Highlights
Stars
- All languages
- AGS Script
- Assembly
- Astro
- AutoIt
- Batchfile
- Boo
- Bro
- C
- C#
- C++
- CSS
- Clojure
- CoffeeScript
- Dockerfile
- Elixir
- Erlang
- Go
- Groovy
- HCL
- HTML
- Hack
- Haskell
- Java
- JavaScript
- Jupyter Notebook
- Just
- Kotlin
- Lua
- MATLAB
- MDX
- Makefile
- Max
- Nunjucks
- OCaml
- Objective-C
- Objective-C++
- Open Policy Agent
- PHP
- Perl
- PostScript
- PowerShell
- Python
- QML
- Rich Text Format
- Roff
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Smarty
- Swift
- TeX
- TypeScript
- Vim Script
- Vue
- XSLT
- YAML
- YARA
- Zeek
The fastest path to AI-powered full stack observability, even for lean teams.
World's fastest and most advanced password recovery utility
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
BCC - Tools for BPF-based Linux IO analysis, networking, monitoring, and more
A little tool to play with Windows security
Small and highly portable detection tests based on MITRE's ATT&CK.
windows-kernel-exploits Windows平台提权漏洞集合
A repository for learning various heap exploitation techniques.
Arkime is an open source, large scale, full packet capturing, indexing, and database system.
Course materials for Modern Binary Exploitation by RPISEC
Generic command line non-JVM Apache Kafka producer and consumer
linux-kernel-exploits Linux平台提权漏洞集合
The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file system data. The library can be incorporated into larger digi…
A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study material. Commands in 'Usefulcommands' Keepnote. Bookmarks and re…
Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.
A post exploitation framework designed to operate covertly on heavily monitored environments
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
FUSE driver to read/write Windows' BitLocker-ed volumes under Linux / Mac OSX
Wiki-like CTF write-ups repository, maintained by the community. 2016
A Swiss army knife for your daily Linux network plumbing.
TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.
This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structure.
Snoopy Command Logger is a small library that logs all program executions on your Linux/BSD system.