Stars
Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.
Projects motion of pixels to a voxel
A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server.
A Spotify Connect client that mostly Just Works™
Java decompiler, assembler, and disassembler
Concierge Toolkit: Physical Access Control Identification and Exploitation
Open source compliance tool for development platforms.
Utility to enumerate users, groups and computers from a Windows domain through LDAP queries
Lightweight static analysis for many languages. Find bug variants with patterns that look like source code.
🔍 ScanCode detects licenses, copyrights, dependencies by "scanning code" ... to discover and inventory open source and third-party packages used in your code. Sponsored by NLnet project https://nln…
Decrypt, Modify and Reencrypt Seedvault Android Backups
Execute ELF files without dropping them on disk
How to exploit a double free vulnerability in 2021. Use After Free for Dummies
Identifies the bytes that Microsoft Defender flags on.
A simple browser extension to bypass YouTube's age verification, disable content warnings and watch age restricted videos without having to sign in!
SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.