Lists (29)
Sort Name ascending (A-Z)
AI
app
burp插件
bypassAV
cs插件
FOFA
javasec
javastudy
secMCP
POC&EXP
proxy
scan
资产扫描secnote
tools
ui
云渗透
代码审计
取证
后渗透工具
域
学习资料
安卓
应急响应
提权
有意思的项目
权限维持
科学上网
解密
钓鱼
Stars
Java bytecode analysis engine built on ASM, extracts method call graphs, inheritance trees, Spring routes, and string constants from JAR/WAR into SQLite. AI-friendly output for security auditing.
Web Fuzzing Box - Web 模糊测试字典与一些Payloads
45 tips for getting the most out of Claude Code, from basics to advanced - includes a custom status line script, cutting the system prompt in half, using Gemini CLI as Claude Code's minion, and Cla…
Malformed ZIP archive that evades antivirus detection by declaring Method=0 (stored) while containing DEFLATE-compressed payload.
x64DbgMCPServer made from c# with Claude, Windsurf and Cursor support
AV/EDR evasion via direct and indirect system calls Windows NT 3.1 through Windows 11 24H2 · x64 · x86 · WoW64 · ARM64
PoC Implementation of a fully dynamic call stack spoofer
Shannon Lite is an autonomous, white-box AI pentester for web applications and APIs. It analyzes your source code, identifies attack vectors, and executes real exploits to prove vulnerabilities bef…
π RuView: WiFi DensePose turns commodity WiFi signals into real-time human pose estimation, vital sign monitoring, and presence detection — all without a single pixel of video.
Dominate the domain. Relay to royalty.
Java debugging for LLMs via JDWP and Model Context Protocol
Generate DLL proxy/sideload projects. Automatically parses PE export tables and generates ready-to-compile project for red team engagements.
Obfusk8: lightweight Obfuscation library based on C++17 / Header Only for windows binaries
Raptor turns Claude Code into a general-purpose AI offensive/defensive security agent. By using Claude.md and creating rules, sub-agents, and skills, and orchestrating security tool usage, we confi…
GitNexus: The Zero-Server Code Intelligence Engine - GitNexus is a client-side knowledge graph creator that runs entirely in your browser. Drop in a GitHub repo or ZIP file, and get an interactive …
A high-speed covert tunnel that disguises TCP traffic as SMTP email communication to bypass Deep Packet Inspection (DPI) firewalls.
A collection of my Semgrep rules to facilitate vulnerability research.
Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass
MCP server for JVM debugging using Java Debug Interface (JDI)