Lists (1)
Sort Name ascending (A-Z)
Starred repositories
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
A natural language interface for computers
We write your reusable computer vision tools. 💜
Automatic SQL injection and database takeover tool
A community-supported supercharged document management system: scan, index and archive all your documents
Impacket is a collection of Python classes for working with network protocols.
Llama中文社区,实时汇总最新Llama学习资料,构建最好的中文Llama大模型开源生态,完全开源可商用
Implementation of paper - YOLOv9: Learning What You Want to Learn Using Programmable Gradient Information
An open Apple AirDrop implementation written in Python
GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux
Neo-reGeorg is a project that seeks to aggressively refactor reGeorg
Tool for Active Directory Certificate Services enumeration and abuse
Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network
The FindMy Flipper app turns your FlipperZero into an AirTag or other tracking device, compatible with Apple AirTags and Samsung SmartTag and Tile Trackers. It uses the BLE beacon to broadcast, all…
BloodyAD is an Active Directory Privilege Escalation Framework
WEB安全手册(红队安全技能栈),漏洞理解,漏洞利用,代码审计和渗透测试总结。【持续更新】
Quark Agent - Your AI-powered Android APK Analyst
CVE-2023-38831 winrar exploit generator
Partial python implementation of SharpGPOAbuse
xmind\code\articles for my personal blog 个人博客上的资源备份存储,也是个人分享的汇总
An open source IoT Hacker Tool by using Raspberry Pi Zero 2 W
Library of ML-based attribution methods for ICS anomaly detection. From the NDSS 2024 paper: "Attributions for ML-based ICS anomaly detection: From theory to practice"