-
Kali.inc
- China
-
08:48
(UTC -12:00)
Lists (4)
Sort Name ascending (A-Z)
Starred repositories
💫 Unofficial mirror of XN Resource Editor v3.0.0.1.
An open-source remote desktop application designed for self-hosting, as an alternative to TeamViewer.
A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
Collection of malware source code for a variety of platforms in an array of different programming languages.
Master the command line, in one page
Continuation of Clash Verge - A Clash Meta GUI based on Tauri (Windows, MacOS, Linux)
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
Cheat Engine. A development environment focused on modding
A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware. Brought to you by Winsider Seminars & Solutions, Inc. @ https://www.windows-internals…
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
Free and Open Source Reverse Engineering Platform powered by rizin
Portable Executable reversing tool with a friendly GUI
Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.
Pafish is a testing tool that uses different techniques to detect virtual machines and malware analysis environments in the same way that malware families do
The FLARE team's open-source tool to identify capabilities in executable files.
Comfortably monitor your Internet traffic 🕵️♂️
Windows CSC服务特权提升漏洞。 当程序向缓冲区写入的数据超出其处理能力时,就会发生基于堆的缓冲区溢出,从而导致多余的数据溢出到相邻的内存区域。这种溢出会损坏内存,并可能使攻击者能够执行任意代码或未经授权访问系统。本质上,攻击者可以编写触发溢出的恶意代码或输入,从而控制受影响的系统、执行任意命令、安装恶意软件或访问敏感数据。 微软已发出警告成功利用此漏洞的攻击者可以获得 SYSTEM…
Notepad++ official repository
Ghidra is a software reverse engineering (SRE) framework
UNIX-like reverse engineering framework and command-line toolset
该漏洞存在于 NtQueryInformationToken 函数中,特别是在处理AuthzBasepCopyoutInternalSecurityAttributes 函数时,该漏洞源于内核在操作对象时对锁定机制的不当管理,这一失误可能导致恶意实体意外提升权限。
Linux命令大全搜索工具,内容包含Linux命令手册、详解、学习、搜集。https://git.io/linux
PDF.js是由Mozilla维护的基于JavaScript的PDF查看器。此漏洞允许攻击者在打开恶意 PDF 文件后立即执行任意 JavaScript 代码。这会影响所有 Firefox 用户 (<126),因为 Firefox 使用 PDF.js 来显示 PDF 文件,但也严重影响了许多基于 Web 和 Electron 的应用程序,这些应用程序(间接)使用 PDF.js 进行预览功能。
Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.