-
FOG
- Classified - Stringent
- https://orcid.org/0009-0005-2511-8499
- @BartBlack15
Lists (1)
Sort Name ascending (A-Z)
- All languages
- ASP
- ASP.NET
- Adblock Filter List
- Assembly
- AutoHotkey
- AutoIt
- Awk
- Batchfile
- Boo
- C
- C#
- C++
- CSS
- Crystal
- Dart
- Dockerfile
- Gnuplot
- Go
- HTML
- Haskell
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- Lua
- Makefile
- Markdown
- Nim
- Nix
- Objective-C
- PHP
- Pascal
- Perl
- PostScript
- PowerShell
- Python
- R
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Smarty
- Swift
- SystemVerilog
- TSQL
- TypeScript
- VBA
- VBScript
- Visual Basic
- Vue
- XSLT
- YAML
- YARA
Starred repositories
Free and Open Source Reverse Engineering Platform powered by rizin
ConEmu: Customizable Windows terminal with tabs, splits, quake-style, hotkeys and more
Light-weight system monitor for X, Wayland, and other things, too
😎🏖️🐬 Your new, 𝙧𝙞𝙙𝙤𝙣𝙠𝙪𝙡𝙞𝙘𝙞𝙤𝙪𝙨𝙡𝙮 smart clipboard manager
ffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Notepad4 (Notepad2⨯2, Notepad2++) is a light-weight Scintilla based text editor for Windows with syntax highlighting, code folding, auto-completion and API list for many programming languages and d…
🛡 I2P: End-to-End encrypted and anonymous Internet
Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).
A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM.
[Deprecated, work in progress alternative: https://github.com/M2Team/NanaRun] Series of System Administration Tools
Evil-M5Project is an innovative tool developed for ethical hacking and exploration of WiFi networks. It's compatible with Cardputer, Atoms3, Fire, core2. You can scan, monitor, and interact with Wi…
Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing offensive toolkits.
Extracting Clear Text Passwords from mstsc.exe using API Hooking.
Application runtime environment customization utility
Enumerating and removing kernel callbacks using signed vulnerable drivers
A tool that detects the privilege escalation vulnerabilities caused by misconfigurations and missing updates in the Windows operating systems.
Windows 8.1 and 10 UAC bypass abusing WinSxS in "dccw.exe".
This repo contains my custom scripts for Penetration Testing and Red Team Assessments. I will keep on updating this repo as and when I get time.
Research on Anti-malware and other related security solutions
A flexible command line client for Arch Linux's User Repository