Stars
Tips and tricks for working with Large Language Models like OpenAI's GPT-4.
Collection of malware source code for a variety of platforms in an array of different programming languages.
Fast and customizable vulnerability scanner based on simple YAML based DSL.
Fast passive subdomain enumeration tool.
Take a list of domains and probe for working HTTP and HTTPS servers
Single GPU VFIO Passthrough Guide
Writing custom backdoor payloads with C# - Defcon 27 Workshop
Run macOS VM in a Docker! Run near native OSX-KVM in Docker! X11 Forwarding! CI/CD for OS X Security Research! Docker mac Containers.
Steganography brute-force utility to uncover hidden data inside files
List of API's for gathering information about phone numbers, addresses, domains etc
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
RandomX, KawPow, CryptoNight and GhostRider unified CPU/GPU miner and RandomX benchmark
🐧 A list of awesome Linux softwares
Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation
Lite version of my Gatekeeper backdoor for public use.
Katana - Automatic CTF Challenge Solver in Python3
Covenant is a collaborative .NET C2 framework for red teamers.
CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.
A list of resources for those interested in getting started in bug bounties
The repository to the scraper I was contracted to make in order to help Thomas Edison State University's open source materials accessibility initiative.