Lists (1)
Sort Name ascending (A-Z)
Stars
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wis…
Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
Automation for internal Windows Penetrationtest / AD-Security
Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀
This map lists the essential techniques to bypass anti-virus and EDR
AdaptixC2 is a highly modular advanced redteam toolkit
Industrial design files for Keychron keyboards and mice. 100+ models with CAD assets in STEP, DXF, DWG, and PDF. Source-available, with commercial use allowed for original compatible accessories wi…
Identifies the bytes that Microsoft Defender flags on.
Semi-automatic OSINT framework and package manager
A modular toolkit for building fast, reliable Web applications and libraries with Rust and WASM
This project aims to compare and evaluate the telemetry of various EDR products.
Not The Hidden Wiki - The largest repository of links related to cybersecurity
Template-Driven AV/EDR Evasion Framework
Organized list of my malware development resources
rasta-mouse / ThreatCheck
Forked from matterpreter/DefenderCheckIdentifies the bytes that Microsoft Defender / AMSI Consumer flags on.
Elastic Security detection content for Endpoint
A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Integrates with LLM agents via MCP for enhanced analysis capabil…
Hook system calls on Windows by using Kaspersky's hypervisor