Skip to content
View Ryuki233's full-sized avatar

Block or report Ryuki233

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
54 stars written in C
Clear filter

Capturing SSL/TLS plaintext without a CA certificate using eBPF. Supported on Linux/Android kernels for amd64/arm64.

C 13,935 1,474 Updated Feb 26, 2025

Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and th…

C 9,730 2,303 Updated Mar 17, 2024

windows-kernel-exploits Windows平台提权漏洞集合

C 8,219 2,846 Updated Jun 11, 2021

Defeating Windows User Account Control

C 6,604 1,333 Updated Feb 12, 2025

Fast and lightweight x86/x86-64 disassembler and code generation library

C 3,601 438 Updated Feb 16, 2025

🌴Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file (提权漏洞合集)

C 2,967 668 Updated Feb 15, 2023

LKM Linux rootkit

C 2,666 586 Updated Mar 7, 2021

generate CobaltStrike's cross-platform payload

C 2,359 348 Updated Nov 20, 2023

Abusing impersonation privileges through the "Printer Bug"

C 1,943 338 Updated Sep 10, 2020

Open-Source Shellcode & PE Packer

C 1,912 328 Updated Feb 3, 2024

The swiss army knife of LSASS dumping

C 1,875 248 Updated Sep 17, 2024

LoadLibrary for offensive operations

C 1,119 206 Updated Oct 22, 2021

Another Windows Local Privilege Escalation from Service Account to System

C 1,069 129 Updated Jan 9, 2021

Dirty Cow exploit - CVE-2016-5195

C 877 426 Updated Apr 8, 2021

AV Evasion Tool For Red Team Ops

C 757 153 Updated Dec 8, 2021

内网域渗透小工具

C 723 130 Updated Apr 20, 2021

Cobalt Strike Aggressor 插件包

C 671 99 Updated Aug 31, 2021

免杀,bypassav,免杀框架,nim,shellcode,使用nim编写的shellcode加载器

C 650 120 Updated Feb 18, 2025

Windows Elevation(持续更新)

C 648 167 Updated Feb 19, 2022

Windows 10 UAC bypass for all executable files which are autoelevate true .

C 638 115 Updated Dec 9, 2019

0day安全_软件漏洞分析技术

C 623 248 Updated Mar 7, 2018

Various Cobalt Strike BOFs

C 614 56 Updated Oct 16, 2022

Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.

C 608 110 Updated Aug 5, 2022

hihttps是一款完整源码的高性能web应用防火墙,既支持传统WAF的所有功能如SQL注入、XSS、恶意漏洞扫描、密码暴力破解、CC、DDOS等ModSecurity正则规则,又支持无监督机器学习,自主对抗未知攻击。

C 566 185 Updated Jun 6, 2024

Encrypted PE Loader Generator

C 539 107 Updated Aug 13, 2021

Syscall免杀

C 505 57 Updated Jun 21, 2024

Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind

C 441 75 Updated Jul 12, 2023

CVE-2022-25636

C 428 83 Updated Mar 7, 2022

A Bind Shell Using the Fax Service and a DLL Hijack

C 326 85 Updated May 3, 2020

CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell

C 323 71 Updated Jan 21, 2020
Next