Lists (15)
Sort Name ascending (A-Z)
Stars
- All languages
- Assembly
- AutoHotkey
- AutoIt
- Batchfile
- BlitzBasic
- C
- C#
- C++
- CMake
- CSS
- Clojure
- Crystal
- DIGITAL Command Language
- Dockerfile
- Elixir
- Erlang
- Go
- HCL
- HTML
- Hack
- Haskell
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kotlin
- Lua
- Makefile
- NSIS
- Nim
- Objective-C
- OpenEdge ABL
- PHP
- Pascal
- Perl
- PowerShell
- Python
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Smali
- Smarty
- Svelte
- Swift
- TypeScript
- UnrealScript
- VBA
- Vala
- Visual Basic
- Vue
- XSLT
- YARA
- Zeek
- Zig
The fastest path to AI-powered full stack observability, even for lean teams.
A little tool to play with Windows security
Flipper Zero Unleashed Firmware
GoAccess is a real-time web log analyzer and interactive viewer that runs in a terminal in *nix systems or through your browser.
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs
Small and highly portable detection tests based on MITRE's ATT&CK.
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and th…
Package desktop applications as AppImages that run on common Linux-based operating systems, such as RHEL, CentOS, openSUSE, SLED, Ubuntu, Fedora, debian and derivatives. Join #AppImage on irc.liber…
windows-kernel-exploits Windows平台提权漏洞集合
linux-kernel-exploits Linux平台提权漏洞集合
Applicative Protocol Multiplexer (e.g. share SSH and HTTPS on the same port)
Custom firmware for the HackRF+PortaPack H1/H2/H4
A Linux version of the Procmon Sysinternals tool
Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
Simple (relatively) things allowing you to dig a bit deeper than usual.
🌴Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file (提权漏洞合集)
A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study material. Commands in 'Usefulcommands' Keepnote. Bookmarks and re…
Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.
A small set of tools to convert packets from capture files to hash files for use with Hashcat or John the Ripper.
PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.