar 21, 2026

Breach intelligence CLI combining ProxyNova (3.2B+ credentials) with HIBP (570M+ passwords, 928+ breaches). Password compromise checking, breach metadata, and cred search.

Python 17 3 Updated Dec 4, 2025

A WiFi security auditing software mainly based on aircrack-ng tools suite

Rust 508 45 Updated Nov 18, 2025

List of awesome reverse engineering resources

10,060 1,160 Updated Jul 29, 2023

VoxCPM2: Tokenizer-Free TTS for Multilingual Speech Generation, Creative Voice Design, and True-to-Life Cloning

Python 16,126 1,906 Updated Apr 28, 2026

AI Agent Evaluator & Red Team Platform

Python 1,024 160 Updated Apr 28, 2026

APKHunt is a comprehensive static code analysis tool for Android apps that is based on the OWASP MASVS framework. Although APKHunt is intended primarily for mobile app developers and security teste…

Go 963 102 Updated Jan 17, 2025

ClatScope Info Tool – The best and most versatile OSINT utility for retrieving geolocation, DNS, WHOIS, phone, email, data breach information and much more (70+ features). Perfect for investigators…

Python 1,454 210 Updated Nov 19, 2025

This is the repository of a WoW addon called Titan Panel Currencies [Multi]. 💲

Lua 3 13 Updated Apr 22, 2026

Track the GPS location of the user's smartphone or PC and capture a picture of the target, along with IP and device information.

HTML 1,340 279 Updated Jan 6, 2026

Qwen-Image is a powerful image generation foundation model capable of complex text rendering and precise image editing.

Python 1 Updated Aug 9, 2025

A lightweight RF geolocation obfuscation tool for OpenWrt. Flicker makes your wireless device a moving target for trackers by rapidly and randomly changing its TX power and MAC-layer timing paramet…

3 Updated Aug 17, 2025

Qwen-Image is a powerful image generation foundation model capable of complex text rendering and precise image editing.

Python 7,827 488 Updated Feb 10, 2026

A Norwegian wordlist

Python 24 7 Updated Aug 3, 2022

An evil twin attack is a spoofing cyber attack that works by tricking users into connecting to a fake Wi-Fi access point that mimics a legitimate network. Once a user is connected to an “evil twin”…

C++ 9 6 Updated Apr 13, 2025

Python Tool to automate WIFI attacks to obtain handshake, PMKID attack, make networks temporarily down, create fake AP's and launch an Evil Twin attack.

Python 173 23 Updated Nov 24, 2023

Awesome-Cellular-Hacking

3,718 638 Updated Mar 21, 2026

🍍 Advanced WiFi capture automation for WiFi Pineapple MK7 | Powerful hcxdumptool launcher with MAC filtering, GPS support, multi-channel targeting & OpenWRT optimization | Authorized security testi…

Shell 12 1 Updated Aug 17, 2025

RF transmitter for Raspberry Pi

C 4,478 576 Updated Sep 30, 2024

Recon 2015 Presentation from Alex Ionescu

C 251 61 Updated Jan 27, 2016

Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode

PowerShell 2,519 499 Updated Nov 15, 2023

Some suggestions on how to write golang code better.

Shell 47 18 Updated Nov 21, 2024

The Hunt for Malicious Strings

C# 1,377 180 Updated May 13, 2025

Python3 utility for creating zip files that smuggle additional data for later extraction

Python 268 29 Updated May 15, 2025

PowerShell Pass The Hash Utils

PowerShell 1,753 311 Updated Dec 9, 2018

Source graveyard and random candy for radare2

C 257 113 Updated Feb 28, 2026
Next