Lists (4)
Sort Name ascending (A-Z)
Stars
Open Source XSS exploitation tool. using http proxy to access the browser which executed this project. [Engineering Experimental]
【三万字原创】完全零基础从0到1掌握Java内存马,公众号:追梦信安
An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails configured in it.
This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code.
Attack Surface Analyzer can help you analyze your operating system's security configuration for changes during software installation.
A workshop about Malware Development
An EDR bypass that prevents EDRs from hooking or loading DLLs into our process by hijacking the AppVerifier layer
LSASS memory dumper using only NTAPIs, creating a minimal minidump, built in Rust with no_std and independent of the C runtime (CRT). It can be compiled as shellcode (PIC), supports XOR encryption,…
A collection of resources to study Solana smart contract security, auditing, and exploits.
ChatGPT Jailbreaks, GPT Assistants Prompt Leaks, GPTs Prompt Injection, LLM Prompt Security, Super Prompts, Prompt Hack, Prompt Security, Ai Prompt Engineering, Adversarial Machine Learning.
A small tool built to find and fix common misconfigurations in Active Directory Certificate Services.
EDR & Antivirus Bypass to Gain Shell Access
Nameless C2 - A C2 with all its components written in Rust
12 weeks, 26 lessons, 52 quizzes, classic Machine Learning for all
HookChain: A new perspective for Bypassing EDR Solutions
A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory
Sample/PoC Windows kernel driver for detect DMA devices by using Vendor ID and Device ID signatures
Windows kernel debugger for Linux hosts running Windows under KVM/QEMU
A Powerful web scraper powered by LLM | OpenAI, Gemini & Ollama
Harden Windows Safely, Securely using Official Supported Microsoft methods and proper explanation | Always up-to-date and works with the latest build of Windows | Provides tools and Guides for Pers…
UESTC电子科技大学网络安全攻防期末复习知识总结
SubOwner - A Simple tool check for subdomain takeovers.
HaE - Highlighter and Extractor, Empower ethical hacker for efficient operations.
Dahua Console, access internal debug console and/or other researched functions in Dahua devices. Feel free to contribute in this project.