Skip to content
View r0cu3's full-sized avatar

Block or report r0cu3

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

IOC from articles, tweets for archives

YARA 313 43 Updated Dec 12, 2023

Re-implementation of Age of Empires and the Rise of Rome expansion

C++ 98 11 Updated Mar 2, 2025

Investigate malicious Windows logon by visualizing and analyzing Windows event log

Python 2,858 455 Updated Jun 21, 2024

Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.

920 245 Updated Nov 28, 2024

Scalable fuzzing infrastructure.

Python 5,366 568 Updated Mar 20, 2025

Some scripts useful for red team activities

PowerShell 1,562 364 Updated Jan 27, 2022

Cmd.exe Command Obfuscation Generator & Detection Test Harness

PowerShell 854 135 Updated Mar 27, 2018

TheftFuzzer is a tool that fuzzes Cross-Origin Resource Sharing implementations for common misconfigurations.

Python 310 60 Updated May 22, 2023

Google App Engine - Remote Code Execution bug ($36k bug bounty)

Java 144 17 Updated May 21, 2018

A curated list of Awesome Threat Intelligence resources

8,565 1,531 Updated Aug 18, 2024

Tools for instrumenting Windows Defender's mpengine.dll

Python 36 7 Updated Nov 1, 2018

List of real-world threats against endpoint protection software

215 38 Updated Nov 23, 2024
Python 3 2 Updated Apr 20, 2020

A curated list of awesome directed fuzzing research papers

503 45 Updated Feb 13, 2025

AFLNet: A Greybox Fuzzer for Network Protocols (https://thuanpv.github.io/publications/AFLNet_ICST20.pdf)

C 909 194 Updated Jul 25, 2024

Indicators from Unit 42 Public Reports

PHP 708 152 Updated Mar 7, 2025

PoC for triggering buffer overflow via CVE-2020-0796

Python 324 121 Updated Feb 26, 2023

A research kernel and hypervisor attempting to get fully deterministic emulation with minimum performance cost

Rust 520 34 Updated Mar 21, 2021

Indicators of Compromises (IOC) of our various investigations

YARA 1,743 267 Updated Mar 20, 2025

A PowerShell script anti-virus evasion tool

PowerShell 1,101 227 Updated Mar 19, 2023

Empire is a PowerShell and Python post-exploitation agent.

PowerShell 7,567 2,827 Updated Jan 19, 2020

PowerSploit - A PowerShell Post-Exploitation Framework

PowerShell 12,195 4,659 Updated Aug 17, 2020

Attack and defend active directory using modern post exploitation adversary tradecraft activity

4,547 1,057 Updated Nov 7, 2024

Retired beginner/intermediate malware analysis training materials from @pedramamini and @erocarrera.

HTML 894 169 Updated Feb 25, 2020

GRR Rapid Response: remote live forensics for incident response

Python 4,859 773 Updated Feb 27, 2025

A toolset to make a system look as if it was the victim of an APT attack

Batchfile 2,533 438 Updated Jun 16, 2023

List of awesome reverse engineering resources

9,219 1,099 Updated Jul 29, 2023

Deserialization payload generator for a variety of .NET formatters

C# 3,357 486 Updated Dec 23, 2024
Next