Skip to content
View MrRootKitty's full-sized avatar

Block or report MrRootKitty

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Creating a hardened "Blue Forest" with Server 2016/2019 Domain Controllers

PowerShell 260 24 Updated Jul 18, 2024

A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented by login pages like Microsoft and the use with Evilginx.

CSS 329 36 Updated May 29, 2024

Rules shared by the community from 100 Days of YARA 2024

YARA 8 1 Updated Feb 18, 2024

My Private Bug Hunting Methodology

261 41 Updated Aug 5, 2024

Script designed to identify CanaryTokens within Microsoft Office documents and Acrobat Reader PDF (docx, xlsx, pptx, pdf).

Python 106 16 Updated Jan 25, 2024

Windows Local Privilege Escalation Cookbook

PowerShell 897 143 Updated Apr 3, 2024

GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsoft SharePoint List and exfiltrate files using Google Drive or…

Go 516 104 Updated Aug 17, 2024

Galah: An LLM-powered web honeypot.

Go 360 34 Updated Jul 20, 2024

Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in Windows environments.

C# 468 54 Updated Aug 7, 2024

[IJCAI 2024] Imperio is an LLM-powered backdoor attack. It allows the adversary to issue language-guided instructions to control the victim model's prediction for arbitrary targets.

Python 40 3 Updated Apr 17, 2024

IDA plugin which queries uses language models to speed up reverse-engineering

Python 2,771 254 Updated Jun 12, 2024

The Panthera(P.)uncia of Cybersecurity - Official CLI utility for Subdomain Center & Exploit Observer.

Python 632 31 Updated Aug 22, 2024

A collection of real world AI/ML exploits for responsibly disclosed vulnerabilities

Python 1,370 104 Updated Aug 7, 2024

Clean accounts over permissions in GCP infra at scale

Python 70 8 Updated May 9, 2023

Web Path Finder

Python 56 9 Updated Nov 22, 2023

New ways of breaking app-integrated LLMs

Jupyter Notebook 1,778 114 Updated Jun 17, 2023

𓃌 - Exploit faster with simplicity and ease using Axer

Python 39 4 Updated Feb 2, 2024

MS Graph Commands and Tools for Blue Teamers

45 1 Updated Nov 16, 2023

A curated list of GPT agents for cybersecurity

5,322 586 Updated Jul 21, 2024

A tool that leverages ChatGPT through the OpenAI API to generate review questions based on input text.

Python 6 Updated Jan 3, 2023

Burp extension used to snip any header from all the requests.

Python 21 5 Updated Nov 12, 2023

Social Engineering Browser Update Attack.

53 9 Updated Nov 12, 2023

Golang weaponization for red teamers.

Go 459 39 Updated Jan 17, 2024

Different methods to get current username without using whoami

C# 170 15 Updated Feb 12, 2024

A browser extension for Penetration Testing

Vue 409 62 Updated Apr 17, 2024

Robust Speech Recognition via Large-Scale Weak Supervision

Python 66,361 7,821 Updated Aug 19, 2024

Secret Scanner for Slack, Jira, Confluence, Asana, Wrike and Linear

Python 36 11 Updated Aug 5, 2024

Selfhosted alternative to 12ft.io. and 1ft.io bypass paywalls with a proxy ladder and remove CORS headers from any URL

Go 4,346 172 Updated Dec 16, 2023

API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websites

JavaScript 11,382 899 Updated Mar 16, 2024
Next