Skip to content
View kernel-sanders's full-sized avatar

Block or report kernel-sanders

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Your next YouTube media manager

Elixir 1,301 23 Updated Nov 21, 2024

Mythic C2 Agent written in x64 PIC C

C 32 2 Updated Nov 20, 2024

Official code for "F5-TTS: A Fairytaler that Fakes Fluent and Faithful Speech with Flow Matching"

Python 7,374 890 Updated Nov 23, 2024

💪🏻 htop on steroids

Svelte 4,172 127 Updated Nov 20, 2024

🕸️ Blazing fast GraphQL endpoints finder using subdomain enumeration, scripts analysis and bruteforce. 🕸️

Python 197 12 Updated May 22, 2023

A tool for finding security issues in GitHub Actions setups.

Rust 374 19 Updated Nov 22, 2024

Flexible and powerful framework for managing multiple AI agents and handling complex conversations

TypeScript 1,880 120 Updated Nov 22, 2024

CVE-2024-30090 - LPE PoC

C 95 21 Updated Oct 17, 2024

QEMU for Rust, and Rust for QEMU

Rust 58 4 Updated Aug 29, 2024

ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together

C++ 382 41 Updated Jan 15, 2023

This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them

7,178 1,373 Updated Sep 25, 2024

Tailscale Docker Proxy

Go 317 11 Updated Nov 23, 2024

ELF Beacon Object File (BOF) Template

C 19 Updated Nov 18, 2024

TokenCert

C# 86 10 Updated Nov 15, 2024
Python 8 2 Updated Oct 29, 2024

Exploiting the KsecDD Windows driver through Server Silos

C++ 24 4 Updated Nov 11, 2024

A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders implemented by C2 beacons) or other problematic executables tha…

C++ 238 43 Updated Oct 7, 2024

Human-readable ANSI sequences 🪩

Go 491 6 Updated Nov 22, 2024

Complete list of LPE exploits for Windows (starting from 2023)

C++ 409 59 Updated Nov 14, 2024

This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone is created, it utilizes MINIDUMP_CALLBACK_INFORMATION callb…

C++ 169 25 Updated Oct 19, 2024

A blind SQL injection brute forcer

Python 81 8 Updated Nov 20, 2024

Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advanced techniques to dump memory, allowing to access sensitive da…

C++ 310 54 Updated Nov 19, 2024

Python implementation of GhostPack's Seatbelt situational awareness tool

Python 204 12 Updated Nov 12, 2024

Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE

Python 161 22 Updated Nov 12, 2024

Open-source live-chat, email support, omni-channel desk. An alternative to Intercom, Zendesk, Salesforce Service Cloud etc. 🔥💬

Ruby 21,309 3,604 Updated Nov 23, 2024

.NET post-exploitation toolkit for Active Directory reconnaissance and exploitation

C# 220 23 Updated Nov 3, 2024

tun2socks - powered by gVisor TCP/IP stack

Go 3,395 461 Updated Nov 12, 2024

Automatically detect potential vulnerabilities and analyze repository metrics to prioritize open source security research targets

Go 184 18 Updated Nov 16, 2024

OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts. This is a client tool used to communicate with the primary…

Go 2 1 Updated Oct 26, 2024

OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts.

Go 14 1 Updated Oct 27, 2024
Next