-
My own!
Stars
- All languages
- Assembly
- Batchfile
- Bicep
- C
- C#
- C++
- CSS
- Clojure
- Dockerfile
- Elixir
- Erlang
- Go
- HTML
- Hack
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kotlin
- Lua
- Makefile
- Nim
- Objective-C
- PHP
- Pascal
- Perl
- PowerShell
- Python
- R
- REXX
- Rich Text Format
- Roff
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Svelte
- TypeScript
- VBA
- Vim Script
- Visual Basic
- Vue
- XSLT
- YAML
- YARA
- Zeek
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and th…
Course materials for Modern Binary Exploitation by RPISEC
NAXSI is an open-source, high performance, low rules maintenance WAF for NGINX
A tool to dump the login password from the current linux user
Simple (relatively) things allowing you to dig a bit deeper than usual.
A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)
A post exploitation framework designed to operate covertly on heavily monitored environments
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Windows tool for dumping malware PE files from memory back to disk for analysis.
A network sniffer that logs all DNS server replies for use in a passive DNS setup
FUSE driver to read/write Windows' BitLocker-ed volumes under Linux / Mac OSX
Rock solid distributed database specializing in active/active automatic failover and WAN replication
Driver loader for bypassing Windows x64 Driver Signature Enforcement
Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detections and correlation rules by Blue teams.
Active Directory Control Paths auditing and graphing tools
Leaked Linux.Mirai Source Code for Research/IoC Development Purposes