Skip to content
View itsallpretend's full-sized avatar
😈
normal people scare me
😈
normal people scare me
Block or Report

Block or report itsallpretend

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Popular repositories

  1. FBI-tools FBI-tools Public

    Forked from danieldurnea/FBI-tools

    🕵️ OSINT Tools for gathering information and actions forensic🕵️

    7 1

  2. PENTESTING-BIBLE PENTESTING-BIBLE Public

    Forked from blaCCkHatHacEEkr/PENTESTING-BIBLE

    Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.

    3

  3. deepdarkCTI deepdarkCTI Public

    Forked from fastfire/deepdarkCTI

    Collection of Cyber Threat Intelligence sources from the deep and dark web

    2

  4. SecLists SecLists Public

    Forked from jhaddix/SecLists

    SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strin…

    PHP 2 1

  5. PayloadsAllTheThings PayloadsAllTheThings Public

    Forked from swisskyrepo/PayloadsAllTheThings

    A list of useful payloads and bypass for Web Application Security and Pentest/CTF

    Python 2 1

  6. obsidian-osint-templates obsidian-osint-templates Public

    Forked from WebBreacher/obsidian-osint-templates

    These templates are suggestions of how the Obsidian notetaking tool can be used during an OSINT investigation. The example data in those files should allow you to make some connections (see what I …

    JavaScript 2