Lists (29)
Sort Name ascending (A-Z)
AI & LLM
APT
Asset Discovery
Backdoor & Rookit
Brute Force
C2
Cloud Security
Code Audit
Coding
Defense Evasion
Detection & Response
Discovery & Collection
Domain
Forensic Analysis
ICS & IOT
Infrastructure
Lateral Movement
Misc & Note
OSINT
Persistence
Pishing
Post Exploitation
Privilege Escalation
Proxy & Pivot
Reverse Engineering
Shell
Vulnerability
Web Security
Wireless
Stars
Comfortably monitor your Internet traffic 🕵️♂️
什么?你敢放心的把后背交给 AI? 我赌你不敢,那就来学学 AI 时代最安全的语言吧(Python无法战胜!)。本书拥有全面且深入的讲解、生动贴切的示例、德芙般丝滑的内容,这可能是目前最用心的 Rust 中文学习教程 / Book
screenpipe turns your computer into a personal AI that knows everything you've done. record. search. automate. all local, all private, all yours.
⬛️ CLI tool and library for saving complete web pages as a single HTML file
🦀 How to minimize Rust binary size 📦 https://github.com/johnthagen/min-sized-rust
Check if an email address exists without sending any email, written in Rust. Comes with a ⚙️ HTTP backend.
“Zero setup” cross compilation and “cross testing” of Rust crates
A fast, simple, recursive content discovery tool written in Rust.
Tunnel all your traffic over Websocket or HTTP2 - Bypass firewalls/DPI - Static binary available
Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Rust Weaponization for Red Team Engagements.
A Rust compiler backend targeting CIL(.NET IR) and C.
一款体积小, 快速, 稳定, 高效, 轻量的内网穿透, 端口转发工具 支持多连接,级联代理,传输加密 (A small volume, fast, stable, efficient, and lightweight intranet penetration, port forwarding tool supports multiple connections, cascading prox…
RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust
The fastest and more comprehensive multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷
Declarative binary reading and writing: bit-level, symmetric, serialization/deserialization
Hermit launches linux x86_64 programs in a special, hermetically isolated sandbox to control their execution. Hermit translates normal, nondeterministic behavior, into deterministic, repeatable beh…
Tunnel (TUN) interface for SOCKS and HTTP proxies
FaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loading
Mythic C2 agent targeting Linux and Windows hosts written in Rust
LSASS memory dumper using only NTAPIs, creating a minimal minidump. It can be compiled as shellcode (PIC), supports XOR encryption, and remote file transmission.