Lists (9)
Sort Name ascending (A-Z)
- All languages
- ASP.NET
- Assembly
- AutoIt
- Batchfile
- C
- C#
- C++
- CSS
- Classic ASP
- CodeQL
- Dart
- Dockerfile
- F#
- Go
- HCL
- HTML
- Hack
- Haskell
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kotlin
- Less
- Lua
- Makefile
- NASL
- NSIS
- Nim
- Objective-C
- PHP
- Pascal
- Perl
- PowerShell
- Python
- REXX
- Roff
- Ruby
- Rust
- SCSS
- Shell
- Smarty
- Solidity
- Swift
- Tcl
- TeX
- TypeScript
- VBA
- VBScript
- Visual Basic .NET
- Vue
- XSLT
- YARA
- Zig
Starred repositories
BugBoard: A comprehensive open-source cybersecurity tool for vulnerability detection and bug hunting.
Cobalt Strike BOF for evasive .NET assembly execution
Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's using GPT-4 Vision to analyze them and construct daily activ…
An advanced JWT extraction & decoding tool for bug bounty hunters! 🏴☠️
Awesome Large Language Models for Vulnerability Detection
An implementation of the ACL 2024 Findings paper "Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tuning".
Astral-PE is a low-level mutator (headers obfuscator) for native Windows PE files (x32/x64)
HavocExtender extends Havoc C2 with advanced modules for evasion, persistence, lateral movement, and post-exploitation. Designed for red teamers, it’s modular, open-source, and built to enhance off…
Assortment of scripts and tools for our Blackhat EU 2024 talk
Utilizing hardware breakpoints to evade monitoring by Endpoint Detection and Response platforms
Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection
Pack/Encrypt/Obfuscate ELF + SHELL scripts
reverse engineering random malwares
Extract and execute a PE embedded within a PNG file using an LNK file.
CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File
ArgFuscator.net is an open-source, stand-alone web application that helps generate obfuscated command lines for common system-native executables.
🛡️ Convenient .NET Library for Invoking Antimalware Scan Interface (AMSI)
This repository is a collection of terraform modules that automate the setting up of red team infrastructure in the cloud.
eBPF-based Linux high-performance transparent proxy solution.
A modern Rust implementation of the original Stardust project, providing a sophisticated 32/64-bit shellcode template that features position-independent code development, compile-time string hashin…
The Next Generation of Anti-Rookit(ARK) tool for Windows.
Templates for the King Phisher open source phishing campaign toolkit.
This is a collection of phishing templates and a landing page to be used with goPhish
AIHTTPAnalyzer revolutionizes web application security testing by bringing artificial intelligence capabilities to Burp Suite. This innovative extension harnesses the power of AI to automate vulner…