- All languages
- Arduino
- Assembly
- Batchfile
- BitBake
- Boo
- C
- C#
- C++
- CMake
- CSS
- CoffeeScript
- Dart
- Dockerfile
- EJS
- Go
- HCL
- HTML
- Hack
- Haskell
- Inno Setup
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kaitai Struct
- Kotlin
- Lua
- MATLAB
- Nim
- Objective-C
- PHP
- Pascal
- Perl
- PowerShell
- Python
- Roff
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Smali
- TypeScript
- VBA
- Visual Basic
- Visual Basic .NET
- Vue
- XSLT
- YARA
- Zig
Starred repositories
ViPER4Android FX with Material You design and improvements
Generate Professional Phishing Emails Templates Fast And Easy
Generate Professional Phishing Emails Fast And Easy
Bug Bounty stuffs, payloads, scripts, profiles, tips and tricks, ...
a few install files for kali, should be used on a brand new install of kali
A Red Team tool for remotely manipulating Group Policy Object(GPO), Organizational Unit(OU), GPLink and Security Filtering
This turns ChatGPT into a prompt generating machine that acceps only predefined inputs and responds with only predefined outputs.
An insane list of all dorks taken from everywhere from various different sources.
The most advanced browser fingerprinting library.
ScriptIdiot / FaceDancer
Forked from Tylous/FaceDancerFaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loading
Payload Generation Framework
ScriptIdiot / Chrome-App-Bound-Encryption-Decryption
Forked from xaitax/Chrome-App-Bound-Encryption-DecryptionTool to decrypt App-Bound encrypted keys in Chrome 127+, using the IElevator COM interface with path validation and encryption protections.
ScriptIdiot / SharpRedirect
Forked from lsecqt/SharpRedirectSimple C# Redirector
ScriptIdiot / TokenSmith
Forked from JumpsecLabs/TokenSmithTokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and penetration tests with the tokens generated working out of t…
Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process
A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
Manually perform syscalls without going through any external API or DLL.
A library of pretexts to use on offensive phishing engagements.
🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python
ihebski / MalwareDatabase
Forked from Endermanch/MalwareDatabaseThis repository is one of a few malware collections on the GitHub.