Lists (9)
Sort Name ascending (A-Z)
Stars
The Best Agent Harness. Meet Sisyphus: The Batteries-Included Agent that codes like you.
Powerful+Fast+Low Privilege Kubernetes discovery tools
A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted request…
Proxifier Alternative to redirect any Windows/MacOS TCP and UDP traffic to HTTP/Socks5 proxy
Context7 MCP Server -- Up-to-date code documentation for LLMs and AI code editors
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
Microsoft-Outlook-Remote-Code-Execution-Vulnerability
A patched QEMU that exposes an interface for LibAFL-based fuzzers
Advanced Fuzzing Library - Slot your Fuzzer together in Rust! Scales across cores and machines. For Windows, Android, MacOS, Linux, no_std, ...
CVE-2024-21413 | Microsoft Outlook Remote Code Execution Vulnerability PoC
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
📙 Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report
Unauthenticated Command Injection In Progress Kemp LoadMaster
/root/.ssh/authorized_keys evil file watchdog with ebpf tracepoint hook.
OUT OF DATE FORK of http://git.kernel.org/cgit/devel/pahole/pahole.git
Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".
Damn Vulenerable Kernel Module for kernel fuzzing
slides and papers from (or partly from) Bonan
collections of container escape techniques 🐿
A modern Objective-C class dump based on LIEF and LLVM.
KunLun-M是一个完全开源的静态白盒扫描工具,支持PHP、JavaScript的语义扫描,基础安全、组件安全扫描,Chrome Ext\Solidity的基础扫描。
Framework for Automating Fuzzable Target Discovery with Static Analysis.
ImageMagick is a free, open-source software suite for creating, editing, converting, and displaying images. It supports 200+ formats and offers powerful command-line tools and APIs for automation, …
The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power schedules, MOpt mutators, unicorn_mode, and a lot more!
文章 Attack Code 的详细全文。安全和开发总是具有伴生属性,尤其是云的安全方向,本篇文章是希望能帮助到读者的云安全入门材料。Full text of the article Attack Code. Security and development always have concomitant attributes, and this is especially true wit…
Collection of resources about Virtualization
Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router for Pwn2Own Austin 2021.