- All languages
- ASP
- ActionScript
- Assembly
- AutoIt
- Batchfile
- BitBake
- BlitzBasic
- C
- C#
- C++
- CMake
- CSS
- Classic ASP
- CodeQL
- Dart
- Dockerfile
- Elixir
- FreeMarker
- Go
- HCL
- HTML
- Haskell
- Hy
- Inno Setup
- Java
- JavaScript
- Jinja
- Julia
- Jupyter Notebook
- Kotlin
- LLVM
- Lua
- Makefile
- Markdown
- Mask
- Max
- Nim
- Nix
- OCaml
- Objective-C
- OpenSCAD
- PHP
- Pascal
- Perl
- PowerShell
- Python
- QMake
- REXX
- Raku
- Rich Text Format
- Roff
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Smali
- Smarty
- Solidity
- SourcePawn
- Swift
- TSQL
- TeX
- TypeScript
- VBA
- VBScript
- Visual Basic
- Visual Basic .NET
- Vue
- XSLT
- YARA
- Zeek
Starred repositories
A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server.
SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.
This SDK is now deprecated, use the new unified Google GenAI SDK.
Dify is an open-source LLM app development platform. Dify's intuitive interface combines AI workflow, RAG pipeline, agent capabilities, model management, observability features and more, letting yo…
this repo holds entries for vulnurable drivers i decided to reverse engineer on my own, these are usually based on logical vulnurabilities that were caused by bad driver writing skills
This is the AV ("protection solution") used for my windows 10 rootkit main project. this includes the installer stager program, a service to perform automatic UM operations on boot and the protecti…
A Hyper-V Hacking Framework For Windows 10 x64 (AMD & Intel)
Elevate arbitrary MSR writes to kernel execution.
Library to manipulate drivers that expose a physical memory read/write primitive.
LLVM fork with explicit compatibility with MSVC 2022 features.
Instant voice cloning by MIT and MyShell. Audio foundation model.
A visualized overview of the Initial Access Broker (IAB) cybercrime landscape
A curated list of prompts, tools, and resources regarding the GPT-4 language model.
Awesome AI GPTs, OpenAI GPTs, GPT-4, ChatGPT, GPTs, Prompts, plugins, Prompts leaking
Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).
A repository for tracking events related to the MOVEit Transfer Cl0p Campaign
Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enabling users to conduct malware analysis.
The Threat Actor Profile Guide for CTI Analysts
Use hardware breakpoint to dynamically change SSN in run-time
Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.
A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage PowerShell reverse shell.
1 min voice data can also be used to train a good TTS model! (few shot voice cloning)