Skip to content
View blshkv's full-sized avatar

Block or report blshkv

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Open-source, cross platform Qt6 based IDE for reverse-engineering Android application packages. It features a friendly IDE-like layout including code editor with syntax highlighting support for *.s…

C++ 3,898 640 Updated Jan 5, 2026

👻Stowaway -- Multi-hop Proxy Tool for pentesters

Go 3,344 442 Updated Mar 3, 2026

Flutter Mobile Application Reverse Engineering Tool

C++ 2,194 300 Updated Mar 14, 2026

BleachBit system cleaner for Windows and Linux

Python 4,516 329 Updated Mar 23, 2026

Secrets scanner that understands code

Python 168 16 Updated Dec 3, 2025

Generative fill in 3D.

TypeScript 744 42 Updated Dec 17, 2024

Programs to process GoPro MP4 & Generic GPX/FIT files and create video dashboards & maps

Python 544 81 Updated Mar 12, 2026

Multi-user anti-filtering panel, with an effortless installation and supporting more than 20 protocols to circumvent filtering plus the telegram proxy.

Python 8,555 963 Updated Mar 6, 2026

Instant neural graphics primitives: lightning fast NeRF and more

Cuda 17,332 2,061 Updated Feb 2, 2026

ETNA – Time-Series Library

Python 883 86 Updated Aug 9, 2023

Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices

Go 12,075 1,222 Updated Mar 24, 2026

Flutter Reverse Engineering Framework

Python 1,443 188 Updated Apr 11, 2022

Oversecured Vulnerable iOS App

Swift 231 57 Updated Jan 10, 2024

Dynamic unpacker based on PE-sieve

C 799 76 Updated Sep 13, 2025

Helper plugin for analyzing UEFI firmware

C 89 12 Updated Jun 3, 2024

An implementation of TEMPEST en GNU Radio

C++ 631 73 Updated Feb 10, 2025

Bucky (An automatic S3 bucket discovery tool)

PHP 198 28 Updated Jan 6, 2022

Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)

Python 89 22 Updated Nov 18, 2022

Runtime Security Enforcement System. Workload hardening/sandboxing and implementing least-permissive policies made easy leveraging LSMs (LSM-BPF, AppArmor).

Go 2,069 445 Updated Mar 23, 2026

HomePlugAV tools to test PLC (in)security

Python 46 14 Updated Dec 19, 2024

Remove duplicates from MASSIVE wordlist, without sorting it (for dictionary-based password cracking)

C++ 967 97 Updated Nov 4, 2025

AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Cobalt Strike Malleable C2 profile.

C# 236 49 Updated Feb 15, 2021

d(ockerp)wn - a docker pwn tool manager

Python 156 20 Updated Jun 8, 2021

🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡

Python 1,401 97 Updated Mar 5, 2025

Find cloud assets that no one wants exposed 🔎 ☁️

Go 347 33 Updated Jul 20, 2020

A Burp Suite extension implementing the Signing HTTP Messages draft-ietf-httpbis-message-signatures-01 draft.

Java 41 10 Updated Aug 16, 2022

Plugin to embed Ghidra Decompiler into Binary Ninja

Python 97 7 Updated Jun 8, 2022

Unlock an Android phone (or device) by bruteforcing the lockscreen PIN. Turn your Kali Nethunter phone into a bruteforce PIN cracker for Android devices! (no root, no adb)

Shell 4,584 816 Updated Oct 10, 2023

BGP Hijack Detection

Python 117 36 Updated Feb 14, 2018

Another kernel self protection

62 51 Updated May 12, 2020
Next