Lists (11)
Sort Name ascending (A-Z)
Stars
- All languages
- Assembly
- Batchfile
- Boo
- C
- C#
- C++
- CSS
- Classic ASP
- CodeQL
- DIGITAL Command Language
- Dockerfile
- Elixir
- F#
- Go
- HCL
- HTML
- Hack
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Just
- Lua
- Makefile
- Markdown
- Nim
- OCaml
- Objective-C
- Objective-C++
- Open Policy Agent
- PHP
- Perl
- PowerShell
- PureScript
- Python
- Rich Text Format
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Smarty
- Solidity
- Swift
- TSQL
- TeX
- TypeScript
- VBA
- VBScript
- Visual Basic
- Vue
- XSLT
- YARA
- Zeek
- Zig
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
A little tool to play with Windows security
Capturing SSL/TLS plaintext without a CA certificate using eBPF. Supported on Linux/Android kernels for amd64/arm64.
Small and highly portable detection tests based on MITRE's ATT&CK.
proxychains ng (new generation) - a preloader which hooks calls to sockets in dynamically linked programs and redirects it through one or more socks/http proxies. continuation of the unmaintained p…
Leaked Mirai Source Code for Research/IoC Development Purposes
🍯 T-Pot - The All In One Multi Honeypot Platform 🐝
windows-kernel-exploits Windows平台提权漏洞集合
This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code.
A tool to dump the login password from the current linux user
A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study material. Commands in 'Usefulcommands' Keepnote. Bookmarks and re…
Abusing impersonation privileges through the "Printer Bug"
A post exploitation framework designed to operate covertly on heavily monitored environments
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
Upload arbitrary data via Apple's Find My network.
A network sniffer that logs all DNS server replies for use in a passive DNS setup