😁
Because real attackers don't need to be sophisticated.
They just need to be trusted.
Popular repositories Loading
-
AllVideoPocsFromHackerOne
AllVideoPocsFromHackerOne PublicThis script grab public report from hacker one and make some folders with poc videos
-
LLM-anonymization
LLM-anonymization PublicReverse proxy for Claude Code that anonymizes sensitive pentest data (IPs, hashes, credentials, hostnames, PII) before it reaches Anthropic. Dual-layer detection: local Ollama LLM + regex safety ne…
-
ReconNotes
ReconNotes PublicJust some public notes that can be useful and i want let the world knows.
-
BashitRecon
BashitRecon PublicA collection of famous recon public scripts, but in bash <3
-
the-book-of-secret-knowledge
the-book-of-secret-knowledge PublicForked from trimstray/the-book-of-secret-knowledge
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
Something went wrong, please refresh the page to try again.
If the problem persists, check the GitHub status page or contact support.
If the problem persists, check the GitHub status page or contact support.

