Stars
Alternative implement of Taiwan NHI smart-card agent
This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.
Software to identify the different types of hashes -
Transparent proxy server that works as a poor man's VPN. Forwards over ssh. Doesn't require admin. Works with Linux and MacOS. Supports DNS tunneling.
Reverse shell generator written in Python 3.
Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
Hunt down social media accounts by username across social networks
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
[Linux] Two Privilege Escalation techniques abusing sudo token
Ghidra is a software reverse engineering (SRE) framework
Native Language Security Startup
simple compiler based on mingw to build uncrackable windows application against analysis tools
An evil RAT (Remote Administration Tool) for macOS / OS X.
Useful Plugin for IDA to Trace Function Call Tree
windows-kernel-exploits Windows平台提权漏洞集合
Node.js Production Process Manager with a built-in Load Balancer.
VMware Escape Exploit before VMware WorkStation 12.5.5
3D reproduction of TSA Master keys
A little tool to play with Windows security
This project contains a PoC and exploit generator for a code execution bug in Ubuntu's Apport crash reporter
BitSpec is a devmem helper to enhance the readability of the output