- France
- @WikiJM
Lists (2)
Sort Name ascending (A-Z)
Stars
- All languages
- Assembly
- AutoHotkey
- AutoIt
- Batchfile
- C
- C#
- C++
- CSS
- CoffeeScript
- Dart
- Dockerfile
- Go
- Groovy
- HCL
- HTML
- Inno Setup
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kotlin
- Lua
- MATLAB
- Makefile
- PHP
- Pascal
- Perl
- PowerShell
- Python
- Reason
- Rich Text Format
- Roff
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Svelte
- Swift
- TeX
- TypeScript
- VBA
- VBScript
- VCL
- Visual Basic
- Visual Basic .NET
- Vue
- XSLT
- YARA
- Zig
Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.
Open Source Alternative to Vercel, Netlify and Heroku.
APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files
PoC to record audio from a Bluetooth device
A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters to share knowledge, collaborate on techniques, and advance t…
ZigStrike, a powerful Payload Delivery Pipeline developed in Zig, offering a variety of injection techniques and anti-sandbox features.
The simplest way to protect your apps with a login screen.
A no-nonsense CAPTCHA system with seamless UX | Backend component
🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications
Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or even inspiration).
An invoice generator app built using Next.js, Typescript, and Shadcn
Tools and Techniques for Red Team / Penetration Testing
A GUI Agent application based on UI-TARS(Vision-Language Model) that allows you to control your computer using natural language.
Phone: A Mobile Phone Forensic Framework ( Android )
This free tool parses Google Takeout Location History Exports or Google Semantic Location History Warrant Return Data in a forensic manner.
Convert any PDF into a podcast episode!
Security Content for the PEAK Threat Hunting Framework
Enabling the Windows Subsystem for Linux to include support for Wayland and X server related scenarios
Morpheus is a memory dumper that extracts lsass.exe in RAM and exfiltrates it via forged NTP packets. It uses RC4 encryption and Reed-Solomon RFEC for reliable, covert data transfer, with a Python …
Scheduling infrastructure for absolutely everyone.
A suite of tools to disrupt campaigns using the Sliver C2 framework.
All Algorithms implemented in Python
PowerShell tools to help defenders hunt smarter, hunt harder.
Repository for the LinkScope Client software.
PowerShell Digital Forensics & Incident Response Scripts.
🤖 The free, Open Source alternative to OpenAI, Claude and others. Self-hosted and local-first. Drop-in replacement for OpenAI, running on consumer-grade hardware. No GPU required. Runs gguf, transf…