Skip to content
View alexpoiry's full-sized avatar

Organizations

@FortAwesome

Block or report alexpoiry

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Backup and restore Route53 zones, or transfer between AWS accounts.

Python 148 47 Updated Apr 4, 2022

A Python package and CLI for parsing aggregate and forensic DMARC reports

Python 1,221 254 Updated Mar 23, 2026

Analyse and visualize DMARC results using open-source tools

Dockerfile 771 191 Updated Feb 9, 2024

Implementation of various string similarity and distance algorithms: Levenshtein, Jaro-winkler, n-Gram, Q-Gram, Jaccard index, Longest Common Subsequence edit distance, cosine similarity ...

Java 2,741 416 Updated Jun 1, 2022

My custom wireshark plugins

Lua 62 16 Updated Feb 23, 2025

A tool for processing a lot of pcaps using tshark

Python 155 31 Updated Oct 22, 2023

A Course on Intermediate Level Linux Exploitation

Python 1,010 232 Updated Aug 24, 2020

A sample app for my online course "Clean Architecture: Patterns, Practices, and Principles"

C# 1,200 501 Updated Feb 12, 2025

2D pixel art parametric castle generator

C# 43 Updated Sep 29, 2019

Search gtfobins and lolbas files from your terminal

Python 463 80 Updated Jul 13, 2022

Top 100 Hacking & Security E-Books (Free Download)

6,286 1,215 Updated Jul 26, 2024

A clone of xsduan's conniebot (and a little more) for matrix

TypeScript 6 Updated Dec 13, 2022

Source materials for [d0x3d!], a network security game.

TeX 195 45 Updated Jan 1, 2014

An open source script to perform malware static analysis on Portable Executable

YARA 332 73 Updated May 23, 2023

🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2026

TypeScript 21,014 1,430 Updated Feb 28, 2026

The Hunting ELK

Jupyter Notebook 3,913 695 Updated Jun 1, 2024

A Modern Orchestration Engine for Security

Go 6,158 974 Updated Mar 13, 2026

Official Black Hat Arsenal Security Tools Repository

4,246 1,179 Updated Aug 26, 2024

File upload vulnerability scanner and exploitation tool.

Python 3,307 515 Updated May 8, 2025

Six Degrees of Domain Admin

PowerShell 10,561 1,789 Updated Mar 2, 2026

Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark

Go 7,988 1,320 Updated Mar 23, 2026

Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload creation using Metasploit. For use with Kali Linux.

Shell 3,832 873 Updated Mar 17, 2026

Docker container for creating the phishing sites using Blackeye

Dockerfile 178 82 Updated Oct 7, 2022

Public version of PagerDuty's employee security training courses.

Shell 415 108 Updated Jun 19, 2023

Ghidra is a software reverse engineering (SRE) framework

Java 66,125 7,288 Updated Mar 24, 2026
446 97 Updated Aug 8, 2024

🔍 ScanCode detects licenses, copyrights, dependencies by "scanning code" ... to discover and inventory open source and third-party packages used in your code. Sponsored by NLnet, the Google Summer …

Python 2,503 715 Updated Mar 20, 2026

Creative and unusual things that can be done with the Windows API.

C# 2,583 147 Updated Aug 22, 2022

Manipulate Chromecast Devices in your Network

Python 257 37 Updated Jul 7, 2020

"PRinter Exploitation Toolkit" LAN automation tool

Python 215 50 Updated Oct 7, 2019
Next