Lists (28)
Sort Name ascending (A-Z)
AD
Android
apt
asp.net
C-S
cloud
crack
CS
directory
Evasion
ida
information collection
java
js
llvm
mac tools
obfuscation
phish
powershell evsion
Privilege Escalation
proxy
redteam&attack
rust
shellcode
trade
windows kernel
wxapkg
漏洞&文库
Stars
- All languages
- ASP.NET
- Assembly
- AutoIt
- Batchfile
- C
- C#
- C++
- CMake
- CSS
- CodeQL
- CoffeeScript
- Cuda
- Dart
- Dockerfile
- Go
- HTML
- Inno Setup
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Just
- Kotlin
- LLVM
- Lua
- Makefile
- Meson
- NSIS
- Nim
- OCaml
- Objective-C
- Objective-C++
- PHP
- Pascal
- Perl
- PowerShell
- Python
- QML
- Rich Text Format
- Ruby
- Rust
- Scala
- Shell
- Smali
- Solidity
- Swift
- TypeScript
- VBScript
- Visual Basic .NET
- Vue
- XSLT
- YARA
- Zig
Inject faults by specifying the address of the T-box or Tyibox in the white-box AES.
A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.
rust port of pspy with support for process monitoring over dbus
CVE-2023-25157 - GeoServer SQL Injection - PoC
Convert your shellcode into an ASCII string
An ICMP channel for Beacons, implemented using Cobalt Strike’s External C2 framework.
A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Callback Routine registering and ZwTerminateProcess.
e-jlion / DotNetDetour
Forked from bigbaldy1128/DotNetDetourDotNetDetour is a software package for monitoring and instrumenting API calls
A library for patching, replacing and decorating .NET and Mono methods during runtime
A x86 CPU & Environment emulator for Windows user and kernel binaries.
Advanced usermode anti-anti-debugger. Forked from https://bitbucket.org/NtQuery/scyllahide
DotNetDetour is a software package for monitoring and instrumenting API calls
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Run native PE or .NET executables entirely in-memory. Build the loader as an .exe or .dll—DllMain is Cobalt Strike UDRL-compatible
A neurosymbolic framework for vulnerability detection in code
Simulate per-process disconnection in red team environments
Toolkit to turn Chromium vulnerabilities into full-chain exploits
Code execution/injection technique using DLL PEB module structure manipulation
https://key08.com/index.php/2021/10/19/1375.html
A True Instrumentable Binary Emulation Framework
can convert EXE/DLL into position-independent shellcode
Reverse Engineering: Decompiling Binary Code with Large Language Models
用Go+Fyne开发的,展示JAVA序列化流以及集成一键插入脏数据,UTF过长编码绕WAF(Utf OverLoad Encoding),修改类SerializeVersionUID功能的图形化工具。