Stars
- All languages
- ASL
- ASP.NET
- Assembly
- Batchfile
- C
- C#
- C++
- CMake
- CSS
- Classic ASP
- Clojure
- Dart
- Dockerfile
- FreeMarker
- Go
- HTML
- Inno Setup
- Java
- JavaScript
- Kotlin
- Lua
- Meson
- Nim
- Objective-C
- PHP
- Perl
- PowerShell
- Python
- Rich Text Format
- Ruby
- Rust
- Scala
- Shell
- Smarty
- Swift
- TypeScript
- VBA
- VBScript
- Visual Basic
- Vue
- XSLT
- YARA
Capturing SSL/TLS plaintext without a CA certificate using eBPF. Supported on Linux/Android kernels for amd64/arm64.
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and th…
windows-kernel-exploits Windows平台提权漏洞集合
Fast and lightweight x86/x86-64 disassembler and code generation library
🌴Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file (提权漏洞合集)
Abusing impersonation privileges through the "Printer Bug"
Another Windows Local Privilege Escalation from Service Account to System
Cobalt Strike Aggressor 插件包
免杀,bypassav,免杀框架,nim,shellcode,使用nim编写的shellcode加载器
Windows 10 UAC bypass for all executable files which are autoelevate true .
0day安全_软件漏洞分析技术
Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.
hihttps是一款完整源码的高性能web应用防火墙,既支持传统WAF的所有功能如SQL注入、XSS、恶意漏洞扫描、密码暴力破解、CC、DDOS等ModSecurity正则规则,又支持无监督机器学习,自主对抗未知攻击。
Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind
A Bind Shell Using the Fax Service and a DLL Hijack
CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell