Lists (1)
Sort Name ascending (A-Z)
Stars
🕷️ An adaptive Web Scraping framework that handles everything from a single request to a full-scale crawl!
A high-quality rapid TTS voice cloning model that reaches speeds of 150x realtime.
opinionated workflow on LLM driven development.
Sandboxed devcontainer for running Claude Code in bypass mode safely. Built for security audits and untrusted code review.
PoC Exploit for the NTLM reflection SMB flaw.
A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)
LLM Council works together to answer your hardest questions
Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By following this approach, a security researcher will hopefully…
Kimi K2 is the large language model series developed by Moonshot AI team
Lab research on Windows loader internals, PE loading, stack artifacts, and execution tradeoffs.
Code execution/injection technique using DLL PEB module structure manipulation
End-to-end, code-first tutorials for building production-grade GenAI agents. From prototype to enterprise deployment.
A modular, documentation-driven framework using Cursor custom modes (VAN, PLAN, CREATIVE, IMPLEMENT) to provide persistent memory and guide AI through a structured development workflow with visual …
Build Real-Time Knowledge Graphs for AI Agents
A list of python tools to help create an OPSEC-safe Cobalt Strike profile.
SOCKS5 proxy tool that uses Azure Storage services as a means of communication.
real time face swap and one-click video deepfake with only a single image
🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications
Chrome browser extension-based Command & Control
DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the default settings).
An extensible framework for easily writing compiler optimized position independent x86 / x64 shellcode for windows platforms.
Privilege Escalation Enumeration Script for Windows
A tool that shows detailed information about named pipes in Windows
A CobaltStrike toolkit to write files produced by Beacon to memory instead of disk
A light-weight first-stage C2 implant written in Nim (and Rust).