Stars
- All languages
- ASP.NET
- Assembly
- AutoIt
- Batchfile
- BlitzBasic
- C
- C#
- C++
- CSS
- Classic ASP
- Clojure
- CodeQL
- CoffeeScript
- Cycript
- Dockerfile
- Go
- HTML
- Hack
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- Less
- Logos
- Lua
- Makefile
- Markdown
- Meson
- Nim
- Objective-C
- PHP
- Pascal
- Perl
- PowerShell
- Python
- QML
- Rich Text Format
- Roff
- Ruby
- Rust
- Shell
- Smarty
- Solidity
- Svelte
- Swift
- TypeScript
- VBScript
- Visual Basic .NET
- Vue
- XSLT
- YARA
SQL powered operating system instrumentation, monitoring, and analytics.
Free and Open Source Reverse Engineering Platform powered by rizin
Wechat Chat History Exporter 微信聊天记录导出备份程序
BlackDex is an Android unpack(dexdump) tool, it supports Android 5.0~12 and need not rely to any environment. BlackDex can run on any Android mobile phone or emulator, you can unpack APK File in se…
ffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Skin changer for League of Legends (LOL)
Portable Executable reversing tool with a friendly GUI
Nidhogg is an all-in-one simple to use windows kernel rootkit.
Collection of various malicious functionality to aid in malware development
Alternative Shellcode Execution Via Callbacks
Hide your Powershell script in plain sight. Bypass all Powershell security features
Socks5/4/4a Proxy support for Remote Desktop Protocol / Terminal Services / Citrix / XenApp / XenDesktop
Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts.
An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting its contents
Extracts passwords from a KeePass 2.x database, directly from memory.
Win32 and Kernel abusing techniques for pentesters
A Software Probe for network packet capturing and forwarding in Cloud/Kubernetes and Virtualized environment.
Very vulnerable ARM/AARCH64 application (CTF style exploitation tutorial with 14 vulnerability techniques)
Run a Exe File (PE Module) in memory (like an Application Loader)