Stars
An open-source post-exploitation framework for students, researchers and developers.
A font family with a great monospaced variant for programmers.
cryptography is a package designed to expose cryptographic primitives and recipes to Python developers.
🚅 Interactive prompts made simple. Build a prompt like stacking blocks.
Cinder is Meta's internal performance-oriented production version of CPython.
automated censorship evasion for the client-side and server-side
A Deep Learning Approach for Password Guessing (https://arxiv.org/abs/1709.00440)
Security Research from the Microsoft Security Response Center (MSRC)
Automatically Collect POC or EXP from GitHub by CVE ID.
Active Directory ACL exploitation with BloodHound
A list of methods to coerce a windows machine to authenticate to an attacker-controlled machine through a Remote Procedure Call (RPC) with various protocols.
Information released publicly by NCC Group's Cyber Incident Response Team
Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)
Efficient Deobfuscation of Linear Mixed Boolean-Arithmetic Expressions
Payload encoding utility to effectively lower payload entropy.