Skip to content
View virusdefender's full-sized avatar
🐱
🐱

Block or report virusdefender

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
45 results for forked starred repositories
Clear filter

A portable fork of the high-performance regular expression matching library

C++ 620 72 Updated Nov 12, 2025

塑造未来的安全领域智能革命

4 Updated May 9, 2023

Thread-safe and deadlock free template projects for hijacking various Windows system DLLs

Assembly 4 2 Updated Mar 12, 2020

JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP Server, RMI Server and LDAP Server to exploit java web apps v…

Java 933 169 Updated Sep 2, 2025

A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.

C# 403 38 Updated Jan 10, 2025

KrabsETW provides a modern C++ wrapper and a .NET wrapper around the low-level ETW trace consumption functions.

C++ 3 Updated Aug 3, 2022

「稳健 Online Judge」后端

Python 37 11 Updated Dec 8, 2022

Equihash: memory-hard PoW with fast verification

C++ 6 2 Updated Oct 1, 2025

Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.

Go 1,211 118 Updated Feb 3, 2025

Linux Kernel module-less implant (backdoor)

C 2 Updated Mar 3, 2021

Tool to check for applicable windows updates for a given machine in offline without dependency on WSUS or WUA.

Python 2 Updated Aug 25, 2020

Script to steal passwords from ssh.

Shell 7 2 Updated Feb 13, 2018

Simple reverse ICMP shell

C 132 26 Updated Nov 2, 2014

一个利用ASM对字节码进行污点传播分析的静态代码审计应用(添加了大量代码注释,适合大家进行源码学习)。也加入了挖掘Fastjson反序列化gadget chains和SQLInject(JdbcTemplate、MyBatis、JPA、Hibernate、原生jdbc等)静态检测功能。并且加入了很多功能以方便进行漏洞自动化挖掘。

Java 454 60 Updated Mar 24, 2022

Source-binary patch presence test system.

Python 27 6 Updated Mar 21, 2020

A list of interesting payloads, tips and tricks for bug bounty hunters.

24 4 Updated Sep 1, 2019

Burp Suite extension to passively scan for applications revealing server error messages

Java 17 4 Updated Aug 15, 2023

MySQL fake server for read files of connected clients

Python 606 150 Updated Jul 23, 2017

A Golang blocking leaky-bucket rate limit implementation

Go 1 Updated Dec 1, 2023

This repo records all the vulnerabilities of linux software I have reproduced in my local workspace

C 406 51 Updated Oct 30, 2023

Archive Mirror for recently republished PoC/Exploit code

Python 17 6 Updated Nov 26, 2017

一个合作博弈论的互动讲解手册 An interactive guide to the game theory of cooperation

JavaScript 793 117 Updated Apr 16, 2024

Vue.js + LeanCloud(node.js)前后端分离开发样板

JavaScript 65 17 Updated Jul 5, 2016

A simple Hexo theme forked from icylogic.

SCSS 2,678 665 Updated Aug 22, 2025

Reference: http://www.secgeek.net/bookfresh-vulnerability/

PHP 10 5 Updated Apr 5, 2015

translate project of Drops

Makefile 665 237 Updated Jul 15, 2020
C++ 4 3 Updated Apr 26, 2015

Recovery of Plaintext iMessage Data Without Breaking Crypto

JavaScript 107 19 Updated Apr 9, 2016

A Python Perceptual Image Hashing Module

Python 3,766 340 Updated Apr 17, 2025
Next