Lists (12)
Sort Name ascending (A-Z)
ai统治世界
ai应用网络安全attackapp安全
root隐藏、frida、脱壳、加解密...c2
有新沙箱已上线云原生安全
免杀
各类语言加载器、模板化、dll加载、沙箱bypass、代码混淆、exe转shellcode.....其他
杂七杂八凭证数据
获取浏览器数据、lsass凭证、微信数据库等...后渗透
内网综合扫描、提权、权限维持、AD域等...Stars
Modify machine code in binaries with alternative x64 assembly opcodes for AV evasion
A Cobalt Strike Beacon Object File that exploits the BlueHammer vulnerability that to obtain a copy of the SAM database.
High-performance secrets scanner. CLI, Go library, Burp Suite extension, and Chrome extension. 487 detection rules with live credential validation.
Find zero-days while you sleep. DeepZero is an automated vulnerability research framework that parses, decompiles, and analyzes thousands of Windows kernel drivers for exploitable IOCTLs natively u…
Syscall BOF to arbitrarily add/detract process token privilege rights.
EDR & AV Bypass Arsenal— a comprehensive collection of tools, patches, and techniques for evading modern EDR and antivirus defenses.
Advanced shellcode loader with AES-256, EDR/AMSI/ETW bypass, indirect syscalls, evasion, early-bird APC injection and PPID spoofing.
Modified versions of the Cobalt Strike Process Injection Kit
A Cobalt Strike BOF implementation of the SilentHarvest registry dumping technique
BOF for Havoc that copies locked Windows files (SAM, SYSTEM, NTDS.dit) via raw MFT parsing — no VSS, no Registry APIs, no PowerShell
Robust Cobalt Strike shellcode loader with multiple advanced evasion features
Offensive security toolkit for Claude Code
An example UDC2 implementation for CrystalC2.
abusing windows toast notifications for fun and user manipulation
A BOF to interact with COM objects associated with the Windows software firewall.
Claude Code plugin for Java JAR security audit — 基于 jar-analyzer 的 Claude Code 安全审计插件,构建数据库,AI 深入分析
Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from silent in-process BOF to full PowerShell/WMI.