Highlights
- Pro
Lists (22)
Sort Name ascending (A-Z)
AD tradecraft
Attacking LLMs
BOFLoaders
BOFLoaders - No specific languageC2 frameworks
Cloud red team
Detection
Detection engineering
Evasion tradecraft
Fuzzing
Infra
Jailbreak
Linux tradecraft
LLVM-obfuscators
macOS tradecraft
Methodologies
Red team / Pentest methodologiesPE Loaders
Rootkits
Rust Features
Training
Training Labs
Web testing
Windows dev tools
Tools to help with dev or RE on windows.Starred repositories
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
xoreaxeaxeax / movfuscator
Forked from Battelle/movfuscatorThe single instruction C compiler
A command line tool that recreates the famous data decryption effect seen in the 1992 movie Sneakers.
Program to decode radio transmissions from devices on the ISM bands (and other frequencies)
The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power schedules, MOpt mutators, unicorn_mode, and a lot more!
tinyproxy - a light-weight HTTP/HTTPS proxy daemon for POSIX operating systems
Rust-for-Linux / linux
Forked from torvalds/linuxAdding support for the Rust language to the Linux kernel.
A tool to dump the login password from the current linux user
Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
A small utility to modify the dynamic linker and RPATH of ELF executables
Dopamine is a semi-untethered jailbreak for iOS 15 and 16
Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loading of a library from memory into a host process.
Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 9…
A post exploitation framework designed to operate covertly on heavily monitored environments
Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
Rune is a programming language developed to test ideas for improving security and efficiency.
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)
A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.
A C Compiler that fits in the 512 byte boot sector of an x86 machine