Skip to content
View alexpoiry's full-sized avatar

Organizations

@FortAwesome

Block or report alexpoiry

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Backup and restore Route53 zones, or transfer between AWS accounts.

Python 147 47 Updated Apr 4, 2022

A Python package and CLI for parsing aggregate and forensic DMARC reports

Python 1,232 254 Updated Apr 24, 2026

Analyse and visualize DMARC results using open-source tools

Dockerfile 775 190 Updated Feb 9, 2024

Implementation of various string similarity and distance algorithms: Levenshtein, Jaro-winkler, n-Gram, Q-Gram, Jaccard index, Longest Common Subsequence edit distance, cosine similarity ...

Java 2,742 415 Updated Jun 1, 2022

My custom wireshark plugins

Lua 62 16 Updated Feb 23, 2025

A tool for processing a lot of pcaps using tshark

Python 155 31 Updated Oct 22, 2023

A Course on Intermediate Level Linux Exploitation

Python 1,011 233 Updated Aug 24, 2020

A sample app for my online course "Clean Architecture: Patterns, Practices, and Principles"

C# 1,206 503 Updated Feb 12, 2025

2D pixel art parametric castle generator

C# 43 Updated Sep 29, 2019

Search gtfobins and lolbas files from your terminal

Python 464 80 Updated Jul 13, 2022

Top 100 Hacking & Security E-Books (Free Download)

6,322 1,218 Updated Jul 26, 2024

A clone of xsduan's conniebot (and a little more) for matrix

TypeScript 6 Updated Dec 13, 2022

Source materials for [d0x3d!], a network security game.

TeX 194 45 Updated Jan 1, 2014

An open source script to perform malware static analysis on Portable Executable

YARA 332 72 Updated May 23, 2023

🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2026

TypeScript 21,255 1,436 Updated Feb 28, 2026

The Hunting ELK

Jupyter Notebook 3,919 693 Updated Jun 1, 2024

A Modern Orchestration Engine for Security

Go 6,207 979 Updated Apr 15, 2026

Official Black Hat Arsenal Security Tools Repository

4,263 1,179 Updated Aug 26, 2024

File upload vulnerability scanner and exploitation tool.

Python 3,314 512 Updated May 8, 2025

Six Degrees of Domain Admin

PowerShell 10,529 1,787 Updated Mar 2, 2026

Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark

Go 8,025 1,319 Updated Apr 23, 2026

Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload creation using Metasploit. For use with Kali Linux and Ubuntu.

Shell 3,856 870 Updated Apr 20, 2026

Docker container for creating the phishing sites using Blackeye

Dockerfile 179 82 Updated Oct 7, 2022

Public version of PagerDuty's employee security training courses.

Shell 416 108 Updated Jun 19, 2023

Ghidra is a software reverse engineering (SRE) framework

Java 67,622 7,426 Updated Apr 23, 2026
454 99 Updated Aug 8, 2024

🔍 ScanCode detects licenses, copyrights, dependencies by "scanning code" ... to discover and inventory open source and third-party packages used in your code. Sponsored by NLnet, the Google Summer …

Python 2,522 724 Updated Apr 23, 2026

Creative and unusual things that can be done with the Windows API.

C# 2,544 147 Updated Aug 22, 2022

Manipulate Chromecast Devices in your Network

Python 257 37 Updated Jul 7, 2020

"PRinter Exploitation Toolkit" LAN automation tool

Python 214 50 Updated Oct 7, 2019
Next