Skip to content
View saberzaid's full-sized avatar

Block or report saberzaid

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 250 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
69 results for forked starred repositories
Clear filter

Run GGUF models easily with a KoboldAI UI. One File. Zero Install.

C++ 8,601 556 Updated Sep 27, 2025

Awesome curated collection of images and prompts generated by gemini-2.5-flash-image (aka Nano Banana) state-of-the-art image generation and editing model. Explore AI generated visuals created with…

JavaScript 6,168 583 Updated Sep 8, 2025

Compatibility tool for Steam Play based on Wine and additional components

C++ 12,221 305 Updated Sep 24, 2025

The Distributed Scanning Framework for Everybody! Control Your Infrastructure, Scale Your Scanning—On Your Terms. Easily distribute arbitrary binaries and scripts using any of our nine supported cl…

Shell 628 66 Updated Sep 2, 2025

SteamOS session compositing window manager

C++ 4,014 278 Updated Sep 26, 2025

The most powerful and modular stable diffusion GUI, api and backend with a graph/nodes interface. Now ZLUDA enhanced for better AMD GPU performance.

Python 609 47 Updated Sep 26, 2025

Focus even better on prompting and generating

Python 345 56 Updated Jan 24, 2025

Enhanced version of Fooocus for SDXL, more suitable for Chinese and Cloud

Python 844 36 Updated Sep 3, 2025

Champ: Controllable and Consistent Human Image Animation with 3D Parametric Guidance

Python 216 11 Updated Jun 30, 2024

Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel

Python 307 27 Updated Sep 23, 2025

Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST

Rust 193 19 Updated Sep 17, 2024

Fast and Simple Face Swap

Python 351 50 Updated Jan 4, 2024

Focus on prompting and generating

Python 526 36 Updated Sep 26, 2025

linikatz is a tool to attack AD on UNIX

Shell 149 15 Updated Oct 19, 2023

An updated version of keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing it to record keystrokes in certain contex…

C++ 105 9 Updated Jul 27, 2023

Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero and Hak5 USB Rubber Ducky, and changes its signature after eve…

Python 29 6 Updated Jun 19, 2023

PowerSploit - A PowerShell Post-Exploitation Framework

PowerShell 23 2 Updated Jun 11, 2022

A curated list wordlists for bruteforcing and fuzzing

83 12 Updated Apr 3, 2023

PowerSploit - A PowerShell Post-Exploitation Framework

PowerShell 42 4 Updated Mar 25, 2025

Flipper Zero firmware source code + Dict attack improvements

C 61 2 Updated Dec 29, 2022

Burp Bounty is a extension of Burp Suite that improve an active and passive scanner by yourself. This extension requires Burp Suite Pro.

BlitzBasic 71 19 Updated Feb 4, 2022

Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.

Python 430 67 Updated Sep 24, 2025

Impacket is a collection of Python classes for working with network protocols.

Python 293 20 Updated Jul 23, 2025

A simple Google Protobuf Decoder for Burp

Python 43 8 Updated Nov 22, 2022

An interactive TLS-capable intercepting HTTP [& QUIC] proxy for penetration testers and software developers.

Python 15 Updated Jan 16, 2025

A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.

C# 401 38 Updated Jan 10, 2025

Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.

241 50 Updated Nov 4, 2020
Next