Lists (11)
Sort Name ascending (A-Z)
Stars
ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.
Customizable Linux Persistence Tool for Security Research and Detection Engineering.
peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.
xforcered / RemoteMonologue
Forked from 3lp4tr0n/RemoteMonologueWeaponizing DCOM for NTLM Authentication Coercions
A curated list of awesome things related to better-auth
SpiderLabs / SCShell
Forked from Mr-Un1k0d3r/SCShellFileless lateral movement tool that relies on ChangeServiceConfigA to run command
A super simple tool to convert your SVG's to 3D models.
Master programming by recreating your favorite technologies from scratch.
The Tick is the next evolution in covert access control system implants for simulating adversary-in-the-middle attacks.
Fully local web research and report writing assistant
An opinionated theme generator 🎨 (VS Code, shadcn/ui)
Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs
React component to create graphic user interface with: - draggable nodes with ports and edges on a directed graph editor. - extensibility to customize the widgets or behaviors. - accessbility and t…
RPyC (Remote Python Call) - A transparent and symmetric RPC library for python
KSOCKET provides a very basic example how to make a network connections in the Windows Driver by using WSK
CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool
Allows running workflows (chains and groups of tasks) using the Python background task processing library dramatiq
Tunneled Mesh Reverse Proxy Server with Identity and Access Control and Dashboard UI
Beautifully designed open-source layouts and UI experiments built with Origin UI and shadcn/ui.