- (╮°-°)╮┳━━┳ ( ╯°□°)╯ ┻━━┻
- https://ppn.snovvcra.sh
- @snovvcrash
- @snovvcrash@infosec.exchange
Stars
- All languages
- Assembly
- Batchfile
- Boo
- C
- C#
- C++
- CSS
- Classic ASP
- D
- Dockerfile
- Go
- HCL
- HTML
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- Makefile
- Nim
- Objective-C
- PHP
- Pascal
- Perl
- Pony
- PowerShell
- Python
- Roff
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Smarty
- Standard ML
- Swift
- TypeScript
- VBA
- VBScript
- Vala
- Vim Script
- Visual Basic .NET
- Vue
- YARA
Tool to auto-fill the PIN code in Windows Security Smart Card dialog box
A tool to view and extract the contents of an Windows Installer (.msi) file.
A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs.
A small batch script for resetting Visual Assist X's trial period.
curl-impersonate: A special build of curl that can impersonate Chrome & Firefox
Reverse engineering winapi function loadlibrary.
PoCs and tools for investigation of Windows process execution techniques
.NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS
Simple PowerShell HTTP Server (no dependencies, single file, PowerShell 5.1/7)
🤗 smolagents: a barebones library for agents that think in code.
Complete list of LPE exploits for Windows (starting from 2023)
Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI
lightweight, dependency-free bash script for security, performance auditing and infrastructure monitoring of Linux servers.
A Twitter client for agents-- no API key necessary
ip address - Youtube, Instagtam, Twitter, Netflix
A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Integrates with LLM agents via MCP for enhanced analysis capabil…
Automated exploitation of MSSQL servers at scale
Evasive shellcode loader for bypassing event-based injection detection (PoC)
Obfusheader.h is a portable header file for C++14 compile-time obfuscation.