💻
Hacking
Anything that can be used for good can be used for evil ⚡
Lists (32)
Sort Name ascending (A-Z)
Active Directory
11 repositories
AI Agents
29 repositories
AI and LLM
1 repository
AI Security
23 repositories
AI Social Engineering
1 repository
AI Tools
2 repositories
AV/EDR Bypass
2 repositories
Challenges
2 repositories
Cloud Pentest
GCP, AWS, AZURE2 repositories
CTI
3 repositories
CVE-POC
1 repository
DevOps
Open source devops tool alternative21 repositories
DevSecOps + Cloud Security
23 repositories
Email Solutions
2 repositories
General
4 repositories
gRPC
1 repository
Incident Response
2 repositories
IOT Hacking
1 repository
Labs
2 repositories
Learning Resources
2 repositories
MCPs
1 repository
MSC
26 repositories
Pentest Projects
7 repositories
Post-Exploitation Tools
2 repositories
Programming
2 repositories
Python
1 repository
RATs and C2
6 repositories
Red Teaming Projects
6 repositories
SAST
1 repository
Secure Chatting
1 repository
Telecom
1 repository
Web Security
39 repositories
Stars
- All languages
- Assembly
- Astro
- AutoIt
- Batchfile
- C
- C#
- C++
- CSS
- Clojure
- Crystal
- Dockerfile
- Go
- Groovy
- HCL
- HTML
- Hack
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Just
- Kotlin
- Lua
- MDX
- Makefile
- Markdown
- Nim
- OCaml
- PHP
- Pascal
- Perl
- PowerShell
- Python
- Ruby
- Rust
- SCSS
- Shell
- Solidity
- Swift
- TypeScript
- Vim Script
- Vue
- YARA
- Zig
7
results
for sponsorable starred repositories
written in C++
Clear filter
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
Loading Remote AES Encrypted PE in memory , Decrypted it and run it
Cronos is Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation.
My notes while studying Windows exploitation
x86 OS development using Bochs emulator. MIT xv6, JamesM's kernel development tutorials (with some changes) & more