Skip to content
View nclv's full-sized avatar
🖥️
Focusing
🖥️
Focusing

Organizations

@Calypt

Block or report nclv

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

A Beacon Object File suite for Microsoft SQL Server that speaks TDS 7.4 on the wire itself

C 54 4 Updated Apr 9, 2026

Windfall - Unauthenticated RCE exploit chain for Windmill & Nextcloud Flow (CVE-2026-29059). Path traversal + credential leak + PostgreSQL heap dump + Nextcloud AppAPI takeover.

Ruby 12 2 Updated Apr 7, 2026

SSL pinning bypass setup for iOS (No Jailbreak) using OpenVPN + iptables traffic redirection to proxy (Burp Suite / mitmproxy)

Shell 317 35 Updated Mar 15, 2026

Polymorphic x64 shellcode loader — indirect syscalls, phantom DLL hollowing, call stack spoofing, patchless AMSI/ETW bypass, zero CRT dependency

C 14 5 Updated Mar 26, 2026

Impacket is a collection of Python classes for working with network protocols.

Python 6 1 Updated Mar 24, 2026

Okta Data Collector for BloodHound Community

C# 10 1 Updated Apr 9, 2026

Custom IPC Client and Proof of Concept exploit for CVE-2025-0309 (Netskope Windows Client LPE)

C# 4 3 Updated Aug 29, 2025

YubiKey plugin for age

Rust 869 44 Updated Apr 8, 2026
Python 471 13 Updated Mar 22, 2026

Deploys production-grade security controls for AWS accounts and Organizations using Terraform.

HCL 28 5 Updated Apr 7, 2026

Artifacts for the ACM CCS 2025 paper "Pixnapping: Bringing Pixel Stealing out of the Stone Age"

Java 92 3 Updated Apr 7, 2026

Nim implementation for sud0Ru's Credential Dumping from SAM/SECURITY Hives Method (a.k.a. SilentHarvest)

Nim 75 8 Updated Apr 4, 2026

Monitor the Windows Event Log with grep-like features or filtering for specific Event IDs

Python 92 4 Updated Mar 26, 2026

Busybox-style Beacon Object Files for *nix post-exploitation. Reimplements common Unix utilities as BOFs for use in stripped environments (Docker containers, Kubernetes pods, minimal VMs) where no …

C 43 4 Updated Apr 5, 2026

A pentesting tool for enumeration/download/graphical analysis of OCI content. Includes an OpenGraph generator for Bloodhound-style analysis.

Python 11 1 Updated Apr 9, 2026

API discovery tool that maps attack surfaces from captured traffic and generates specs for REST, GraphQL, SOAP, and WebSocket APIs

Go 57 1 Updated Apr 9, 2026

SilentChrome-BOF is a BOF (Beacon Object File) that silently installs a browser extension into Chrome or Edge by modifying the Preferences and Secure Preferences files directly.

C 23 1 Updated Apr 3, 2026

Cryptographic implementation conformance testing harness for ML-KEM and ML-DSA.

C 13 4 Updated Apr 5, 2026

Havoc C2 BOF — WFP kernel-space SYSTEM escalation + command execution with indirect syscalls, patchless AMSI/ETW bypass, and return address spoofing

C 63 5 Updated Mar 22, 2026

Analysis tool to assess (HW/SW) system security against fault-injection attacks

Python 15 Updated Apr 2, 2026

Mali GPU-assisted kernel exploitation

C++ 12 1 Updated Dec 15, 2025

Raptor turns Claude Code into a general-purpose AI offensive/defensive security agent. By using Claude.md and creating rules, sub-agents, and skills, and orchestrating security tool usage, we confi…

Python 1,889 272 Updated Apr 10, 2026

abusing windows toast notifications for fun and user manipulation

C 90 8 Updated Mar 20, 2026

Samsung S25 Vulnerability Research

Python 5 1 Updated Mar 20, 2026

The Leading Security Assessment Framework for Android.

Python 4,493 831 Updated Apr 8, 2026

CLI tool for inspecting and managing services listening on localhost ports

Go 912 25 Updated Apr 8, 2026
Python 10 1 Updated Mar 17, 2026
Next