Stars
BYOVD research use cases featuring vulnerable driver discovery and reverse engineering methodology. (CVE-2025-52915, CVE-2025-1055,).
enject: Hide .env secrets from prAIng eyes: secrets live in local encrypted stores (per project) and are injected directly into apps at runtime, never touching disk as plaintext.
This repository is an overview of what resources you need in cybersecurity which we called infosec and a collection of hacking tools, resources and references to practice ethical hacking it helps y…
The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Office 365 environment. Each step is intended to guide the pro…
Harden Windows Safely, Securely using Official Supported Microsoft methods and proper explanation | Always up-to-date and works with the latest build of Windows | Provides tools and Guides for Pers…
List of free GPTs that doesn't require plus subscription
Surreptitiously exfiltrate data from the browser over DNS
16-bit Windows (Windows 1.x, 2.x, 3.0, 3.1, etc.) on 64-bit Windows
A proof of concept demonstrating instrumentation callbacks on Windows 10 21h1 with a TLS variable to ensure all syscalls are caught.
A GUI and CLI tool for removing bloat from executables
Programs generated by ChatGPT
EXOCET - AV-evading, undetectable, payload delivery tool
Small and highly portable detection tests based on MITRE's ATT&CK.
Open-Audio TTS: A robust web app leveraging OpenAI's powerful Text-to-Speech (TTS) models to generate natural-sounding audio from text. Built with modern web technologies for an intuitive user expe…
docTR (Document Text Recognition) - a seamless, high-performing & accessible library for OCR-related tasks powered by Deep Learning.
Course to get into Large Language Models (LLMs) with roadmaps and Colab notebooks.
Dashboard for conducting Backdoors and Breaches sessions over Zoom.
Stealing Signatures and Making One Invalid Signature at a Time
Metadata hash incorporating the Rich Header for robustness against packing and other malware tricks
Source code for the X Recommendation Algorithm