Lists (3)
Sort Name ascending (A-Z)
Stars
Academic project of Linux rootkit made for Bachelor Engineering Thesis.
Awesome EDR Bypass Resources For Ethical Hacking
🌐 The Internet OS! Free, Open-Source, and Self-Hostable.
Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations.
🚀🤖 Crawl4AI: Crawl Smarter, Faster, Freely. For AI.
Autonomous coding agent right in your IDE, capable of creating/editing files, executing commands, using the browser, and more with your permission every step of the way.
Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of encryption methods, including AES, XOR, DES, TLS, RC4, RSA …
GO Simple Tunnel - a simple tunnel written in golang
Fast create api by database.(Sqlite,MySQL,Postgresql,Microsoft SQL Server,MariaDb,Oracle)
FindUncommonShares is a Python script allowing to quickly find uncommon shares in vast Windows Domains, and filter by READ or WRITE accesses.
Remove AV/EDR Kernel ObRegisterCallbacks、CmRegisterCallback、MiniFilter Callback、PsSetCreateProcessNotifyRoutine Callback、PsSetCreateThreadNotifyRoutine Callback、PsSetLoadImageNotifyRoutine Callback...
Customizable Linux Persistence Tool for Security Research and Detection Engineering.
Payload encoding utility to effectively lower payload entropy.
《Hello 算法》:动画图解、一键运行的数据结构与算法教程。支持 Python, Java, C++, C, C#, JS, Go, Swift, Rust, Ruby, Kotlin, TS, Dart 代码。简体版和繁体版同步更新,English version ongoing
A multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷
Prowler is an Open Cloud Security tool for AWS, Azure, GCP and Kubernetes. It helps for continuos monitoring, security assessments and audits, incident response, compliance, hardening and forensics…