Stars
- All languages
- Adblock Filter List
- AsciiDoc
- Assembly
- Batchfile
- C
- C#
- C++
- CMake
- CSS
- Clojure
- Crystal
- D
- DIGITAL Command Language
- Dart
- Dockerfile
- Elixir
- Go
- HCL
- HTML
- Hack
- Inno Setup
- JSON
- Java
- JavaScript
- Jinja
- Julia
- Jupyter Notebook
- Lua
- Makefile
- Markdown
- Nim
- OCaml
- Objective-C
- Odin
- PHP
- Perl
- PowerShell
- Python
- QML
- Red
- Ruby
- Rust
- Shell
- Solidity
- Swift
- TeX
- TypeScript
- V
- VBA
- Visual Basic
- Visual Basic .NET
- Vue
- YARA
- Zig
Repository for my flipper zero badUSB payloads. Now almost entirely plug and play.
List of all C2 communication methods, ranging from common (HTTP) to just weird (Spotify), including PoC code
Plugin to encode files into a minecraft map
We built an EEG to measure alpha waves for our high school project (Christelijk Gymnasium Utrecht).
dosbomb ia a dos tool that cuts off targets or surrounding infrastructure in a flood of Internet traffic
Find sites vulnerable to github subdomain takeover
A command-line productivity tool powered by AI large language models like GPT-4, will help you accomplish your tasks faster and more efficiently.
Open Source Intelligence Interface for Deep Web Scraping
Laser for control mosquito, weed, and pest
This repo contains : simple shellcode Loader , Encoders (base64 - custom - UUID - IPv4 - MAC), Encryptors (AES), Fileless Loader (Winhttp, socket)
Use SE_BACKUP_NAME/SeBackupPrivilege to access objects you shouldn't have access to
A fast, ergonomic and portable tensor library in Nim with a deep learning focus for CPU, GPU and embedded devices via OpenMP, Cuda and OpenCL backends
Stack based buffer overflows attacks made simple. BufferSploit is a semi automated CLI based tool for performing stack based buffer overflow attacks with ease.
Tool to search secrets in various filetypes.
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelistin…
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team…
Dump the memory of any PPL with a Userland exploit chain
This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and download and execute your C2-shellcode which is hosted on your (…
Various tips & tricks
Creative and unusual things that can be done with the Windows API.
BioIdentify is a command line tool for fingerprints feature extraction, 1on1 match and 1onN match .
evilsocket / RTL8814AU
Forked from nazar-pc/RTL8814AURealtek RTL8814AU USB Wi-Fi driver