Lists (12)
Sort Name ascending (A-Z)
Blockchain
CVE-Collections
Collecting CVE repo of researchersCybersec Certification
💻 💻 💻 💻 💻 💻 💻 💻 💻 💻🖥 Cybersecurity
Generative Transformator
IndoXXi Company
LearnMacos
Malvares
Detonate'em all!- All languages
- AGS Script
- Assembly
- Astro
- AutoIt
- Batchfile
- C
- C#
- C++
- CSS
- Dart
- Dockerfile
- EJS
- Go
- Groff
- HCL
- HTML
- Hack
- Inno Setup
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- MDX
- Makefile
- Markdown
- Nim
- Objective-C
- PHP
- Pascal
- PowerShell
- Python
- REXX
- Rich Text Format
- Roff
- Ruby
- Rust
- SCSS
- Shell
- Solidity
- Svelte
- Swift
- TypeScript
- VBScript
- Verilog
- Vue
- XSLT
- YAML
- YARA
- Zig
Starred repositories
GPT4All: Run Local LLMs on Any Device. Open-source and available for commercial use.
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
A personal experimental C++ Syntax 2 -> Syntax 1 compiler
Modern VNC Server and client, web based and secure
Portable Executable reversing tool with a friendly GUI
An even funnier way to disable windows defender. (through WSC api)
Collection of various malicious functionality to aid in malware development
Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing offensive toolkits.
IDA Pro plugin with a rich set of features: decryption, deobfuscation, patching, lib code recognition and various pseudocode transformations
Repository for materials of "Modern fuzzing of C/C++ Projects" workshop.
⚡ Worlds fastest steghide cracker, chewing through millions of passwords per second ⚡
A tool to unpack installers created by Inno Setup
UAC bypass for x64 Windows 7 - 11
A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.
This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation includes written tools, C2 servers, backdoors, exploitation tech…
Kernel exploit for Xbox SystemOS using CVE-2024-30088
Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of encryption methods, including AES, XOR, DES, TLS, RC4, RSA …
DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely
Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime