Stars
- All languages
- ASP.NET
- Assembly
- AutoIt
- Batchfile
- BlitzBasic
- C
- C#
- C++
- CSS
- Classic ASP
- Clojure
- CodeQL
- CoffeeScript
- Cycript
- Dockerfile
- Go
- HTML
- Hack
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- Less
- Logos
- Lua
- Makefile
- Markdown
- Meson
- Nim
- Objective-C
- PHP
- Pascal
- Perl
- PowerShell
- Python
- QML
- Rich Text Format
- Roff
- Ruby
- Rust
- Shell
- Smarty
- Solidity
- Svelte
- Swift
- TypeScript
- VBScript
- Visual Basic .NET
- Vue
- XSLT
- YARA
A command line tool and library for transferring data with URL syntax, supporting DICT, FILE, FTP, FTPS, GOPHER, GOPHERS, HTTP, HTTPS, IMAP, IMAPS, LDAP, LDAPS, MQTT, POP3, POP3S, RTMP, RTMPS, RTSP…
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
World's fastest and most advanced password recovery utility
A little tool to play with Windows security
A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware. Brought to you by Winsider Seminars & Solutions, Inc. @ http://www.windows-internals…
A local DNS server to obtain the fastest website IP for the best Internet experience, support DoT, DoH, DoQ. 一个本地DNS服务器,获取最快的网站IP,获得最佳上网体验,支持DoH,DoT,DoQ。
windows-kernel-exploits Windows平台提权漏洞集合
A network filesystem client to connect to SSH servers
linux-kernel-exploits Linux平台提权漏洞集合
A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC/RFID) readers. It can disable Chip&PIN and predict AMEX car…
A tool to dump the login password from the current linux user
A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)
🌴Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file (提权漏洞合集)
A Linux version of the ProcDump Sysinternals tool
A flexible tool for redirecting a given program's TCP traffic to SOCKS5 or HTTP proxy.
Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.
A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.