Starred repositories
Reverse Engineering: Decompiling Binary Code with Large Language Models
a tools to run qemu automatically for simulate firmware of IoT
Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's Asteroid and Bug Bounty programs.
Aggregation of lists of malicious IP addresses (C2, malware, phishing), to be blocked in the LAN > WAN direction, integrated into firewalls: FortiGate, Palo Alto, pfSense, IPtables
A tool that shows detailed information about named pipes in Windows
Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data
A powerful, modular, lightweight and efficient command & control framework written in Nim.
A Model Context Protocol (MCP) server for creating, reading, and manipulating Microsoft Word documents. This server enables AI assistants to work with Word documents through a standardized interfac…
Burp extension to evade TLS fingerprinting. Bypass WAF, spoof any browser.
Tools for maintaining access to systems and proof-of-concept demonstrations.
🔥中文 prompt 精选🔥,ChatGPT 使用指南,提升 ChatGPT 可玩性和可用性!🚀
User-friendly Desktop Client App for AI Models/LLMs (GPT, Claude, Gemini, Ollama...)
Build Rust program to support Windows XP, Vista and more
Fix DecodePointer, EncodePointer,RegDeleteKeyEx etc. APIs not found in Windows XP RTM.
An HTTP client specifically developed for security researchers
An open source, portable, easy to use, readable and flexible TLS library, and reference implementation of the PSA Cryptography API. Releases are on a varying cadence, typically around 3 - 6 months …
Situational Awareness commands implemented using Beacon Object Files
The sysroot manager that lets you build and customize `std`