Stars
- All languages
- ActionScript
- Assembly
- Astro
- AutoHotkey
- Awk
- Batchfile
- C
- C#
- C++
- CSS
- Common Lisp
- D
- Dockerfile
- Go
- HCL
- HTML
- Haskell
- Java
- JavaScript
- Jupyter Notebook
- LLVM
- Lean
- Lua
- Makefile
- Meson
- OCaml
- Objective-C
- Objective-C++
- PHP
- POV-Ray SDL
- Pascal
- Perl
- PowerShell
- Python
- R
- REXX
- Roff
- Ruby
- Rust
- SCSS
- Scala
- Scheme
- Shell
- Swift
- TSQL
- Tcl
- TeX
- TypeScript
- VHDL
- Vue
- WebAssembly
- XSLT
- YARA
Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extracting the malware's final stage configuration.
This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation includes written tools, C2 servers, backdoors, exploitation tech…
IDA plugin which queries uses language models to speed up reverse-engineering
SysWhispers on Steroids - AV/EDR evasion via direct system calls.
Fast passive subdomain enumeration tool.
A reference of Windows API function calls, including functions for file operations, process management, memory management, thread management, dynamic-link library (DLL) management, synchronization,…
A resource containing all the tools each ransomware gangs uses
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.
Hijacking valid driver services to load arbitrary (signed) drivers abusing native symbolic links and NT paths
BadZure orchestrates the setup of Azure AD tenants, populating them with diverse entities while also introducing common security misconfigurations to create vulnerable tenants with multiple attack …
A collection of fascinating and bizarre Censys Search Queries
A spy pixel which can be emedded into web pages or emails.
☁️ Collaborative Malware Analysis Platform at Scale
This cheat sheet contains common enumeration and attack methods for Windows Active Directory with the use of powershell.
Advanced SQL Injection Techniques for Bug Bounty Hunters
A collection of awesome security hardening guides, tools and other resources