Lists (1)
Sort Name ascending (A-Z)
Stars
Project to decrypt and parse SSH traffic
Project containing several tools/ scripts to recover the OpenSSH session keys used to encrypt/ decrypt SSH traffic.
Proof of concept & details for CVE-2025-21298
This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported is translated into a WMI-equivalent for use on a network/rem…
a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Callback of sysmon driver filter. RegSaveKeyExW() and RegRestor…
A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server.
Proof of concept of CVE-2022-21907 Double Free in http.sys driver, triggering a kernel crash on IIS servers
A list of methods to coerce a windows machine to authenticate to an attacker-controlled machine through a Remote Procedure Call (RPC) with various protocols.
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.
Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing offensive toolkits.
EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.
pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching
GooFuzz is a tool to perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without leaving evidence on the target's server and by means of advan…
Command line utility for searching and downloading exploits
OpenUI let's you describe UI using your imagination, then see it rendered live.
Distribute and run LLMs with a single file.
Implement a ChatGPT-like LLM in PyTorch from scratch, step by step
A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑
Virtual whiteboard for sketching hand-drawn like diagrams
Explain complex systems using visuals and simple terms. Help you prepare for system design interviews.
Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term operations.
Convolutional neural network for analyzing pentest screenshots
EXOCET - AV-evading, undetectable, payload delivery tool
A hashcat-based distributed password cracking system
This is an old deactivated fork. Go to the current repo at livialima/linuxupskillchallenge
eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee