Skip to content
View hacks2learn's full-sized avatar

Block or report hacks2learn

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

Showing results

Awesome EDR Bypass Resources For Ethical Hacking

1,411 139 Updated Oct 16, 2025

evilwaf is a penetration testing tool designed to detect and bypass common Web Application Firewalls (WAFs).

Python 268 19 Updated Nov 24, 2025

A collection of CVEs weaponized by ransomware operators

128 17 Updated Oct 13, 2025

Ludus FastMCP enables AI-powered management of Ludus cyber ranges through natural language commands. The server exposes **157 tools** across 15 modules for range lifecycle management, scenario depl…

Python 27 2 Updated Dec 19, 2025

AI-powered Windows Event Log analyzer that learns from your feedback. Uses Claude AI with RAG to detect suspicious activity, improve accuracy over time, and share learnings across your team. CLI an…

Python 17 4 Updated Dec 18, 2025

Sharp Monocular View Synthesis in Less Than a Second

Python 4,338 264 Updated Dec 19, 2025

A Windows tool that converts LDIF files to BloodHound CE

C# 20 Updated Dec 20, 2025

Stealthy In-Memory Local Password Harvester (SILPH) tool: dump LSA, SAM and DCC2 with indirect syscall

Go 67 1 Updated Dec 17, 2025

Create pretty screenshots of your requests and response right into Caido

Vue 23 2 Updated Dec 20, 2025

This C# tool sprays for admin access over the entire domain

C# 75 7 Updated Dec 7, 2025

ATHF is a framework for agentic threat hunting - building systems that can remember, learn, and act with increasing autonomy.

Python 113 15 Updated Dec 18, 2025

Fully autonomous AI hacker to find actual exploits in your web apps. Shannon has achieved a 96.15% success rate on the hint-free, source-aware XBOW Benchmark.

JavaScript 2,824 383 Updated Dec 17, 2025

Proof of concept for CVE-2025-13780

13 1 Updated Dec 12, 2025

CVE-2025-59501 POC code

Python 24 1 Updated Nov 20, 2025

React Shell & Next.js RSC Exploit Tool (CVE-2025-55182)

Python 162 40 Updated Dec 12, 2025

In Browser PostgreSQL Playground, no server, just client and pglite (postgresql wasm)

TypeScript 616 32 Updated Dec 2, 2024

TerminatorZ is a highly sophisticated and efficient web security tool that scans for top potential vulnerabilities with known CVEs in your web applications.

Shell 289 40 Updated Sep 6, 2024

🤖 LLM-powered agent for automated Google Dorking in bug hunting & pentesting.

Python 179 29 Updated Dec 11, 2025

Windows Session Hijacking via COM

C# 283 32 Updated Dec 13, 2025

Fairy Law - Compromise or disable EDR security solutions

C++ 56 9 Updated Dec 1, 2025

A simple Bash script to discover all domains associated with a specific Microsoft 365 tenant - new replacement for check_mdi

Shell 17 2 Updated Sep 23, 2025

Decrypt Veeam database passwords

C# 212 26 Updated Dec 8, 2025

Finally a Fabioulous & Fast Fuzzy File Finder for neovim

Lua 1,194 54 Updated Dec 19, 2025

Using Chromium-based browsers as a proxy for C2 traffic.

C 129 10 Updated Dec 6, 2025

HacxGPT An advanced AI framework, engineered to explore the frontiers of language model interactions. Designed to provide powerful, unrestricted, and seamless AI-driven conversations.

Python 803 183 Updated Dec 16, 2025

Raptor turns Claude Code into a general-purpose AI offensive/defensive security agent. By using Claude.md and creating rules, sub-agents, and skills, and orchestrating security tool usage, we confi…

Python 874 101 Updated Dec 20, 2025

↕️🤫 Stealth redirector for your red team operation security

Go 1,022 100 Updated Jul 6, 2025

Automatically scan the file system to identify Electron applications vulnerable to ASAR tampering.

C 141 10 Updated Nov 28, 2025

Ludus role for deploying a Mythic Teamserver onto Linux servers

23 6 Updated Mar 16, 2025

UAC Bypass using UIAccess program QuickAssist

C 203 22 Updated Nov 30, 2025
Next