Git Product home page Git Product logo
  • šŸ‘‹ Hi, Iā€™m Drew!
  • šŸ‘€ Iā€™m interested in ... Networking, information security
  • šŸŒ± Iā€™m currently learning ... I just finsihed my CCNA and I'm now working on learning some python programming for automation
  • šŸ’žļø Iā€™m looking to collaborate on ... Most anything
  • šŸ“« How to reach me ... email: [email protected] discord: KidScripto#

kidscripto's Projects

btrfscue icon btrfscue

Recover files from damaged BTRFS filesystems

cml-community icon cml-community

Community Contributed Content and Resources for Cisco Modeling Labs

cutter icon cutter

Free and Open Source Reverse Engineering Platform powered by rizin

drat icon drat

Utility for performing data recovery and analysis of APFS partitions/containers.

fatx-tools icon fatx-tools

Data recovery tools for FATX drives (XBOX and XBOX 360).

ffuf icon ffuf

Fast web fuzzer written in Go

natlas icon natlas

natlas - Network Discovery and Auto-Diagramming

netbox icon netbox

The premier source of truth powering network automation. Open source under Apache 2. Public demo: https://demo.netbox.dev

nornir icon nornir

Pluggable multi-threaded framework with inventory management to help operate collections of devices

pwntools icon pwntools

CTF framework and exploit development library

py-zfs-rescue icon py-zfs-rescue

A very minimal user-space implementation of ZFS in Python and a tool for salvaging data from broken pools

pypia icon pypia

Configuration of Private Internet Access VPN routes for Linux

recoverpy icon recoverpy

Interactively find and recover deleted or :point_right: overwritten :point_left: files from your terminal

riposte icon riposte

Python package for wrapping applications inside a tailored interactive shell

rsactftool icon rsactftool

RSA attack tool (mainly for ctf) - retreive private key from weak public key and/or uncipher data

rsatool icon rsatool

rsatool can be used to calculate RSA and RSA-CRT parameters

seclists icon seclists

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.

sublist3r icon sublist3r

Fast subdomains enumeration tool for penetration testers

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    šŸ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. šŸ“ŠšŸ“ˆšŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ā¤ļø Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.