-
Data-Sec GmbH
- Germany, DE
-
10:55
(UTC +01:00)
Lists (1)
Sort Name ascending (A-Z)
Stars
OGhidra bridges Large Language Models (LLMs) via Ollama with the Ghidra reverse engineering platform, enabling AI-driven binary analysis through natural language. Interact with Ghidra using convers…
LLM Council works together to answer your hardest questions
Identity-aware VPN and proxy for remote access to anything, anywhere.
A tool that is used to hunt vulnerabilities in x64 WDM drivers
This script will enable you to reset the krbtgt account password and related keys while minimizing the likelihood of Kerberos authentication issues being caused by the operation.
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
💫 Toolkit to help you get started with Spec-Driven Development
Cryptomator for Windows, macOS, and Linux: Secure client-side encryption for your cloud storage, ensuring privacy and control over your data.
Binaries for the book Practical Malware Analysis
Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀
Run your own AI cluster at home with everyday devices 📱💻 🖥️⌚
This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)
Collection of various malicious functionality to aid in malware development
Connect your devices into a secure WireGuard®-based overlay network with SSO, MFA and granular access controls.
A curated list of tools for incident response
Small and highly portable detection tests based on MITRE's ATT&CK.
The official C# SDK for Model Context Protocol servers and clients. Maintained in collaboration with Microsoft.
An LLM extension for Ghidra to enable AI assistance in RE.
x64Dbg plugin that enables C# plugins with hot-loading support and scripting.
Not The Hidden Wiki - The largest repository of links related to cybersecurity
Hunt down social media accounts by username across social networks
⭐️ A curated list of awesome forensic analysis tools and resources
C# implementation to produce ROR-13 numeric hash for given function API name