Block or Report
Block or report wisdark
Contact GitHub support about this user’s behavior. Learn more about reporting abuse.
Report abuseLists (24)
Sort Name ascending (A-Z)
ai & llm
asset discovery
backdoor
bruteforce
cloud security
command & control
detect & defend
entertainment
evasion & bypass
exploit
forensic analysis
industrial
lateral movement
misc & note
osint
persistence
post exploitation
privilege escalation
programming language
proxy & pivot
reverse engineering
web security
webshell
wireless
Stars
Language
Sort by: Recently starred
SysWhispers on Steroids - AV/EDR evasion via direct system calls.
Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit
This tool, programmed in C#, allows for the fast discovery and exploitation of vulnerabilities in MSSQL servers
Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation firewalls en route to the target.
CaveCarver - PE backdooring tool which utilizes and automates code cave technique
Jar Obfuscator - 一个 JAR/CLASS 字节码混淆工具,支持包名/类名/方法名/字段名/参数名引用分析和重命名混淆方式,支持字符串加密/整型异或混淆/垃圾代码花指令混淆/等方式,支持方法和字段的隐藏,支持 NATIVE 层的 JVMTI 代码加密,配置简单,文档教程齐全,容易上手
以 V2Ray(v4 版) 或 Xray、Nginx 或 Caddy(v2 版)、Hysteria 等打造常用科学上网的最优组合示例及优化配置,且提供集成特定插件的 Caddy(v2 版) 文件,分享给大家食用及自己备份。
🗜️ A packer for Windows x86 executable files written in C and Intel x86 Assembly. The new file after packing can obstruct reverse engineering.
Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry
PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges required )
A SOCKS proxy written in Python that randomizes your source IP address. Round-robin your evil packets through SSH tunnels or give them billions of unique source addresses!
Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework
code snippet provided demonstrates how to patch the EtwEventWrite function in the ntdll.dll library on Windows using CGO (C Go).
A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfvenom) by performing on-the-fly decryption of individual encry…
Interactively find and recover deleted or 👉 overwritten 👈 files from your terminal
tiny, portable SOCKS5 server with very moderate resource usage
heapdump敏感信息查询工具,例如查找 spring heapdump中的密码明文,AK,SK等
eBPF-based Linux high-performance transparent proxy solution.