- Ho Chi Minh city
-
10:55
(UTC +07:00)
Highlights
- Pro
Lists (5)
Sort Name ascending (A-Z)
Stars
This tool can load JPEG images while preserving MCU (Minimum Coded Unit) coding data and allows editing at MCU level. The purpose is to correct artifacts resulting from data corruption in JPEG files.
DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital Forensics, Incident Response, Malware Analysis and Threat Hunting.
🐞Soothing pastel theme for IDA (Interactive Disassembler)
GoRE - Package gore is a library for analyzing Go binaries
A repository of credential stealer formats
GHOSTS is a realistic user simulation framework for cyber experimentation, simulation, training, and exercise
Post Exploitation agent which uses a browser to do C2 operations.
Windows Remote Administration Tool that uses Discord, Telegram and GitHub as C2s
GoodbyeDPI — Deep Packet Inspection circumvention utility (for Windows)
Starkiller is a Frontend for PowerShell Empire.
IDA Pro plugin which improves work with HexRays decompiler and helps in process of reconstruction structures and classes
A discord bot that runs a game of Werewolf.
Real-time, container-based file scanning at enterprise scale
A protective and Low Level Shellcode Loader that defeats modern EDR systems.
A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities
A Hugo theme to host Capture-The-Flag (CTF) challenges as a static website like hackropole.fr.
This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation includes written tools, C2 servers, backdoors, exploitation tech…
Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike & Empire.