Highlights
- Pro
Lists (15)
Sort Name ascending (A-Z)
Stars
- All languages
- Assembly
- AutoIt
- Batchfile
- Bikeshed
- C
- C#
- C++
- CMake
- CSS
- CodeQL
- CoffeeScript
- Crystal
- Dart
- Dockerfile
- Elixir
- Emacs Lisp
- GDScript
- Go
- HCL
- HTML
- Haskell
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Lua
- MDX
- Makefile
- Markdown
- Meson
- Nim
- OCaml
- Objective-C
- Objective-C++
- PHP
- Pascal
- PowerShell
- Python
- Roff
- Ruby
- Rust
- SCSS
- Scala
- Scheme
- Shell
- Svelte
- Swift
- TeX
- TypeScript
- V
- VBA
- Vim Script
- Visual Basic .NET
- Vue
- XSLT
- YARA
- Zig
Macro-header for compile-time C obfuscation (tcc, win x86/x64)
lwIP mirror from http://git.savannah.gnu.org/cgit/lwip.git
A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!
Bypass Chromium's App-Bound Encryption via Direct Syscall-based Reflective Process Hollowing. Extract cookies, passwords, payment methods & tokens from Chrome, Edge, Brave & Avast - fileless, user-…
A minimal status bar for macOS. Ideal for use with tiling window managers like yabai
Native API header files for the System Informer project.
A modern 32/64-bit position independent implant template
Exercises to learn how to fuzz with American Fuzzy Lop
Demonstrates the "heartbleed" problem using full OpenSSL stack
Active Directory Control Paths auditing and graphing tools
Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams
Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll
Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers that can run malware on the victim using the Process Ghosting…
Module Stomping, No New Thread, HellsGate syscaller, UUID Shellcode Runner for x64 Windows 10!
New lateral movement technique by abusing Windows Perception Simulation Service to achieve DLL hijacking code execution.
Gain observability into any Linux command or application with no code modification
How to record and replay touchscreen events on an Android device.
BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)
Pentest tool for antivirus evasion and running arbitrary payload on target Wintel host
A Collection of In-Memory Shellcode Execution Techniques for Windows