Stars
- All languages
- Assembly
- AutoHotkey
- AutoIt
- Batchfile
- BlitzBasic
- Bro
- C
- C#
- C++
- CMake
- CSS
- CoffeeScript
- Crystal
- D
- Dart
- Dockerfile
- Go
- Groovy
- HCL
- HTML
- Haskell
- Inno Setup
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kotlin
- Lua
- Makefile
- Markdown
- Nim
- Nix
- OCaml
- Objective-C
- Objective-C++
- PHP
- POV-Ray SDL
- Pascal
- Perl
- Perl 6
- PowerShell
- Pug
- PureBasic
- Python
- QML
- QMake
- Rich Text Format
- Roff
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Smarty
- Solidity
- Swift
- TeX
- TypeScript
- VBA
- VBScript
- Vim Script
- Visual Basic
- Visual Basic .NET
- Visual Basic 6.0
- Vue
- XSLT
- YARA
- Zeek
- Zig
Position-idependent Windows DLL loader based on ReflectiveDLL project.
Unified repository for different Metasploit Framework payloads
Win32 API bindings for the Go programming language.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stealthy backdoor for Windows operating systems
A Golang Reverse Shell Tool With AES Dynamic Encryption
Tiny SHell - An open-source UNIX backdoor (I'm not the author!)
Find specific users in active directory via their username and logon IP address
Automate Network sessions enumeration of connected users in the domain, to facilitate AD Reconnaissance for Adversary simulation & Red Teams
Windows / Linux Local Privilege Escalation Workshop
This cheatsheet is aimed at the CTF Players and Beginners to help them understand Web Application Vulnerablity with examples.
Inline syscalls made easy for windows on clang
Lists of .NET Obfuscator (Free, Freemium, Paid and Open Source )
subhook wrapper for Nim https://github.com/Zeex/subhook
π A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
Unicorn PE is an unicorn based instrumentation project designed to emulate code execution for windows PE files.
Shikata ga nai (δ»ζΉγγͺγ) encoder ported into go with several improvements
Getting started with static program analysis. ιζη¨εΊεζε ₯ι¨ζη¨γ
A tool for generating fake code signing certificates or signing real ones
HTTP(S)/WS(S)/TCP Tunnels to localhost using only SSH.
A helpful Java Deserialization exploit framework.
Evasive Process Hollowing Techniques
PoC for UUID shellcode execution using DInvoke
A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs.
Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.
Fast and intuitive manager for multiple reverse shells
Run a Exe File (PE Module) in memory (like an Application Loader)
Open source obfuscation tool for .NET assemblies
A script to test credentials against Active Directory Federation Services (ADFS), allowing password spraying or bruteforce attacks.