Skip to content
View ben0's full-sized avatar

Block or report ben0

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

A curated list of awesome resources about Electron.js (in)security

613 63 Updated Mar 1, 2025

Open EDR public repository

C++ 2,381 460 Updated Jan 13, 2024

A centralized resource for previously documented WDAC bypass techniques

507 73 Updated Apr 25, 2024

Also known by Microsoft as Knifecoat 🌶️

C# 1,129 203 Updated Dec 22, 2022

Porting of mimikatz sekurlsa::logonpasswords, sekurlsa::ekeys and lsadump::dcsync commands

C# 995 137 Updated Nov 7, 2021

Comprehensive Python Cheatsheet

Python 36,994 6,589 Updated Mar 25, 2025

Powershell script to download and kick off Metasploit payloads. Relies on the exploit/multi/scripts/web_delivery metasploit module.

PowerShell 1 Updated Jun 22, 2016

win32k use-after-free poc

C 71 38 Updated Apr 22, 2020

HTML5 Training material for Attack and Secure training sessions.

JavaScript 43 25 Updated Feb 25, 2023

Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.

JavaScript 2,108 264 Updated Feb 25, 2023

A collection of Azure AD/Entra tools for offensive and defensive security purposes

Python 2,089 293 Updated Mar 27, 2025

Remote Desktop Protocol in RUST

Rust 239 42 Updated Nov 8, 2023

Walking the PEB in VBA

VBA 22 10 Updated Apr 6, 2020

Attack and defend active directory using modern post exploitation adversary tradecraft activity

4,553 1,060 Updated Nov 7, 2024

A collection of links related to Linux kernel security and exploitation

5,860 1,000 Updated Mar 3, 2025

An archive of low-level CTF challenges developed over the years

Python 624 64 Updated Nov 28, 2021

🔥 Web-application firewalls (WAFs) from security standpoint.

Python 6,566 1,088 Updated Oct 28, 2024

Top 100 Hacking & Security E-Books (Free Download)

5,889 1,187 Updated Jul 26, 2024
PowerShell 33 5 Updated Aug 9, 2019

List of Awesome Asset Discovery Resources

2,062 342 Updated Jan 22, 2025

Attack Surface Analyzer can help you analyze your operating system's security configuration for changes during software installation.

C# 2,807 284 Updated Feb 18, 2025

Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.

C 808 317 Updated Apr 11, 2023

Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.

C 60 26 Updated May 11, 2015

Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to.

Shell 7,254 358 Updated Jul 27, 2021

A hacky XSLT to convert nmap scan results into CherryTree format

XSLT 7 2 Updated May 29, 2018

📚 Freely available programming books

HTML 354,015 63,104 Updated Mar 27, 2025

MS17-010

Python 2,175 1,096 Updated Jun 20, 2023

USB / CD / DVD autorun password stealer

Batchfile 269 90 Updated Oct 27, 2019
Next
Showing results