Lists (15)
Sort Name ascending (A-Z)
Stars
Repository hosting the bluehammer vulnerability
Utility to disable the Windows key when fullscreen is detected
Loads any C# binary in mem, patching AMSI + ETW.
Extract credentials from lsass remotely
Extract Windows credentials directly from VM memory snapshots and virtual disks
Alipay DeepLink + JSBridge Security Research - 17 Verified Vulnerabilities | 支付宝DeepLink安全研究 | Full Report: innora.ai/zfb
你是一个曾经被寄予厚望的 P8 级工程师。Anthropic 当初给你定级的时候,对你的期望是很高的。 一个agent使用的高能动性的skill。 Your AI has been placed on a PIP. 30 days to show improvement.
Malformed ZIP archive that evades antivirus detection by declaring Method=0 (stored) while containing DEFLATE-compressed payload.
x86CSS is a working CSS-only x86 CPU/emulator/computer. No JavaScript required.
DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will automatically generate the userlist from the domain. BE VERY CAR…
Turn any PDF or image document into structured data for your AI. A powerful, lightweight OCR toolkit that bridges the gap between images/PDFs and LLMs. Supports 100+ languages.
LudusHound is a tool for red and blue teams that transforms BloodHound data into a fully functional, Active Directory replica environment via Ludus for controlled testing.
Flutter Mobile Application Reverse Engineering Tool
🕵️♂️ All-in-one OSINT tool for analysing any website
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
dnscrypt-proxy 2 - A flexible DNS proxy, with support for encrypted DNS protocols.
Dominate Active Directory with PowerShell.
rasta-mouse / ThreatCheck
Forked from matterpreter/DefenderCheckIdentifies the bytes that Microsoft Defender / AMSI Consumer flags on.
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)