Lists (3)
Sort Name ascending (A-Z)
Stars
- All languages
- ASP.NET
- Assembly
- Batchfile
- C
- C#
- C++
- CSS
- CodeQL
- CoffeeScript
- Crystal
- Dockerfile
- Erlang
- FreeMarker
- Go
- HCL
- HTML
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- Lua
- MATLAB
- Meson
- Nim
- Objective-C
- PHP
- Pascal
- PowerShell
- Python
- Raku
- Rich Text Format
- Ruby
- Rust
- Shell
- Smali
- Smarty
- Swift
- TypeScript
- V
- VBA
- VBScript
- Visual Basic .NET
- Vue
- XSLT
- YARA
Explanation and full RCE PoC for CVE-2025-55182
Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)
Modern, secure, and elegant server control panel, alternative to OpenResty Edge and Nginx Proxy Manager.
渗透测试C2、支持Lua插件扩展、域前置/CDN上线、自定义profile、前置sRDI、文件管理、进程管理、内存加载、截图、反向代理、分组管理
Fully decrypt App-Bound Encrypted (ABE) cookies, passwords & payment methods from Chromium-based browsers (Chrome, Brave, Edge) - all in user mode, no admin rights required.
通过JavaAgent与Javassist技术对JVM加载的类对象进行动态插桩,可以做一些破解、加密验证的绕过等操作
real time face swap and one-click video deepfake with only a single image
《深入JDBC安全:特殊URL构造与不出网反序列化利用技术揭秘》对应研究总结项目 "Deep Dive into JDBC Security: Special URL Construction and Non-Networked Deserialization Exploitation Techniques Revealed" - Research Summary Project
A Remote Access Tool developed in C#, enabling complete control of a remote Windows machine, designed for legitimate remote administration and security testing of Windows systems.
🔍 CodeAuditAssistant - IDEA代码审计插件(公测中) ⚡ 精准追踪复杂调用链 | 🚀 毫秒级方法搜索 | 🔥 内置高危漏洞检测 原生集成 | 反编译/路径分析 | 内存优化 | 安全审计利器 🔍 CodeAuditAssistant - JetBrains Code Audit Plugin (Beta) ⚡ Deep Call-Chain Tracking | 🚀 …
WebRTC/RTSP/RTMP/HTTP/HLS/HTTP-FLV/WebSocket-FLV/HTTP-TS/HTTP-fMP4/WebSocket-TS/WebSocket-fMP4/GB28181/SRT/STUN/TURN server and client framework based on C++11
🦄🦄🦄AI赋能股票分析:AI加持的股票分析/选股工具。股票行情获取,AI热点资讯分析,AI资金/财务分析,涨跌报警推送。支持A股,港股,美股。支持市场整体/个股情绪分析,AI辅助选股等。数据全部保留在本地。支持DeepSeek,OpenAI, Ollama,LMStudio,AnythingLLM,硅基流动,火山方舟,阿里云百炼等平台或模型。
Production-ready platform for agentic workflow development.
An alternative screenshot capability for Cobalt Strike that uses WinAPI and does not perform a fork & run. Screenshot downloaded in memory.
GitHub Entreprise Server SAML authentication bypass (CVE-2025-23369) exploit
自动化反编译微信小程序,小程序安全评估工具,发现小程序安全问题,自动解密,解包,可还原工程目录,支持Hook,小程序修改