-
Tencent Xuanwu Lab
- Shanghai, CHINA
-
06:02
(UTC +08:00) - blog.sndav.org
- @SndavBai
Highlights
- Pro
Lists (14)
Sort Name ascending (A-Z)
Stars
- All languages
- Assembly
- Batchfile
- C
- C#
- C++
- CMake
- CSS
- CoffeeScript
- Dart
- Dockerfile
- FreeMarker
- Go
- HTML
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kotlin
- LLVM
- Logos
- Lua
- MATLAB
- Makefile
- Max
- Meson
- Move
- Nim
- Objective-C
- PHP
- Pascal
- Perl
- PowerShell
- Python
- Ruby
- Rust
- Scala
- Shell
- Solidity
- Svelte
- Swift
- TeX
- TypeScript
- Typst
- V
- VBScript
- Verilog
- Vim Script
- Visual Basic .NET
- Vue
- WebAssembly
- YARA
- Zig
D2X | Modern C++ Core Language Features - "A C++ tutorial project focused on practical"
Obfuscation library based on C++20 and metaprogramming
The official collection of Windhawk mods
shellcode transformation tool for YARA evasion
rep+ — Burp-style HTTP Repeater for Chrome DevTools with built‑in AI to explain requests and suggest attacks
A simple tool helps CTFpwner deal with protobuf ELF, reverses proto structure and generates ".proto" files.
C++ self-Injecting dropper based on various EDR evasion techniques.
Linux Process Injection via Seccomp Notifier
PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.
small example of logging all user logons using async beacon object files
veo / sgn
Forked from EgeBalci/sgnShikata ga nai (仕方がない) encoder ported into go with several improvements
Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS
🚀2.3x faster than MinIO for 4KB object payloads. RustFS is an open-source, S3-compatible high-performance object storage system supporting migration and coexistence with other S3-compatible platfor…
Usermode exploit to bypass any AC using a 0day shatter attack.
Load self-signed drivers without TestSigning or disable DSE. Transferred from https://github.com/DoubleLabyrinth/Windows10-CustomKernelSigners
UAC Bypass using UIAccess program QuickAssist
A PoC demonstrating how to bypass Chrome v20+ appbound encryption to extract HTTP-only and secure cookies using Chrome's Remote Debugging Protocol, without admin rights.
Universal modifier for Chromium/V8 | 广谱注入 Chromium/V8 的通用修改器
Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0day vulnerability in machines of many vendors
a BOF implementation of various registry persistence methods