Skip to content
View phra's full-sized avatar
💻
root@localhost ~#
💻
root@localhost ~#

Organizations

@pugbo @BolognaJS @BolognaTechScene @preboot @pinojs @iftxt @d0nkeys

Block or report phra

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

A complete AI agency at your fingertips - From frontend wizards to Reddit community ninjas, from whimsy injectors to reality checkers. Each agent is a specialized expert with personality, processes…

Shell 59,373 8,877 Updated Mar 15, 2026

Stealthy Linux Kernel Rootkit for modern kernels (6x)

C 1,537 171 Updated Mar 19, 2026

Anti-Rootkit/Anti-Cheat Driver to uncover unbacked or hidden kernel code.

C++ 307 36 Updated Mar 12, 2026

An orchestrated sub agent dev team powered by claude code

4,074 477 Updated Oct 30, 2025

Because AV evasion should be easy.

Go 860 82 Updated Nov 28, 2024

Qrisp - The next generation of quantum algorithm development

Python 235 60 Updated Mar 21, 2026

A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file formats. Supports: ZIP, 7zip, PDF, ISO, IMG, CAB, VHD, VHDX

Python 1,117 165 Updated Jun 10, 2024

Continuous password spraying tool

Python 204 19 Updated Mar 12, 2026

GHOSTS is a realistic user simulation framework for cyber experimentation, simulation, training, and exercise

C# 674 86 Updated Mar 22, 2026

Misconfiguration Manager is a central knowledge base for all known Microsoft Configuration Manager tradecraft and associated defensive and hardening guidance.

PowerShell 1,109 114 Updated Mar 16, 2026

The modern API client that lives in your terminal.

Python 11,596 226 Updated Oct 14, 2025

Contains all the applications developed for the Second part of the 7th Edition of Windows Internals book

119 10 Updated Jun 30, 2024

the LLM vulnerability scanner

HTML 7,327 838 Updated Mar 22, 2026

Learn about a type of vulnerability that specifically targets machine learning models

440 62 Updated Mar 16, 2026

A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfvenom) by performing on-the-fly decryption of individual encry…

C++ 592 84 Updated Jun 12, 2024

AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE ATT&CK framework. The tool generates tailored incident resp…

Python 1,208 162 Updated Dec 29, 2025

🌐 The Internet Computer! Free, Open-Source, and Self-Hostable.

JavaScript 40,020 3,556 Updated Mar 22, 2026

An offensive data enrichment pipeline

Python 944 98 Updated Mar 19, 2026

RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust

Rust 1,844 209 Updated Dec 29, 2025

Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.

C++ 6,884 1,259 Updated Mar 1, 2026

evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)

Pascal 1,502 241 Updated Dec 21, 2023

A modern 32/64-bit position independent implant template

C 1,307 214 Updated Mar 21, 2025

Simulate the behavior of AV/EDR for malware development training.

C 565 49 Updated Feb 15, 2024

Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀

Rust 3,344 214 Updated Mar 4, 2026

Implement a ChatGPT-like LLM in PyTorch from scratch, step by step

Jupyter Notebook 89,000 13,588 Updated Mar 21, 2026

Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in Windows environments.

C# 515 63 Updated Aug 7, 2024

A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server.

C 1,831 238 Updated Nov 3, 2024
C++ 164 33 Updated Dec 30, 2022
Next