Highlights
Lists (1)
Sort Name ascending (A-Z)
Starred repositories
💪 Helper Utils(800+): int, byte, string, array/slice, map, struct, dump, convert/format, error, web/http, cli/flag, OS/ENV, filesystem, system, test/assert, time and more. Go 常用的一些工具函数:数字,字符串,数组,Ma…
An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.
Vim-fork focused on extensibility and usability
RedEye is a visual analytic tool supporting Red & Blue Team operations
Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-…
这是一个用Go语言编写的Windows shellcode执行工具。支持多种shellcode注入方式,包括直接执行、进程注入和进程镂空,并集成了高级的AES加密保护机制。
A really basic thread-safe progress bar for Golang applications
获取微信信息;读取数据库,本地查看聊天记录并导出为csv、html等格式用于AI训练,自动回复等。支持多账户信息获取,支持所有微信版本。
💥 Blazing fast terminal file manager written in Rust, based on async I/O.
永久免费订阅/白嫖/节点/vpn/白嫖/订阅/机场/翻墙/加速器/科学上网/教程/破解/软件/资源/网站/ss/ssr/vmess/vless/v2ray/trojan/clash
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
BitCracker is the first open source password cracking tool for memory units encrypted with BitLocker
Collection of Linux and macOS Volatility3 Intermediate Symbol Files (ISF), suitable for memory analysis 🔍
A collection of bookmarks for penetration testers, bug bounty hunters, malware developers, reverse engineers and anyone who is just interested in infosec topics.
Official Documentation for the Binance Spot APIs and Streams
sdlc 是一个基于 Go 语言构建的安全漏洞示范平台,旨在促进 DevSecOps 和安全开发生命周期 (SDLC) 实践。它通过模拟常见漏洞来增强开发人员的安全意识,除了可以用于devsecops以外,还可以用于安全行业从事者学习漏洞知识或者渗透知识,代码审计,提供了一个实践和学习的环境。本项目采用了前后端分离的设计模式,其中后端利用了轻量级框架 Gin,而前端则使用了 Vue 3。
ASkyeye / CVE-2024-38200
Forked from passtheticket/CVE-2024-38200CVE-2024-38200 - Microsoft Office NTLMv2 Disclosure Vulnerability
ScareCrow - Payload creation framework designed around EDR bypass.
This script allows you to create various artifacts on a bare-metal Windows computer in an attempt to trick malwares that looks for VM or analysis tools