Lists (26)
Sort Name ascending (A-Z)
🧠AI
🎫BinMagic
🎁book
🧨bypass
anti-vir bypasssssssssss🔍code audit
🔐Cryptography
🛠️Dev-Compilers
🏗️Dev-Frameworks
🛠️Dev-Gadget
🛡️Exploits
🍔ExpResearch
for exploit code learnning🕵️♂️Forensics
✨fuzz
🕶hack
🧪kernel
📕paper
collecting fuzz paper's code🔍Penetration Testing
🎯project
learn how to code🎈redteam
🧪research
🔄Reverse Engineering
🛠️Security Tools
🧑💻Social Engineering
🛠useful gadget
🔪ww3
🍉吃瓜
🍉🍉🍉Stars
Hunt down social media accounts by username across social networks
🚀AI拟声: 5秒内克隆您的声音并生成任意语音内容 Clone a voice in 5 seconds to generate arbitrary speech in real-time
ASCII generator (image to text, image to image, video to video)
Scanning APK file for URIs, endpoints & secrets.
A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference
File upload vulnerability scanner and exploitation tool.
IDA plugin which queries uses language models to speed up reverse-engineering
网络摄像头漏洞扫描工具 | Webcam vulnerability scanning tool
Find and fix 400+ types of hardcoded secrets and 70+ types of infrastructure-as-code misconfigurations.
A .DS_Store file disclosure exploit. It parses .DS_Store file and downloads files recursively.
SysWhispers on Steroids - AV/EDR evasion via direct system calls.
How to exploit a double free vulnerability in 2021. Use After Free for Dummies
Vcenter综合渗透利用工具包 | Vcenter Comprehensive Penetration and Exploitation Toolkit
C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.
This project aims to facilitate the conversion of Visual Studio to CMake projects.
Recognize cpu instructions in an arbitrary binary file
Sign-Sacker(签名掠夺者):一款数字签名复制器,可将其他官方exe中数字签名,图标,详细信息复制到没有签名的exe中,作为免杀,权限维持,伪装的一种小手段。
color-icon-matrix barcodes. Proof of concept implementation.