Skip to content
View ashr's full-sized avatar

Block or report ashr

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Safer python package installs with audit and consent 𝘣𝘦𝘧𝘰𝘳𝘦 install

Python 159 4 Updated Oct 27, 2025

Simple Python library/structure to ablate features in LLMs which are supported by TransformerLens

Python 617 82 Updated Jun 11, 2024

Passive leak enumeration tool.

Go 286 37 Updated Apr 3, 2026

AI Code Security Anti-Patterns distilled from 150+ sources to help LLMs generate safer code.

HTML 562 94 Updated Feb 24, 2026

Raptor turns Claude Code into a general-purpose AI offensive/defensive security agent. By using Claude.md and creating rules, sub-agents, and skills, and orchestrating security tool usage, we confi…

Python 1,772 252 Updated Apr 4, 2026

Impacket

Python 50 2 Updated Feb 25, 2026

SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connectivity using Windows Filtering Platform (WFP). This version fo…

C 447 66 Updated Nov 3, 2025

Proof-of-Concept tool for extracting NTLMv1 hashes from sessions on modern Windows systems.

C 649 61 Updated Oct 27, 2025

Windows protocol library, including SMB and RPC implementations, among others.

C# 705 71 Updated Mar 9, 2026

PowerHuntShares is an audit script designed in inventory, analyze, and report excessive privileges configured on Active Directory domains.

PowerShell 990 109 Updated Oct 15, 2025
C# 430 40 Updated Apr 22, 2025

A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such as Zoom.

Go 407 38 Updated Aug 18, 2025

Dynamic shellcode loader with sophisticated evasion capabilities

Assembly 288 50 Updated Oct 1, 2025

An even funnier way to disable windows defender. (through WSC api)

C++ 3,338 286 Updated Nov 23, 2025

A graph-based tool for visualizing effective access and resource relationships in AWS environments.

Python 1,000 106 Updated Oct 4, 2022

oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging.

Python 3,310 598 Updated Feb 14, 2026

List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.

Shell 9,425 1,579 Updated Oct 16, 2025

CloudMapper helps you analyze your Amazon Web Services (AWS) environments.

JavaScript 6,275 835 Updated Jul 15, 2024

Prowler is the world’s most widely used open-source cloud security platform that automates security and compliance across any cloud environment.

Python 13,501 2,069 Updated Apr 2, 2026

Azure Red Team tool for graphing Azure and Azure Active Directory objects

Python 1,695 207 Updated Jan 8, 2024

the LLM vulnerability scanner

HTML 7,454 856 Updated Apr 4, 2026

Official OWASP Top 10 Document Repository

HTML 5,461 1,046 Updated Mar 9, 2026

MaxMind's GeoIP2 GeoLite2 Country, City, and ASN databases

4,539 495 Updated Apr 4, 2026

Lua Cheatsheet for Logitech G Hub

207 15 Updated Mar 13, 2023

A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO

Python 242 16 Updated Aug 25, 2024

Credentials recovery project

Python 10,749 2,121 Updated Sep 18, 2025

Remotely Enumerate sessions using undocumented Windows Station APIs

C++ 117 11 Updated Aug 21, 2024

Ransomware leak site monitoring

Python 312 61 Updated Mar 7, 2022
Next