Stars
Alternative implement of Taiwan NHI smart-card agent
This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.
Software to identify the different types of hashes -
Transparent proxy server that works as a poor man's VPN. Forwards over ssh. Doesn't require admin. Works with Linux and MacOS. Supports DNS tunneling.
Reverse shell generator written in Python 3.
Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
Hunt down social media accounts by username across social networks
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
[Linux] Two Privilege Escalation techniques abusing sudo token
Ghidra is a software reverse engineering (SRE) framework
Native Language Security Startup
simple compiler based on mingw to build uncrackable windows application against analysis tools
An evil RAT (Remote Administration Tool) for macOS / OS X.
Useful Plugin for IDA to Trace Function Call Tree
Know the dangers of credential reuse attacks.
windows-kernel-exploits Windows平台提权漏洞集合
Node.js Production Process Manager with a built-in Load Balancer.
VMware Escape Exploit before VMware WorkStation 12.5.5
3D reproduction of TSA Master keys