Stars
📨 The ultimate social media scheduling tool, with a bunch of AI 🤖
🌟 The Multi-Agent Framework: First AI Software Company, Towards Natural Language Programming
Arduino code for a stereo VU meter with lots of patterns
Proof of Concept for the Apache commons-text vulnerability CVE-2022-42889.
Live Feed of C2 servers, tools, and botnets
Fast JavaScript parser for Python.
A fancy self-hosted monitoring tool
WSO2 RCE (CVE-2022-29464) exploit and writeup.
JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP Server, RMI Server and LDAP Server to exploit java web apps v…
A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object
A simple server for sending and receiving messages in real-time per WebSocket. (Includes a sleek web-ui)
A python module to update the console without flashing.
The aim of this Reposiotry is to Provide the Resoursces of Learning at one place For Bug Bounty Hunters.
Carve file metadata from NTFS index ($I30) attributes
List of Github repositories and articles with list of dorks for different search engines
Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, effectively adding "Shadow Credentials" to the target account.
PoC to demonstrate how CLR ETW events can be tampered.
An experimentation and research platform to investigate the interaction of automated agents in an abstract simulated network environments.
PoC memory injection detection agent based on ETW, for offensive and defensive research purposes
Repository of design files for Make the Mask and remixes
A Splunk app mapped to MITRE ATT&CK to guide your threat hunts
Automatically create YARA rules from malicious documents.
An index of Windows binaries, including download links for executables such as exe, dll and sys files