Lists (15)
Sort Name ascending (A-Z)
Stars
- All languages
- Assembly
- Batchfile
- C
- C#
- C++
- CMake
- CSS
- Dockerfile
- Go
- HCL
- HTML
- Haskell
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kotlin
- Lua
- MATLAB
- MDX
- Makefile
- Markdown
- OpenSCAD
- PHP
- Perl
- PowerShell
- Python
- Ruby
- Rust
- Scala
- Scheme
- Shell
- Smarty
- Svelte
- Swift
- SystemVerilog
- TeX
- TypeScript
- Verilog
- Vim Script
- YARA
- Zig
A tool for recompiling Xbox 360 games to native executables.
Async Web Server for ESP8266 and ESP32
Tutorials, examples, discussions, research proposals, and other resources related to fuzzing
Command the forces of The Project in a battle to rebuild the world after mankind has been nearly destroyed by nuclear missiles. A 100% free and open source real-time strategy game for Windows, macO…
An even funnier way to disable windows defender. (through WSC api)
This project aims to fix or address some issues in Grand Theft Auto IV: The Complete Edition
Lightweight inference library for ONNX files, written in C++. It can run Stable Diffusion XL 1.0 on a RPI Zero 2 (or in 298MB of RAM) but also Mistral 7B on desktops and servers. ARM, x86, WASM, RI…
USB Army Knife – the ultimate close access tool for penetration testers and red teamers.
A Flipper Zero clone, but cheapest, DIY and simply Open Source, made with Arduino IDE
OpenHantek6022 is a DSO software for Hantek USB digital signal oscilloscopes 6022BE / BL. Development OS is Debian Linux, but the program also works on FreeBSD, MacOS, RaspberryPi and Windows. No s…
This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation includes written tools, C2 servers, backdoors, exploitation tech…
A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.
An emulation based tool for learning and debugging assembly.
Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of encryption methods, including AES, XOR, DES, TLS, RC4, RSA …
CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as Administrator.
Leak of any user's NetNTLM hash. Fixed in KB5040434
Lightweight HTTP client with modern GUI for Linux
A playable version of Microsoft's old 3DMaze screensaver from Windows 9x
NES emulator written in C/C++ using pure WinAPI
APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files
RattaGATTa: Scalable Bluetooth Low-Energy Survey Using a pool of collectors to scan and connect to BTLE devices, shedding light on the intricacies of hardware, radio frequency challenges, and the i…
Companion code and schematics for my breadboard Z80 series