Starred repositories
SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.
An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for vulnerabilities.
Automated script to convert and push Burp Suite certificate in Android, and modify Android's IP table to redirect all traffic to Burp Suite.
The official gpt4free repository | various collection of powerful language models | o4, o3 and deepseek r1, gpt-4.1, gemini 2.5
This Burp Suite extension allows for the automatic creation and deletion of an upstream SOCKS5 proxy on popular cloud services.
Subdomains analysis and generation tool. Reveal the hidden!
linWinPwn is a bash script that streamlines the use of a number of Active Directory tools
Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found
Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and share th…
An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws
DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.
awesome game security [Welcome to PR]
A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file formats. Supports: ZIP, 7zip, PDF, ISO, IMG, CAB, VHD, VHDX
The LLVM Project is a collection of modular and reusable compiler and toolchain technologies.
⚡ A Captive Portal & Access Point setup for use with the Raspberry Pi (no Internet access)
A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.
Lockbit3.0 Microsoft Defender MpClient.dll DLL Hijacking PoC
A small tool to patch PE files' import address table with an external payload DLL.
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.
A Nim implementation of reflective PE-Loading from memory
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Rule-based MITM engine. Rewriting, redirecting and rejecting on HTTP(S) requests and responses, supports JavaScript rule.
An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting its contents
UnhookMe is an universal Windows API resolver & unhooker addressing problem of invoking unmonitored system calls from within of your Red Teams malware
Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts.
HTTP based framework for building command and control components for remote access trojans
Template-Driven AV/EDR Evasion Framework