Stars
- All languages
- ANTLR
- Arduino
- Assembly
- Batchfile
- BlitzBasic
- Boo
- C
- C#
- C++
- CSS
- Clojure
- Common Lisp
- Dockerfile
- G-code
- Go
- HCL
- HTML
- Hack
- Haskell
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- KiCad Layout
- Kotlin
- Lua
- Makefile
- Markdown
- OCaml
- Objective-C
- Objective-C++
- PHP
- Pascal
- Perl
- PowerShell
- Python
- REXX
- Rich Text Format
- Ruby
- Rust
- SCSS
- Shell
- Smarty
- Solidity
- Swift
- TypeScript
- Visual Basic
- Vue
- XSLT
- YAML
- YARA
- Zeek
SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai.
A collection of methods to learn who the owner of an IP address is.
Example of an Android app for testing libusb with Java and C++.
AI Red Teaming playground labs to run AI Red Teaming trainings including infrastructure.
navgix is a multi-threaded golang tool that will check for nginx alias traversal vulnerabilities
Python3 utility for creating zip files that smuggle additional data for later extraction
JavaScript Robotics and IoT programming framework, developed at Bocoup.
Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)
Collection of Notes and CheatSheets used for Red teaming Certs
This repo is a compilation of code and resources for multiple SDR Platforms as part of a phased array beamforming project.
Everything can be pink noise if you try hard enough!
Set of tools to assess and improve LLM security.
Web browser forensics for Google Chrome/Chromium
Cobalt Strike profile generator using Jenkins to automate the heavy lifting
SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.
xforcered / RemoteMonologue
Forked from 3lp4tr0n/RemoteMonologueWeaponizing DCOM for NTLM Authentication Coercions
An experimental high-performance DNS query bruteforce tool built with AF_XDP for extremely fast and accurate bulk DNS lookups.
A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate suspicious activities.
RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact
A preconfigured Velociraptor triage collector
Adversary simulation and Red teaming platform with AI