Lists (9)
Sort Name ascending (A-Z)
- All languages
- ASP.NET
- Assembly
- AutoIt
- Batchfile
- C
- C#
- C++
- CSS
- Classic ASP
- CodeQL
- Crystal
- Dart
- Dockerfile
- F#
- Go
- Go Template
- HCL
- HTML
- Hack
- Haskell
- Inno Setup
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Just
- Kotlin
- LLVM
- Less
- Lua
- Makefile
- NSIS
- Nim
- Objective-C
- PHP
- Pascal
- Perl
- PowerShell
- Python
- REXX
- Roff
- Ruby
- Rust
- SCSS
- Shell
- Smarty
- Solidity
- Swift
- Tcl
- TeX
- TypeScript
- VBA
- VBScript
- Visual Basic .NET
- Vue
- XSLT
- YARA
- Zig
Starred repositories
Async BOF implementation of 'Rubeus monitor' to detect and automatically extract Kerberos TGTs as they appear on a target system.
Command-line tool and library for Windows remote command execution in Go
全能协议分析工具:浏览器抓包 + MITM 代理 + 指纹伪装 + AI 分析 + MCP Server 无缝对接 AI Agent/IDE | All-in-one protocol analysis toolkit — built-in browser capture, MITM proxy, JS hooks, fingerprint spoofing, AI analysis & M…
Cobalt Strike BOF used to perform privilege escalation by exploiting the SeImpersonate privilege. Based on the original GodPotato PoC by BeichenDream.
Two WinForms GUI tools for enumerating, searching, and exfiltrating data from M365 environments using application-level OAuth tokens
Injecting code by recompiling shellcode into a ROP chain.
Modify machine code in binaries with alternative x64 assembly opcodes for AV evasion
DSCourier is a proof-of-concept that uses the WinGet Configuration COM API to apply DSC configurations through Microsoft-signed binaries.
Tool designed to parse and analyze Microsoft Defender AV signature definition files
ExchangeHound is a defensive BloodHound OpenGraph collector for on-prem Microsoft Exchange that maps mailbox delegation and Exchange privilege relationships to help blue teams find abuse paths and …
A Rust template for writing Beacon Object Files (BOFs)
A Cobalt Strike BOF implementation of the SilentHarvest registry dumping technique
A Cobalt Strike Beacon Object File that exploits the BlueHammer vulnerability that to obtain a copy of the SAM database.
Security testing toolkit for Claude Code: curated SecLists wordlists, injection payloads, and expert agents for authorized pentesting, CTFs, and bug bounties
Modular User-Defined Reflective Loader (UDRL) built on Crystal Palace for controlled DLL execution and evasion research.
Android APK security analysis tool. Decompiles DEX, scans for vulns, parses manifests and certs. Runs in your browser.
BOF for Havoc that copies locked Windows files (SAM, SYSTEM, NTDS.dit) via raw MFT parsing — no VSS, no Registry APIs, no PowerShell
Nim implementation for sud0Ru's Credential Dumping from SAM/SECURITY Hives Method (a.k.a. SilentHarvest)
retrieve information via O365 and AzureAD with a valid cred
An example UDC2 implementation for CrystalC2.
为 AI Agent 设计的 JS 逆向 MCP Server,内置反检测,基于 chrome-devtools-mcp 重构 | JS reverse engineering MCP server with agent-first tool design and built-in anti-detection. Rebuilt from chrome-devtools-mcp.
SSRF plugin for burp Automates SSRF Detection in all of the Request
Ryūjin Protector - Is a Intel Arch - BIN2BIN - PE Obfuscation/Protection/DRM tool
x64DbgMCPServer made from c# with Claude, Windsurf and Cursor support