Lists (1)
Sort Name ascending (A-Z)
- All languages
- ASP
- Assembly
- Batchfile
- BlitzBasic
- Boo
- C
- C#
- C++
- CSS
- Crystal
- Dockerfile
- Erlang
- F#
- Game Maker Language
- Go
- Groovy
- HCL
- HTML
- Hack
- Haskell
- Inno Setup
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- Lua
- Meson
- Nim
- Objective-C
- PHP
- Pascal
- Perl
- PowerShell
- Python
- Ruby
- Rust
- Shell
- Smali
- Swift
- TypeScript
- Visual Basic
- Vue
- YARA
- Zig
Starred repositories
Compatibility tool for Steam Play based on Wine and additional components
Vulkan-based implementation of D3D8, 9, 10 and 11 for Linux / Wine
Anbox is a container-based approach to boot a full Android system on a regular GNU/Linux system
Mumble is an open-source, low-latency, high quality voice chat software.
Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.
Tutorials, examples, discussions, research proposals, and other resources related to fuzzing
The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file system data. The library can be incorporated into larger digi…
A Firefox extension that demonstrates HTTP session hijacking attacks.
Github mirror of official Kismet repository
Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing offensive toolkits.
Extracting Clear Text Passwords from mstsc.exe using API Hooking.
Obfuscate specific windows apis with different apis
UAC bypass for x64 Windows 7 - 11
Enumerate and disable common sources of telemetry used by AV/EDR.
Adaptive DLL hijacking / dynamic export forwarding
A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.
Support ALL Windows Version
HWSyscalls is a new method to execute indirect syscalls using HWBP, HalosGate and a synthetic trampoline on kernel32 with HWBP.
A small POC to make defender useless by removing its token privileges and lowering the token integrity
Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advanced techniques to dump memory, allowing to access sensitive da…
A tool for automated MITM attacks on SSL connections.
A native backdoor module for Microsoft IIS (Internet Information Services)