- USSR
Lists (28)
Sort Name ascending (A-Z)
AI&LLM&AGENTS&MCP
Android
Awesome
BlueTeam
C2
hahaCons
CVE
Desktop
*DR
etw-windows
IM
IOS
IOT
JAVA
Kernel Driver
Linux Kernel
LLVM
MACOS
OPS
Phone
Python
RedTeam
Rootkit & Bootkit
hhRouter
Rust
Shellcode
Tools
VM
Starred repositories
Async BOF that monitors USB device connect/disconnect events, reports device information and performs actions on connected USB storage volumes.
AI-powered interactive 3D model generation, inspection, and presentation studio.
A fully automated terminal-native AI shell built for security professionals.
The world's fastest Android/DEX decompiler meets radare2
Awesome Large Language Models for Vulnerability Detection
Dump DEX files from a running Android process without instrumentation
Awesome list of Search Engines for Cybersecurity Researchers
A tool to modify ELF binary headers, preventing GDB debugging while keeping the binary functional.
A proof-of-concept implementation emulating Linux-based trojan techniques
A simple PoC for executing shellcode inside a fiber, without requiring APIs such as 'CreateThread'.
A EDR bypassing shellcode loader framework for Windows 10 64bit, featuring ETW/AMSI patching, Tartarus Gate, process protection and more
A codex plugin for running optimization loops inside a codebase. It is useful when you have a measurable target and many possible changes to try: test runtime, build speed, bundle size, model loss,…
🛰️ A CLI tool for tracking token usage from OpenCode, Claude Code, 🦞OpenClaw (Clawdbot/Moltbot), Pi, Codex, Gemini, Cursor, AmpCode, Factory Droid, Kimi, and more! • 🏅Global Leaderboard + 2D/3D Con…
POC for CVE-2026-39816 which allows NiFi users without execute code permissions to run arbitrary scripts
Apache Tomcat Tribes EncryptInterceptor fail-open bypass, unauthenticated RCE PoC
A GPU-rendered terminal emulator with inline 3D graphics 🐀🧀
Windows SSH Misconfiguration Discovery Tool - Map lateral movement paths through misconfigured SSH services in Active Directory environments
fully autonomous credential intelligence platform that discovers, │ │ extracts, correlates, verifies, and reports exposed secrets across your │ │ target's entire attack surface.
Everything for pentest. | 渗透测试知识库,以 AI Agent 可执行的格式沉淀安全方法论。
Editorial Claude Code skill that removes generic model residue from drafts while preserving meaning, citations, code, and voice. Not a detector-evasion tool.