Skip to content
View jackrendor's full-sized avatar

Organizations

@Felinesec

Block or report jackrendor

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

The Red Sun vulnerability repository

C++ 1,516 328 Updated Apr 15, 2026

Cobalt Strike BOF used to perform privilege escalation by exploiting the SeImpersonate privilege. Based on the original GodPotato PoC by BeichenDream.

C 193 23 Updated Apr 16, 2026

This tool extracts and displays data from the Recall feature in Windows 11, providing an easy way to access information about your PC's activity snapshots.

C++ 118 11 Updated Apr 8, 2026

Headless browser automation server for AI agents to visit sites that are usually blocked

JavaScript 2,776 277 Updated Apr 19, 2026

Exploitation of CVE-2026-24061

Python 203 46 Updated Jan 22, 2026

Go HTTP client with browser-identical TLS/HTTP2 fingerprinting. Bypass bot detection by perfectly mimicking Chrome, Firefox, and Safari at the cryptographic level (JA3/JA4, Akamai fingerprint, head…

Go 925 68 Updated Mar 15, 2026

ClickForClickOnce - Generate configurable clickonce payloads

HTML 93 12 Updated Apr 17, 2026

An offensive/defense security toolset for discovery, recon and ethical assessment of AI Agents

Python 1,144 124 Updated Dec 21, 2025

Tail Certificate Transparency logs and extract hostnames

Go 129 12 Updated Jun 21, 2025

Fancy reverse and bind shell handler

Python 2,883 290 Updated Aug 9, 2024

A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its minimalist, robust, and highly adaptable architecture, this solu…

JavaScript 151 27 Updated Aug 5, 2025

Pack/Encrypt/Obfuscate ELF + SHELL scripts

Shell 444 56 Updated Apr 11, 2026

Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP

Go 84 4 Updated May 17, 2025

A Linkedin Activity date Finder

Python 67 6 Updated Feb 21, 2026

An even funnier way to disable windows defender. (through WSC api)

C++ 3,386 287 Updated Nov 23, 2025

Sloc, Cloc and Code: scc is a very fast accurate code counter with complexity calculations and COCOMO estimates written in pure Go

Go 8,307 312 Updated Apr 13, 2026

View HTTP/HTTPS requests made by any Linux program

Go 4,156 65 Updated Dec 23, 2025

COM ViewLogger — new malware keylogging technique

C++ 407 57 Updated Jan 6, 2025

A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle, Javascript and more

Python 356 19 Updated Apr 19, 2026

A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Integrates with LLM agents via MCP for enhanced analysis capabil…

YARA 1,348 153 Updated Nov 12, 2025

An active fork of curl-impersonate with more versions and build targets. A series of patches that make curl requests look like Chrome, Firefox and Safari.

Batchfile 2,452 124 Updated Apr 17, 2026

CF-Hero is a reconnaissance tool that uses multiple data sources to discover the origin IP addresses of Cloudflare-protected web applications

Go 1,788 147 Updated Jun 15, 2025

Simple DNS server that uses a Tor SOCKS5 proxy to resolve names.

Go 64 15 Updated May 5, 2020

🔍 Search anyone's digital footprint across 300+ websites

Go 3,324 307 Updated Apr 3, 2026

A self hosted music streaming server

Ruby 4,175 210 Updated Apr 16, 2026

Credential Guard Bypass Via Patching Wdigest Memory

C++ 337 53 Updated Feb 3, 2023

Cassidy's blog template built with Astro and TinaCMS!

Astro 587 69 Updated Mar 5, 2026

Exposor is a tool using internet search engines to detect exposed technologies with a unified syntax.

Python 66 10 Updated Nov 12, 2025

A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders implemented by C2 beacons) or other problematic executables tha…

C++ 347 60 Updated Oct 7, 2024

DarkFlare Firewall Piercing (TCP over CDN)

Go 1,578 87 Updated Feb 9, 2026
Next