Stars
A theoretical reconstruction of the Claude Mythos architecture, built from first principles using the available research literature.
754 structured cybersecurity skills for AI agents · Mapped to 5 frameworks: MITRE ATT&CK, NIST CSF 2.0, MITRE ATLAS, D3FEND & NIST AI RMF · agentskills.io standard · Works with Claude Code, GitHub …
The recursive internet scanner for hackers. 🧡
An implementation of PyADRecon using ADWS instead of LDAP. Generates individual CSV files and a single XSLX + HTML report about your AD domain. Evades EDR detections through ADWS.
Moonwalk++: Simple POC Combining StackMoonwalking and Memory Encryption
NetworkSherlock: powerful and flexible port scanning tool With Shodan
A comprehensive ETW (Event Tracing for Windows) event generation tool designed for testing and research purposes.
A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.
A fast reverse proxy to help you expose a local server behind a NAT or firewall to the internet.
This repo contains some Amsi Bypass methods i found on different Blog Posts.
Encrypted shellcode Injection to avoid Kernel triggered memory scans
SysWhispers on Steroids - AV/EDR evasion via direct system calls.
IngressNightmare POC. world first non-blind remote execution exploitation with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - …
Awesome EDR Bypass Resources For Ethical Hacking
Python API wrapper for DarkSearch (darksearch.io).
Active Directory and Internal Pentest Cheatsheets
Identify privilege escalation paths within and across different clouds