Skip to content
View nclv's full-sized avatar
🖥️
Focusing
🖥️
Focusing

Organizations

@Calypt

Block or report nclv

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Massive Mobile Security Framework

Python 302 45 Updated Apr 3, 2026

NTLM Relaying to generic web services with NTLM authentication

Python 69 2 Updated Mar 20, 2026

Tiny filesystem honeypot for macOS. Mounts fake secret files (.env, id_rsa, credentials.json) via WebDAV (no root) or NFS (root) — any access triggers an alert. Zero dependencies, pure Go stdlib.

Go 92 2 Updated Mar 27, 2026

Skills to transform AI Agents into GitOps Engineers

Shell 100 2 Updated Apr 8, 2026
C 114 11 Updated Apr 10, 2026

A Beacon Object File suite for Microsoft SQL Server that speaks TDS 7.4 on the wire itself

C 57 4 Updated Apr 9, 2026

Windfall - Unauthenticated RCE exploit chain for Windmill & Nextcloud Flow (CVE-2026-29059). Path traversal + credential leak + PostgreSQL heap dump + Nextcloud AppAPI takeover.

Ruby 12 2 Updated Apr 7, 2026

SSL pinning bypass setup for iOS (No Jailbreak) using OpenVPN + iptables traffic redirection to proxy (Burp Suite / mitmproxy)

Shell 319 37 Updated Mar 15, 2026

Polymorphic x64 shellcode loader — indirect syscalls, phantom DLL hollowing, call stack spoofing, patchless AMSI/ETW bypass, zero CRT dependency

C 15 5 Updated Mar 26, 2026

Impacket is a collection of Python classes for working with network protocols.

Python 6 1 Updated Mar 24, 2026

Okta Data Collector for BloodHound Community

C# 10 1 Updated Apr 9, 2026

Custom IPC Client and Proof of Concept exploit for CVE-2025-0309 (Netskope Windows Client LPE)

C# 4 3 Updated Aug 29, 2025

YubiKey plugin for age

Rust 870 44 Updated Apr 8, 2026
Python 472 13 Updated Mar 22, 2026

Deploys production-grade security controls for AWS accounts and Organizations using Terraform.

HCL 28 5 Updated Apr 7, 2026

Artifacts for the ACM CCS 2025 paper "Pixnapping: Bringing Pixel Stealing out of the Stone Age"

Java 92 3 Updated Apr 7, 2026

Nim implementation for sud0Ru's Credential Dumping from SAM/SECURITY Hives Method (a.k.a. SilentHarvest)

Nim 77 8 Updated Apr 4, 2026

Monitor the Windows Event Log with grep-like features or filtering for specific Event IDs

Python 93 4 Updated Mar 26, 2026

Busybox-style Beacon Object Files for *nix post-exploitation. Reimplements common Unix utilities as BOFs for use in stripped environments (Docker containers, Kubernetes pods, minimal VMs) where no …

C 43 4 Updated Apr 5, 2026

A pentesting tool for enumeration/download/graphical analysis of OCI content. Includes an OpenGraph generator for Bloodhound-style analysis.

Python 11 1 Updated Apr 10, 2026

API discovery tool that maps attack surfaces from captured traffic and generates specs for REST, GraphQL, SOAP, and WebSocket APIs

Go 63 1 Updated Apr 11, 2026

SilentChrome-BOF is a BOF (Beacon Object File) that silently installs a browser extension into Chrome or Edge by modifying the Preferences and Secure Preferences files directly.

C 24 1 Updated Apr 3, 2026

Cryptographic implementation conformance testing harness for ML-KEM and ML-DSA.

C 13 4 Updated Apr 10, 2026

Havoc C2 BOF — WFP kernel-space SYSTEM escalation + command execution with indirect syscalls, patchless AMSI/ETW bypass, and return address spoofing

C 64 5 Updated Mar 22, 2026

Analysis tool to assess (HW/SW) system security against fault-injection attacks

Python 15 Updated Apr 2, 2026

Mali GPU-assisted kernel exploitation

C++ 12 1 Updated Dec 15, 2025
Next