Starred repositories
LLM (Large Language Model) FineTuning
A fancy self-hosted monitoring tool
A simple server for sending and receiving messages in real-time per WebSocket. (Includes a sleek web-ui)
Stalk your Friends. Find their Instagram, FB and Twitter Profiles using Image Recognition and Reverse Image Search.
OSINT tool to find breached emails, databases, pastes, and relevant information
React Invoice Generator allows you quickly make invoices and export them as PDF
Open Source Invoicing Solution for Individuals & Businesses
So what is this all about? Yep, its an OSINT blog and a collection of OSINT resources and tools. Suggestions for new OSINT resources is always welcomed.
POC of using html and scripts to make a malicious webpage to demonstrate website based attacks.
witchfindertr / PegasusHVNC
Forked from BGDonLINE/PegasusHVNCThis repo is just to teach owner a lesson, that life isnt Turkish soap drama and that there are consequences of behaving like soap actress ;)
This repo is just to teach owner a lesson, that life isnt Turkish soap drama and that there are consequences of behaving like soap actress ;)
Conti Ransomware malware leak WITH LOCKER
witchfindertr / toutatis
Forked from megadose/toutatisToutatis is a tool that allows you to extract information from instagrams accounts such as e-mails, phone numbers and more
witchfindertr / tiktodv3
Forked from kangoka/tiktodv3Get unlimited Tik Tok views or hearts or followers or shares.
witchfindertr / aresskit
Forked from orf53975/aresskitNext Generation Remote Administration Tool (RAT)
QuestDB is a high performance, open-source, time-series database
Module of Metasploit to exploit the vulnerability Eternalblue-Doublepulsar.
Enable Monitor mode & Packet Injection in Raspberry Pi
Overlord - Red Teaming Infrastructure Automation
Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation
Quick and dirty dynamic redirect.rules generator
MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.
A list of vulnerabilities or design flaws that Microsoft does not intend to fix. Since the number is growing, I decided to make a list. This list covers only vulnerabilities that came up in July 20…
Collection of beacon object files for use with Cobalt Strike to facilitate 🐚.