Lists (1)
Sort Name ascending (A-Z)
- All languages
- AGS Script
- ASL
- ASP
- ActionScript
- Arduino
- Assembly
- AutoHotkey
- AutoIt
- Batchfile
- Bicep
- BlitzBasic
- Boo
- C
- C#
- C++
- CMake
- CSS
- Clojure
- CoffeeScript
- Crystal
- D
- Dart
- Dockerfile
- Erlang
- F#
- G-code
- GDScript
- Go
- HCL
- HTML
- Haskell
- IDL
- Inno Setup
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kotlin
- LLVM
- Logos
- Lua
- MDX
- Makefile
- Markdown
- Meson
- Nim
- OCaml
- Objective-C
- Objective-C++
- Odin
- PHP
- Pascal
- Perl
- PowerShell
- PureBasic
- Python
- QMake
- Raku
- Reason
- Rebol
- Red
- Rich Text Format
- Roff
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Smali
- Smarty
- Solidity
- Svelte
- Swift
- Tcl
- TeX
- TypeScript
- V
- VBA
- VBScript
- Vala
- Vim Script
- Visual Basic
- Visual Basic .NET
- Visual Basic 6.0
- Vue
- XSLT
- YARA
- Zeek
- Zig
Starred repositories
almounah / silph
Forked from jfjallid/go-secdumpStealthy In-Memory Local Password Harvester (SILPH) tool: dump LSA, SAM and DCC2 with indirect syscall
AG-UI: the Agent-User Interaction Protocol. Bring Agents into Frontend Applications.
shellcode transformation tool for YARA evasion
takes shellcode with bad-characters and banishes them, returning cleaned shellcode with preserved functionalities
ACE Analyzer for identifying ESC1-8 vulnerabilities (Written by AI)
web based GUI to cleanup gmail delete, mark as read, unsubsribe from uncessary things u dont like
Curated resources, research, and tools for securing AI systems
Moonwalk++: Simple POC Combining StackMoonwalking and Memory Encryption
sigreturn-oriented programming (SROP) based sleep obfuscation poc for Linux
Fully autonomous AI hacker to find actual exploits in your web apps. Shannon has achieved a 96.15% success rate on the hint-free, source-aware XBOW Benchmark.
This C# tool sprays for admin access over the entire domain
An LLM extension for Ghidra to enable AI assistance in RE.
Indirect-Shellcode-Executor expoits the miss-configuration/vulnerability present on the API Windows method ReadProcessMemory discovered by DarkCoderSc. It exploits the nature of the in/out pointer …
A POC to disable TamperProtection and other Defender / MDE components
ATHF is a framework for agentic threat hunting - building systems that can remember, learn, and act with increasing autonomy.
A Dockerized build pipeline for custom Windows x64 shellcode
KustoHawk is a lightweight incident triage and response tool designed for effective incident response in Microsoft Defender XDR and Microsoft Sentinel environments.
Scan Entra for risk in role assignments and escalation paths
proper ntdll .text section unhooking via native api. unlike other unhookers this doesnt leave 2 ntdlls loaded. x86/x64/wow64 supported.
ESXtract is a project focused on improving the forensics collection process from ESXi hosts.
Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.
Phantom Keylogger is an advanced, stealth-enabled keystroke and visual intelligence gathering system.