Block or Report
Block or report EvilAres
Contact GitHub support about this user’s behavior. Learn more about reporting abuse.
Report abuseLists (14)
Sort Name ascending (A-Z)
Language
Sort by: Recently starred
Starred repositories
The only tool/technique to punch holes through firewalls/NATs where multiple clients & server can be behind separate NATs without any 3rd party involvement. Pwnat is a newly developed technique, ex…
A collection of proof-of-concept exploit scripts written by the team at Rhino Security Labs for various CVEs.
Small and highly portable detection tests based on MITRE's ATT&CK.
FinGPT: Open-Source Financial Large Language Models! Revolutionize 🔥 We release the trained model on HuggingFace.
TextAttack 🐙 is a Python framework for adversarial attacks, data augmentation, and model training in NLP https://textattack.readthedocs.io/en/master/
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
Here are +200 different rats some with source code
SysWhispers on Steroids - AV/EDR evasion via direct system calls.
Solve Google reCAPTCHA in less than 5 seconds! 🚀
主要记录网络安全学习笔记,包含WEB安全、提权、APP渗透、内网渗透、横向移动、红队、工具学习等
Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.
Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage PowerShell reverse shell.
Bootlin embedded Linux and kernel training materials
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
yara detection rules for hunting with the threathunting-keywords project
Dshell is a network forensic analysis framework.
Automate the creation of a lab environment complete with security tooling and logging best practices