Highlights
- Pro
Lists (8)
Sort Name ascending (A-Z)
Starred repositories
Tools for handling firmwares of DJI products, with focus on quadcopters.
BPFDoor Source Code. Originally found from Chinese Threat Actor Red Menshen
aiDAPal is an IDA Pro plugin that uses a locally running LLM that has been fine-tuned for Hex-Rays pseudocode to assist with code analysis.
A curation of awesome tools, documents and projects about LLM Security.
A decompiler-agnostic plugin for interacting with AI in your decompiler. GPT-4, Claude, and local models supported!
Open-source code analysis platform for C/C++/Java/Binary/Javascript/Python/Kotlin based on code property graphs. Discord https://discord.gg/vv4MH284Hc
The SAILR paper's evaluation pipline for measuring the quality of decompilation
Awesome EDR Bypass Resources For Ethical Hacking
Some results of my DGA reversing efforts
A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
Impacket is a collection of Python classes for working with network protocols.
Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.
Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loading of a library from memory into a host process.
[BHUSA 2018 Arsenal] Integrated tool to analyze Drive-by Download attack
Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives.
Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories, installed services and each service binaries metadata, inst…
Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories, installed services, the registry and running drivers for th…
This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix
this is Crytolocket Malware Domain Generation Algorithm (DGA). Cryptolocker uses DGA to generate 1000 to 10000 unique domain names for its bots or C&C per day. This cmd line contains reverse engine…
A database of RAT collected from Internet