- /home/bordeaux
Highlights
Lists (1)
Sort Name ascending (A-Z)
Stars
This script automates SQL injection testing using SQLMap with AI-powered decision making.
A book series (2 published editions) on the JS language.
simavr is a lean, mean and hackable AVR simulator for linux & OSX
An open-source, code-first Python toolkit for building, evaluating, and deploying sophisticated AI agents with flexibility and control.
.NET post-exploitation toolkit for Active Directory reconnaissance and exploitation
jmk-foofus / impacket
Forked from fortra/impacketImpacket is a collection of Python classes for working with network protocols.
Fix Play Integrity (and SafetyNet) verdicts.
FlareSolverr drop-in replacement with FastAPI and nodriver
PoC scripts to exploit LFR (Local File Read) via PHP filters chain oracle (php://filter), especially for CTF purposes or the exploit of CVE-2023-6199, etc. This's a one-script exploitation PoC modi…
An experimental high-performance DNS query bruteforce tool built with AF_XDP for extremely fast and accurate bulk DNS lookups.
Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.
Tool for finding URLs, paths, secrets and generating raw HTTP requests and OpenApi specifications from config files and annotations used in JAR / WAR / APK applications.
An open-source 3DS emulator project based on Citra.
HTTP/2 Last Frame Synchronization (also known as Single Packet Attack) low Level Library / Tool based on Scapy + Exploit Timing Attacks
Fast and powerful Git hooks manager for any type of projects.
A suite of secret scanners built in Rust for performance. Based on TruffleHog (https://github.com/dxa4481/truffleHog) which is written in Python.
A tool designed to exploit bad implementations of decryption mechanisms in Laravel applications.
a repository of all the CTF challenges I've made for public events
Tool to remotely dump secrets from the Windows registry
A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and reflection techniques for code injection. This PoC showcases…