Skip to content
View ashr's full-sized avatar

Block or report ashr

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Safer python package installs with audit and consent 𝘣𝘦𝘧𝘰𝘳𝘦 install

Python 159 4 Updated Oct 27, 2025

Simple Python library/structure to ablate features in LLMs which are supported by TransformerLens

Python 620 82 Updated Jun 11, 2024

Passive leak enumeration tool.

Go 293 38 Updated Apr 7, 2026

AI Code Security Anti-Patterns distilled from 150+ sources to help LLMs generate safer code.

HTML 565 95 Updated Feb 24, 2026

Raptor turns Claude Code into a general-purpose AI offensive/defensive security agent. By using Claude.md and creating rules, sub-agents, and skills, and orchestrating security tool usage, we confi…

Python 1,857 261 Updated Apr 8, 2026

Impacket

Python 50 2 Updated Feb 25, 2026

SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connectivity using Windows Filtering Platform (WFP). This version fo…

C 447 66 Updated Nov 3, 2025

Proof-of-Concept tool for extracting NTLMv1 hashes from sessions on modern Windows systems.

C 651 61 Updated Oct 27, 2025

Windows protocol library, including SMB and RPC implementations, among others.

C# 709 71 Updated Mar 9, 2026

PowerHuntShares is an audit script designed in inventory, analyze, and report excessive privileges configured on Active Directory domains.

PowerShell 995 109 Updated Oct 15, 2025
C# 430 40 Updated Apr 22, 2025

A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such as Zoom.

Go 409 38 Updated Aug 18, 2025

Dynamic shellcode loader with sophisticated evasion capabilities

Assembly 289 50 Updated Oct 1, 2025

An even funnier way to disable windows defender. (through WSC api)

C++ 3,348 286 Updated Nov 23, 2025

A graph-based tool for visualizing effective access and resource relationships in AWS environments.

Python 1,001 106 Updated Oct 4, 2022

oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging.

Python 3,313 598 Updated Feb 14, 2026

List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.

Shell 9,428 1,578 Updated Oct 16, 2025

CloudMapper helps you analyze your Amazon Web Services (AWS) environments.

JavaScript 6,278 834 Updated Jul 15, 2024

Prowler is the world’s most widely used open-source cloud security platform that automates security and compliance across any cloud environment.

Python 13,530 2,076 Updated Apr 8, 2026

Azure Red Team tool for graphing Azure and Azure Active Directory objects

Python 1,696 208 Updated Jan 8, 2024

the LLM vulnerability scanner

HTML 7,496 864 Updated Apr 8, 2026

Official OWASP Top 10 Document Repository

HTML 5,475 1,049 Updated Apr 6, 2026

MaxMind's GeoIP2 GeoLite2 Country, City, and ASN databases

4,556 499 Updated Apr 7, 2026

Lua Cheatsheet for Logitech G Hub

207 15 Updated Mar 13, 2023

A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO

Python 243 16 Updated Aug 25, 2024

Credentials recovery project

Python 10,760 2,122 Updated Sep 18, 2025

Remotely Enumerate sessions using undocumented Windows Station APIs

C++ 117 11 Updated Aug 21, 2024

Ransomware leak site monitoring

Python 313 61 Updated Mar 7, 2022
Next