Skip to content
View puQy's full-sized avatar

Block or report puQy

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

🧙‍♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications

JavaScript 832 138 Updated Apr 16, 2025

😱 A curated list of amazingly awesome OSINT

20,920 3,014 Updated Apr 9, 2025

✨ A curated list of awesome threat detection and hunting resources 🕵️‍♂️

4,115 689 Updated Jul 15, 2024

Harden Windows Safely, Securely using Official Supported Microsoft methods and proper explanation | Always up-to-date and works with the latest build of Windows | Provides tools and Guides for Pers…

C# 2,390 189 Updated Apr 15, 2025

StealthGuardian is a middleware layer that can be combined with adversary simulation tools to verify the resistance, detection level and behaviour detection of executed actions against defined def…

Python 17 3 Updated Aug 7, 2024

Projects for security students

Python 2,464 377 Updated Sep 9, 2024

AADInternals PowerShell module for administering Azure AD and Office 365

PowerShell 1,398 229 Updated Dec 13, 2024

pySigma NetWitness backend

Python 4 Updated Mar 24, 2025

PowerSploit - A PowerShell Post-Exploitation Framework

PowerShell 12,262 4,658 Updated Aug 17, 2020

Remote Desktop Protocol .NET Console Application for Authenticated Command Execution

C# 1,039 554 Updated Nov 13, 2022

A C# utility for interacting with SCCM

C# 626 94 Updated Sep 16, 2024

The materials of "Hypervisor 101 in Rust", a one-day long course, to quickly learn hardware-assisted virtualization technology and its application for high-performance fuzzing on Intel/AMD processors.

Rust 1,045 71 Updated Sep 15, 2024

Tutorials for getting started with Pwntools

Jupyter Notebook 1,456 256 Updated Oct 1, 2024

A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server.

C 1,643 208 Updated Nov 3, 2024

A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.

163,298 10,256 Updated Nov 19, 2024

Attack and defend active directory using modern post exploitation adversary tradecraft activity

4,573 1,060 Updated Nov 7, 2024

Master programming by recreating your favorite technologies from scratch.

Markdown 371,983 34,602 Updated Apr 11, 2025

Fermion, an electron wrapper for Frida & Monaco.

CSS 680 82 Updated Mar 20, 2025

Containing my notes, practice binaries + solutions, blog posts, etc. for the Offensive Security Exploit Developer (OSED/EXP-301)

645 132 Updated Aug 18, 2024

Cover various security approaches to attack techniques and also provides new discoveries about security breaches.

PowerShell 473 75 Updated Jan 19, 2025

A collection of Azure AD/Entra tools for offensive and defensive security purposes

Python 2,120 294 Updated Apr 16, 2025

A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as KAPE and THOR Cloud and more.

391 42 Updated Dec 29, 2024

reverse shell using curl

Python 454 73 Updated Apr 20, 2024

This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and how they can be mitigated or detected.

PowerShell 2,273 335 Updated Feb 17, 2025

BadZure orchestrates the setup of Azure AD tenants, populating them with diverse entities while also introducing common security misconfigurations to create vulnerable tenants with multiple attack …

Python 450 26 Updated Apr 10, 2025

A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.

C 1,425 132 Updated Sep 2, 2022

A FREE comprehensive online Rust hacking tutorial utilizing the x64, ARM64 and ARM32 architectures going step-by-step into the world of reverse engineering Rust from scratch.

Rust 186 12 Updated Jan 28, 2024

Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.

1,610 220 Updated Nov 1, 2024

Linux kernel map

Python 1,041 140 Updated Jan 5, 2025
Next