Highlights
Lists (32)
Sort Name ascending (A-Z)
Android Hack
books
Cloud Hack
Cobalt Strike
ctf
CV
Defense Evasion
Dev
eBPF
Frontend
Game&CV&ML
Geek
geek but useless
Golang
Hack Tools
happy
Hardware Hack
ios
Linux Hack
LLM
MachineLearning
MacOS Hack
openwrt
Others Hack
Proxy
Python
Rust
SecDev
some projects may help meTools
Traffic Security
nta and bypass ntaWeb Hack
Windows Hack
some security tools on windowsStars
🕵️♂️ TUI for sniffing network traffic using eBPF on Linux
A tool designed to simplify the creation of OpenCore EFI
Windows Research Kernel Source Code
A proxy to expose real tls handshake to the firewall
📚 Freely available programming books
🕵️♂️ Collect a dossier on a person by username from thousands of sites
A high-throughput and memory-efficient inference and serving engine for LLMs
View disk space usage and delete unwanted data, fast.
Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
💥 A Lodash-style Go library based on Go 1.18+ Generics (map, filter, contains, find...)
Keyviz is a free and open-source tool to visualize your keystrokes ⌨️ and 🖱️ mouse actions in real-time.
图片/视频选择器 - 支持LivePhoto、GIF图片选择、3DTouch预览、在线下载iCloud上的资源、编辑图片/视频、浏览网络图片 功能 Imitation wx photo/image picker - support for LivePhoto, GIF image selection, 3DTouch preview, Download the resources on iC…
Android in docker solution with noVNC supported and video recording
A visual no-code/code-free web crawler/spider易采集:一个可视化浏览器自动化测试/数据采集/爬虫软件,可以无代码图形化的设计和执行爬虫任务。别名:ServiceWrapper面向Web应用的智能化服务封装系统。
A curated list of awesome embedding models tutorials, projects and communities.
Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application
Template-Driven AV/EDR Evasion Framework
A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.
The lazier way to manage everything docker
Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle to ntdll , and trigger exported APIs from the export table
Qt-based Nintendo Entertaiment System emulator and NSF/NSF2/NSFe Music Player (Linux, FreeBSD, OpenBSD and Windows)
📻Terminal/ssh/sftp/ftp/telnet/serialport/RDP/VNC client(linux, mac, win)
Some setup scripts for security research tools.
Loading Remote AES Encrypted PE in memory , Decrypted it and run it