-
Crimson7
- Belgium
-
01:23
(UTC +02:00) - @nurfed1
- in/bryan-de-houwer
Stars
A repository for learning various heap exploitation techniques.
The best tool for finding one gadget RCE in libc.so.6
Collection of various malicious functionality to aid in malware development
A backup application for the Android Open Source Project.
AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses
Native API header files for the System Informer project.
A library for detecting known secrets across many web frameworks
Py-KMS-Organization / py-kms
Forked from SystemRage/py-kmsKMS Server Emulator written in Python
Extracted Yara rules from Windows Defender mpavbase and mpasbase
Just another Windows Process Injection
A PowerShell console in C/C++ with all the security features disabled
Lateral Movement Using DCOM and DLL Hijacking
A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.
Cobalt Strike BOF for evasive .NET assembly execution
PoC module to demonstrate automated lateral movement with the Havoc C2 framework.
Tool to generate ROP gadgets for ARM, AARCH64, x86, MIPS, PPC, RISCV, SH4 and SPARC
Cobalt Strike Beacon Object Files (BOFs) written in rust with rust core and alloc.
A repository to store Z3-python scripts you can use as examples, reminders, whatever.
A bunch of parsers for PE and PDB formats in C++
xforcered / SoaPy
Forked from logangoins/SOAPySoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.
ACME Proxy enhancing your existing Certificate Authority Infrastructure
Reverse engineering winapi function loadlibrary.
starsong-consulting / GhydraMCP
Forked from LaurieWired/GhidraMCPMulti-instance Ghidra plugin with HATEOAS REST API and MCP bridge for AI-assisted reverse engineering, binary analysis, and decompilation
Ratnet is a prototype anonymity network for mesh routing and embedded scenarios.