Lists (23)
Sort Name ascending (A-Z)
ActiveDirectory
Android
AzureAD | EntraID
blue
cloud
config
linux desktop config aesthetixdev
flipper
GameHacking
infra & self-host
learn
MalDev
Projects related to Malware Developmentneovim
Obsidian
OT | IoT
pwn
recon
red
rev
vuln
web
Windows
wireless
- All languages
- ASP
- Assembly
- AutoIt
- Batchfile
- Boo
- C
- C#
- C++
- CMake
- CSS
- Classic ASP
- Dart
- Dockerfile
- F#
- Go
- HCL
- HTML
- Haskell
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kotlin
- LLVM
- Lua
- Makefile
- Markdown
- Meson
- Nim
- Nix
- Objective-C
- OpenSCAD
- PHP
- Pascal
- Perl
- PowerShell
- Python
- QML
- Roff
- Ruby
- Rust
- SCSS
- Sass
- Scheme
- Shell
- Smarty
- Svelte
- Swift
- TeX
- TypeScript
- VBScript
- Vim Script
- Vue
- XSLT
- YARA
- Zig
Starred repositories
Toolkit to explore DoH-based data exfiltration: configurable client, on-box DoH infra, captures, detection.
stack based arithmetic only virtual machine (VM) executes bytecode instructions to perform various basic arithmetic operations and manage stack manipulations.
Home to the Signal Protocol as well as other cryptographic primitives which make Signal possible.
A curated compilation of extensive resources dedicated to bootkit and rootkit development.
An implementation of Shazam's song recognition algorithm.
A project for generating C bindings from Rust code
PHPFuck: ([+.^]) / Using only 7 different characters to write and execute php.
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wis…
A simple tool for reading in poorly redacted documents and reproducing their origional form
An example of a client and server using Windows' ALPC functions to send and receive data.
A simple POC to show how to chain multiple callbacks via tail calls to artificially construct a call stack
UEFI Shell binary images, generated from EDK2 stable
Executing Kernel Routines via Syscall Table Hijack (Kernel Code Execution)
Command channel that uses Wi-Fi Beacons as a unidirectional C2 transport
Beacon Object Files (BOFs) for Cobalt Strike and Havoc C2. Implementations of Active Directory attacks and post-exploitation techniques.
Milvus is a high-performance, cloud-native vector database built for scalable vector ANN search
a high-performance, POSIX-ish Amazon S3 file system written in Go
Mirror of https://codeberg.org/whitequark/nixos-forgejo-actions-runner
Extract data from modern Chrome versions, including refresh tokens, cookies, saved credentials, autofill data, browsing history, and bookmarks
Windows Kernel Driver Development in C# with Windows Driver Kit (WDK)
Analyze HTTP and DNS requests and create custom DNS records for your subdomain
Fast exfiltration of text using only CSS and Ligatures
Beacon Object File for Cobalt Strike that executes .NET assemblies in beacon with evasion techniques.
Automated static analysis tools for binary programs
Easily and securely send things from one computer to another 🐊 📦