-
Bad Sector Labs
- blog.badsectorlabs.com
- https://ludus.cloud
- @badsectorlabs
Lists (5)
Sort Name ascending (A-Z)
Stars
- All languages
- ASP.NET
- AppleScript
- Assembly
- AutoIt
- Awk
- Batchfile
- Bicep
- Boo
- C
- C#
- C++
- CMake
- CSS
- Clojure
- CoffeeScript
- Crystal
- Cypher
- Dart
- Dockerfile
- Earthly
- Elixir
- F#
- GLSL
- Gherkin
- Go
- HCL
- HTML
- Hack
- Haskell
- Inno Setup
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kotlin
- LLVM
- Less
- Lua
- Makefile
- Max
- Mojo
- Nim
- OCaml
- Objective-C
- Objective-C++
- OpenSCAD
- PHP
- Pascal
- Perl
- PostScript
- PowerShell
- Python
- Rich Text Format
- Roff
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Slash
- Smali
- Smarty
- Solidity
- Svelte
- Swift
- SystemVerilog
- TSQL
- TypeScript
- VBA
- VBScript
- Vala
- Vim Script
- Visual Basic
- Visual Basic .NET
- Vue
- XSLT
- YARA
- Zeek
- Zig
Official code for "F5-TTS: A Fairytaler that Fakes Fluent and Faithful Speech with Flow Matching"
🕸️ Blazing fast GraphQL endpoints finder using subdomain enumeration, scripts analysis and bruteforce. 🕸️
A tool for finding security issues in GitHub Actions setups.
Flexible and powerful framework for managing multiple AI agents and handling complex conversations
ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them
chryzsh / linux_bof
Forked from outflanknl/linux_bof_templateELF Beacon Object File (BOF) Template
Exploiting the KsecDD Windows driver through Server Silos
A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders implemented by C2 beacons) or other problematic executables tha…
Complete list of LPE exploits for Windows (starting from 2023)
This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone is created, it utilizes MINIDUMP_CALLBACK_INFORMATION callb…
Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advanced techniques to dump memory, allowing to access sensitive da…
Python implementation of GhostPack's Seatbelt situational awareness tool
Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE
Open-source live-chat, email support, omni-channel desk. An alternative to Intercom, Zendesk, Salesforce Service Cloud etc. 🔥💬
.NET post-exploitation toolkit for Active Directory reconnaissance and exploitation
Automatically detect potential vulnerabilities and analyze repository metrics to prioritize open source security research targets
OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts. This is a client tool used to communicate with the primary…
OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts.