Lists (2)
Sort Name ascending (A-Z)
Stars
A collection of malware families and malware samples which use the Rust programming language.
Pike is a tool for determining the permissions or policy required for IAC code
Modern web-based distributed hashcracking solution, built on hashcat
Indirect-Shellcode-Executor expoits the miss-configuration/vulnerability present on the API Windows method ReadProcessMemory discovered by DarkCoderSc. It exploits the nature of the in/out pointer …
All the deals for InfoSec related software/tools this Black Friday
Malicious Unicode Private Use Area (PUA) obfuscation detector
A .NET assembly tracer using Harmony for runtime method interception.
Cloud Offensive Breach and Risk Assessment (COBRA) Tool
This is the repository for indicators of compromise (IOCs) and other data for threat intelligence articles posted on the Palo Alto Networks Unit 42 website.
Repo of Customized/sharable dashboards for the Cortex platform
A PICO for Crystal Palace that implements CLR hosting to execute a .NET assembly in memory.
Tokenex is a Go library that securely exchanges identity tokens for temporary cloud credentials, with built-in support for AWS, GCP, Azure, OCI, Kubernetes, and OAuth2.
A powerful and user-friendly binary analysis platform!
GHOSTS is a realistic user simulation framework for cyber experimentation, simulation, training, and exercise
Security hardening guides for PVE and PBS, built on CIS Debian Benchmark with Proxmox specific best practices.
dmchell / titanldr-ng
Forked from klezVirus/titanldr-ngA newer iteration of TitanLdr with some newer hooks, and design. A generic user defined reflective DLL I built to prove a point to Mudge years ago.
This project provides some code examples of Zig for malwares, hacking, and red teaming. ⚡
Cartography is a Python tool that consolidates infrastructure assets and the relationships between them in an intuitive graph view powered by a Neo4j database.
GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers -- USENIX Security'24
Make everyone in your VLAN ASRep roastable
Bypasses App-Bound Encryption to extract cookies, passwords, browsing history, autofill data, and payment info from Chromium-based browsers (Chrome, Brave, Edge) in user mode, without admin privile…