Lists (24)
Sort Name ascending (A-Z)
Audit
Awesome
Bug Bounty
Burpsuite
Crypto
Defensive repo
DevOps
Forensic
GPT
Interview preparation
KYC
Learning code
MALVARE DEV
Malware Analysis
Menu terminal
Mobile repo
All resources matter to subjectNetwork
OWOF
PenTest
Purple Team
Refactor code
SOC/DFIR
Web dev
Zero trust
Stars
- All languages
- Assembly
- AutoIt
- Awk
- C
- C#
- C++
- CSS
- CoffeeScript
- Dart
- Dockerfile
- Eagle
- Elixir
- Erlang
- FreeMarker
- Go
- HTML
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kotlin
- Lua
- MATLAB
- Makefile
- Mojo
- NASL
- Nim
- Objective-C
- OpenEdge ABL
- PHP
- Pascal
- Perl
- PostScript
- PowerShell
- Pug
- Python
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Smarty
- Solidity
- Svelte
- Swift
- TeX
- TypeScript
- Vala
- Vim Script
- Visual Basic .NET
- XSLT
- YARA
BCC - Tools for BPF-based Linux IO analysis, networking, monitoring, and more
Small and highly portable detection tests based on MITRE's ATT&CK.
An encrypted IPv6 network using public-key cryptography for address allocation and a distributed hash table for routing.
OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
eBPF-based Security Observability and Runtime Enforcement
Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)
Fork of http://sourceforge.net/projects/mjpg-streamer/
Core Lightning — Lightning Network implementation focusing on spec compliance and performance
Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loading of a library from memory into a host process.
Easy to use cryptographic framework for data protection: secure messaging with forward secrecy and secure data storage. Has unified APIs across 14 platforms.
🇺🇦 Windows driver with usermode interface which can hide processes, file-system and registry objects, protect processes and etc
Situational Awareness commands implemented using Beacon Object Files
TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.
Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your environment anymore.
A memory-based evasion technique which makes shellcode invisible from process start to end.
Macro-header for compile-time C obfuscation (tcc, win x86/x64)
A collection of my Semgrep rules to facilitate vulnerability research.
Tiny SHell - An open-source UNIX backdoor (I'm not the author!)