Stars
- All languages
- ASP
- Arduino
- Assembly
- Astro
- AutoIt
- Batchfile
- BlitzBasic
- Boo
- C
- C#
- C++
- CSS
- Clojure
- Crystal
- Dart
- Dockerfile
- Elixir
- Go
- HCL
- HTML
- Hack
- Haskell
- Inno Setup
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kotlin
- LLVM
- Lua
- MDX
- NASL
- Nim
- OCaml
- Objective-C
- PHP
- Pascal
- Perl
- PowerShell
- Python
- Rich Text Format
- Ruby
- Rust
- SCSS
- Shell
- SmPL
- Smali
- Solidity
- Svelte
- Swift
- TeX
- TypeScript
- VBA
- Visual Basic .NET
- Vue
- XSLT
- YARA
Nuclei templates to run on urls
The app is used to download posts from Telegram feeds and save them to text files for later OSINT AI use
🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications
YesWiki is a wiki system written in PHP. The squelette parameter is vulnerable to path traversal attacks, enabling read access to arbitrary files on the server.
A tool to check microsofts user real endpoint to get data about a tenant.
smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters
This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the
Attacking the cleanup_module function of a kernel module
APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files
Proof of Concept for CVE-2024-36991. Path traversal for Splunk versions below 9.2.2, 9.1.5, and 9.0.10 for Windows which allows arbitrary file read.
Some useful books related to Cybersecurity, Linux and more.
Disassemble ANY files including .so (NDK, JNI), Windows PE(EXE, DLL, SYS, etc), linux binaries, libraries, and any other files such as pictures, audios, etc(for fun)files on Android. Capstone-based…
Cronos is Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation.
The Most Advanced Client-Side Prototype Pollution Scanner
Adversary simulation and Red teaming platform with AI
This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the
DeepFace UI is a web application for facial recognition and analysis built with DeepFace. It offers an intuitive interface to upload images, automatically extract faces, and perform state-of-the-ar…
Search for all leaked keys/secrets using one regex! bugbounty
Cross-platform username reconnaissance tool built for OSINT investigators, cyber threat analysts, red teamers, and CTF enthusiasts.
Git All the Payloads! A collection of web attack payloads.
A toolset to make a system look as if it was the victim of an APT attack
A Model Context Protocol server for IDA
This module provides an easy way to cleanup Active Directory from dead/old objects based on various criteria. It can also disable, move or delete objects. It can utilize Azure AD, Intune and Jamf t…
Astral-PE is a low-level mutator (Headers/EP obfuscator) for native Windows PE files (x32/x64)
ROP-based sleep obfuscation to evade memory scanners