Stars
Locally own and run your LLM - easy, simple, lightweight
.NET post-exploitation toolkit for Active Directory reconnaissance and exploitation
Code for the manim-generated scenes used in 3blue1brown videos
A client-side solution to TF2 weapon-specific crosshairs.
Enumerating and removing kernel callbacks using signed vulnerable drivers
The Missing Semester of Your CS Education π
Technically-oriented PDF Collection (Papers, Specs, Decks, Manuals, etc)
ScareCrow - Payload creation framework designed around EDR bypass.
π Freely available programming books
List of awesome reverse engineering resources
Code samples for my book "Neural Networks and Deep Learning"
A list of Free Software network services and web applications which can be hosted on your own servers
A curated list of amazingly awesome open-source sysadmin resources.
Instant access to you bug bounty submission dashboard on various platforms + publicly disclosed reports + #bugbountytip
A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techniques.
Custom Query list for the Bloodhound GUI based off my cheatsheet
A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.
Attack and defend active directory using modern post exploitation adversary tradecraft activity
Six Degrees of Domain Admin
Sample pentest report provided by TCM Security
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
The ultimate WinRM shell for hacking/pentesting