Lists (11)
Sort Name ascending (A-Z)
- All languages
- ASP
- Assembly
- Batchfile
- BitBake
- BlitzBasic
- C
- C#
- C++
- CSS
- Classic ASP
- CodeQL
- Dockerfile
- EJS
- FreeMarker
- Go
- HCL
- HTML
- Haskell
- Inno Setup
- Java
- JavaScript
- Jupyter Notebook
- Just
- Kotlin
- LLVM
- Less
- Logos
- Lua
- MATLAB
- MDX
- Makefile
- Markdown
- Meson
- Nim
- OCaml
- Objective-C
- PHP
- Pascal
- Perl
- PowerShell
- Python
- QMake
- Rich Text Format
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Smali
- Smarty
- Solidity
- Swift
- TeX
- TypeScript
- VBA
- VBScript
- Verilog
- Visual Basic
- Visual Basic .NET
- Vue
- XSLT
- YAML
- YARA
- Zeek
Starred repositories
Java Vulnerability Exploitation Platform
A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementing page protection changes during no execution.
howmp / donut_ollvm
Forked from TheWover/donutGenerates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
xforcered / BokuLoader
Forked from boku7/BokuLoaderA proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!
AADInternals PowerShell module for administering Azure AD and Office 365
A collection of Azure AD/Entra tools for offensive and defensive security purposes
Nuke It From Orbit - remove AV/EDR with physical access
A simple screen parsing tool towards pure vision based GUI agent
A PoC implementation for spoofing arbitrary call stacks when making sys calls (e.g. grabbing a handle via NtOpenProcess)
reverse proxy, online proxy, 反向代理,免翻墙访问Youtube/twitter/Google, 支持github和telegram web登录(请注意不要通过不信任的代理进行登录)。支持DuckDuckGo AI Chat(可免费访问chatGPT3.5和Claude3)
Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime
KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default settings).
🔐 Run frida-server on boot with Magisk, always up-to-date
The most powerful and modular diffusion model GUI, api and backend with a graph/nodes interface.
80+ Gadgets(30 More than ysoserial). JNDI-Injection-Exploit-Plus is a tool for generating workable JNDI links and provide background services by starting RMI server,LDAP server and HTTP server.
Reproducing Spyboy technique, which involves terminating all EDR/XDR/AVs processes by abusing the zam64.sys driver
real time face swap and one-click video deepfake with only a single image
efinance 是一个可以快速获取基金、股票、债券、期货数据的 Python 库,回测以及量化交易的好帮手!🚀🚀🚀
Testing TLS/SSL encryption anywhere on any port
js cookie逆向利器:js cookie变动监控可视化工具 & js cookie hook打条件断点
《反爬虫JS破解与混淆还原手册》 by @No-Attack @LoseNine。 一本教你JS破解以及混淆与还原的教程。欢迎star,持续更新。
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
