Lists (32)
Sort Name ascending (A-Z)
bule
burp_ext
c/c++
C2
CS
CTF
dot_net
fish
golang
HIDS/EDR
iot
java安全
linux安全
openai-gpt
web3
webshell免杀
web扫描器/漏洞利用工具
windows_rpc
windows免杀提权
云渗透
代码改善生活
后渗透拿文件/解密/远程连接等工具
域渗透工具
字典
文章笔记
权限维持
流量转发
自建平台
身体健康长命百岁
近源
逆向工具
靶场
Stars
- All languages
- ASP
- ASP.NET
- Assembly
- Batchfile
- BlitzBasic
- C
- C#
- C++
- CSS
- CodeQL
- Dockerfile
- Go
- HCL
- HTML
- Haskell
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kotlin
- LLVM
- Lua
- Makefile
- Nim
- PHP
- Pascal
- Perl
- PowerShell
- Python
- Ruby
- Rust
- Scala
- Shell
- Smali
- Solidity
- TypeScript
- VBScript
- Visual Basic .NET
- Vue
- XSLT
- YARA
- Zig
Evade EDR's the simple way, by not touching any of the API's they hook.
The Browser Exploitation Framework Project
A fully compatible replacement of Windows NT NtCreateLowBoxToken syscall - precisely restored from reverse engineering
Get IP address on other side audio call in Telegram.
StoneKeeper C2, an experimental EDR evasion framework for research purposes
Official code repo for the O'Reilly Book - "Hands-On Large Language Models"
一款轻量化可定制模板的邮件批量发送工具 | 可用于攻防钓鱼或其他邮件个性化的场景 | 可启动JavaFX或SpringWeb环境
Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.
一个手动或自动patch shellcode到二进制文件的免杀工具/A tool for manual or automatic patch shellcode into binary file oder to bypass AV.
Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.
Agent responsible for detecting remote vulnerabilities, a robust scanner.
A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware. Brought to you by Winsider Seminars & Solutions, Inc. @ http://www.windows-internals…
Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.js
A collection of Server-Side Prototype Pollution gadgets and exploits
《Windows 内核安全编程技术实践》 系列丛书,探索 Anti RootKit 反内核工具核心原理与技术实现细节。
Build your personal docker-compose.yml file for Monero services.
All the private and public audits that I have worked on.
TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and penetration tests with the tokens generated working out of t…