Skip to content
View vysecurity's full-sized avatar
💬
💬

Block or report vysecurity

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

688 results for source starred repositories
Clear filter
Jupyter Notebook 1 Updated Dec 29, 2025

Self-contained script for cleaning forensic traces on Linux, macOS, and Windows.

Shell 289 26 Updated Jul 25, 2025

Agent for AdaptixC2 with focus in evasion, capability and malleable.

C++ 140 29 Updated Feb 4, 2026

Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but for security research and penetration testing! 🎫

C# 162 17 Updated Oct 21, 2025

Exhaustive search and flexible filtering of Active Directory ACEs.

Python 73 11 Updated Nov 10, 2025

Proof-of-Concept tool for extracting NTLMv1 hashes from sessions on modern Windows systems.

C 557 53 Updated Oct 27, 2025

A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its minimalist, robust, and highly adaptable architecture, this solu…

JavaScript 141 27 Updated Aug 5, 2025

Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domain joined machies

C# 272 30 Updated Dec 27, 2024

A tool to modify SCCM remote control settings on the client machine, enabling remote control without permission prompts or notifications. This can be done without requiring access to SCCM server.

C# 115 10 Updated Oct 20, 2024

A lightweight redirector for Google Cloud Run, enabling domain fronting via Google-owned infrastructure.

Go 128 16 Updated Nov 12, 2025

The Open Source Alternative to Cluely - A lightning-fast, privacy-first AI assistant that works seamlessly during meetings, interviews, and conversations without anyone knowing. Built with Tauri fo…

TypeScript 1,517 285 Updated Jan 14, 2026

Digital Mind Extension

JavaScript 7,292 1,097 Updated Oct 26, 2025

burp collaborator server in docker

Dockerfile 3 Updated Jan 6, 2026

unleashed ffuf

Go 245 28 Updated Oct 29, 2025
Python 759 113 Updated May 7, 2025

This is a novel technique that leverages the well-known Device Code phishing approach. It dynamically initiates the flow when the victim opens the phishing link and instantly redirects them to the …

Go 184 24 Updated Sep 19, 2025

Flutter Mobile Application Reverse Engineering Tool

C++ 2,063 276 Updated Feb 1, 2026

A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle, Javascript and more

Python 345 18 Updated Feb 4, 2026

PowerShell scripts for alternative SharpHound enumeration, including users, groups, computers, and certificates, using the ActiveDirectory module (ADWS) or System.DirectoryServices class (LDAP).

PowerShell 398 39 Updated Jan 14, 2026

An open-source, self-hosted note-taking service. Your thoughts, your data, your control — no tracking, no ads, no subscription fees.

Go 56,617 4,071 Updated Feb 5, 2026

入侵痕迹清理/Cleaning up traces of intrusion

Go 241 19 Updated Nov 6, 2024

NTLM relaying for Windows made easy

C++ 579 68 Updated Apr 25, 2023

BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions

C++ 343 41 Updated Nov 19, 2024

Arc is a customized Redpill Loader for DSM 7.x (Xpenology) with enhanced hardwaresupport, addons, guided (semi-automated) installation and more. Multiple customization options are built-in. It is m…

Shell 3,113 352 Updated Jan 30, 2026

Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework

C# 635 97 Updated May 8, 2025

Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5

C 849 127 Updated Apr 19, 2024

A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you come from where did you go) in Security Incidents and Threat Hunts

JavaScript 180 11 Updated May 27, 2025

Multiplayer pivoting solution

Go 484 53 Updated Nov 3, 2025
Next