Skip to content
View ashr's full-sized avatar

Block or report ashr

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Safer python package installs with audit and consent 𝘣𝘦𝘧𝘰𝘳𝘦 install

Python 160 4 Updated Oct 27, 2025

Simple Python library/structure to ablate features in LLMs which are supported by TransformerLens

Python 633 86 Updated Jun 11, 2024

Passive leak enumeration tool.

Go 301 39 Updated Apr 28, 2026

AI Code Security Anti-Patterns distilled from 150+ sources to help LLMs generate safer code.

HTML 574 95 Updated Feb 24, 2026

Raptor turns Claude Code into a general-purpose AI offensive/defensive security agent. By using Claude.md and creating rules, sub-agents, and skills, and orchestrating security tool usage, we confi…

Python 2,385 367 Updated Apr 28, 2026

Impacket

Python 50 2 Updated Feb 25, 2026

SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connectivity using Windows Filtering Platform (WFP). This version fo…

C 453 66 Updated Nov 3, 2025

Proof-of-Concept tool for extracting NTLMv1 hashes from sessions on modern Windows systems.

C 669 63 Updated Oct 27, 2025

Windows protocol library, including SMB and RPC implementations, among others.

C# 772 74 Updated Apr 14, 2026

PowerHuntShares is an audit script designed in inventory, analyze, and report excessive privileges configured on Active Directory domains.

PowerShell 1,009 109 Updated Oct 15, 2025
C# 430 40 Updated Apr 22, 2025

A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such as Zoom.

Go 415 38 Updated Aug 18, 2025

Dynamic shellcode loader with sophisticated evasion capabilities

Assembly 291 52 Updated Oct 1, 2025

An even funnier way to disable windows defender. (through WSC api)

C++ 3,404 290 Updated Nov 23, 2025

A graph-based tool for visualizing effective access and resource relationships in AWS environments.

Python 1,004 107 Updated Oct 4, 2022

oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging.

Python 3,325 601 Updated Feb 14, 2026

List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.

Shell 9,438 1,576 Updated Apr 17, 2026

CloudMapper helps you analyze your Amazon Web Services (AWS) environments.

JavaScript 6,279 833 Updated Jul 15, 2024

Prowler is the world’s most widely used open-source cloud security platform that automates security and compliance across any cloud environment.

Python 13,696 2,111 Updated Apr 29, 2026

Azure Red Team tool for graphing Azure and Azure Active Directory objects

Python 1,701 208 Updated Jan 8, 2024

the LLM vulnerability scanner

Python 7,682 906 Updated Apr 28, 2026

Official OWASP Top 10 Document Repository

HTML 5,577 1,063 Updated Apr 6, 2026

MaxMind's GeoIP2 GeoLite2 Country, City, and ASN databases

4,688 509 Updated Apr 28, 2026

Lua Cheatsheet for Logitech G Hub

208 15 Updated Mar 13, 2023

A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO

Python 242 16 Updated Aug 25, 2024

Credentials recovery project

Python 10,798 2,113 Updated Sep 18, 2025

Remotely Enumerate sessions using undocumented Windows Station APIs

C++ 117 12 Updated Aug 21, 2024

Ransomware leak site monitoring

Python 313 61 Updated Mar 7, 2022
Next