🎉 Welcome to my collection of open-source projects and tools!
Each repository reflects my passion for cybersecurity, automation, and innovation. Below is an overview of the repositories and their purpose:
A multi-functional cybersecurity utility for recon and attack surface management.
➡️ Key Features: Automates common tasks for both red and blue teams.
A tool for analyzing email authentication protocols like SPF, DKIM, and DMARC.
➡️ Use Case: Securing email communication and preventing spoofing attacks.
Monitors and curates bug-bounty related repositories weekly (Monday).
➡️ Use Case: Stay up-to-date with the latest tools, frameworks and research in bug-bounty domain.
Monitors and curates cybersecurity-related repositories weekly (Thursday)
➡️ Use Case: Stay up-to-date with the latest tools, frameworks and research in cybersecurity domain.
Automatically identifies login portals across web applications.
➡️ Perfect For: Recon during penetration testing and security audits.
A utility to download transcripts of the “Darknet Diaries” podcast.
➡️ Great For: Archiving and offline access to insightful cybersecurity stories.
A GitHub repository crawler for locating and analyzing public repositories.
➡️ Focus: Downloads repositories by popularity (most stars first).
👉 Visit my GitHub profile to explore all my repositories, contributions, and projects.
📬 Feel free to collaborate, contribute, or reach out for more insights!