Lists (1)
Sort Name ascending (A-Z)
- All languages
- ActionScript
- Assembly
- AutoIt
- Awk
- Batchfile
- BlitzBasic
- Boo
- C
- C#
- C++
- CSS
- Clojure
- Common Lisp
- Cuda
- Dart
- Dockerfile
- Go
- HCL
- HTML
- Hack
- Haskell
- Inno Setup
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kotlin
- Lua
- Makefile
- Markdown
- Meson
- Nim
- OCaml
- Objective-C
- Open Policy Agent
- PHP
- Pascal
- Perl
- PostScript
- PowerShell
- Puppet
- Python
- QMake
- RPM Spec
- Rich Text Format
- Roff
- Ruby
- Rust
- SCSS
- SWIG
- Scala
- Shell
- Svelte
- Swift
- TSQL
- TeX
- TypeScript
- VBA
- VBScript
- Vim Script
- Visual Basic
- Visual Basic .NET
- Vue
- XSLT
- YAML
- YARA
- Zeek
- Zig
Starred repositories
Proof-of-Concept of the CVE-2025-9491 using invisible characters in the arguments of a Windows shortcut file (.lnk)
Colloid icon theme for linux desktops
Omarchy theme based on japanese culture.
Phantom Keylogger is an advanced, stealth-enabled keystroke and visual intelligence gathering system.
OneDrive, operating on Microsoft Windows 11 Pro is vulnerable to DLL hijacking.
Fabric is an open-source framework for augmenting humans using AI. It provides a modular system for solving specific problems using a crowdsourced set of AI prompts that can be used anywhere.
Thief-Cat is a versatile stealer built with Python, Node.js, and C# that boasts ultra-low detection rates. Its user interface is designed for clarity and ease of use, making it accessible for devel…
Chrome InfoStealer for apple silicon macOS that can retrieve cookie, credentials, and credit carddata. This tool works local only, so not illegal model.
Path traversal tool based on cve-2025-8088
a python PoC for the CVE-2019-15949
PoC Lab for CVE-2025-32421 – Next.js Race Condition Cache Poisoning Simulation
Tutorial of CVE-2022-37969 with focus on the methodology of Kernel exploitation, not CVE's internal causes
Invoke-ArgFuscator is an open-source, cross-platform PowerShell module that helps generate obfuscated command-lines for common system-native executables.
Argfuscator is a tool used to randomize and obfuscate PowerShell command-line arguments.
POC Highlighting Obfuscation Techniques used by FIN threat actors based on cmd.exe's replace functionality and cmd.exe/powershell.exe's stdin command invocation capabilities
Hands‑on analysis of CVE‑2025‑62215, a Windows Kernel race condition exploited in the wild. Demonstrates privilege escalation to SYSTEM, detection scripts, and patch validation strategies for enter…
Slip is a CLI tool to create malicious archive files containing path traversal payloads. It supports zip, tar, 7z and zip-like (jar, war, apk, ipa, ...) archives
script for generating a macro that can be embedded in an MS Office document to load the payload.
Python3 script to generate Office macros for the EvilOSX framework. Author: Cedric Owens
Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins privileges and WinRM enabled.
Black Obsidian is a next-generation C2 (Command & Control) server designed for professional Red Team operations. Built with Go and PocketBase, it offers a modern and specialized alternative to comp…
Extract passwords stored in Google Chrome browser & Microsoft edge
Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode
Retrieves exported functions from a legitimate DLL and generates a proxy DLL source code/template for DLL proxy loading or sideloading
A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.
A Proof-of-Concept using Cache Smuggling + Exif data to passively download a second stage payload
INE eCPPTv3 Cheat Sheet / Course Notes. You'll find my comprehensive course notes, which also serve as cheat sheets for the eCPPTv3 course. These are the exact materials I used during my exam.