Highlights
- Pro
Stars
rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.
Collection of notebook guides created by the Brev.dev team!
1000+ DevOps Bash Scripts - AWS, GCP, Kubernetes, Docker, CI/CD, APIs, SQL, PostgreSQL, MySQL, Hive, Impala, Kafka, Hadoop, Jenkins, GitHub, GitLab, BitBucket, Azure DevOps, TeamCity, Spotify, MP3,…
basic concept for the latest windows wifi driver CVE
Prometheus exporter for custom eBPF metrics
IDS monitors a network or systems for malicious activity and protects a computer network from unauthorized access from users,including perhaps insider.
Instant Kubernetes-Native Application Observability
The best tool for finding one gadget RCE in libc.so.6
Build a database of libc offsets to simplify exploitation
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileg…
Indicators of Compromises (IOC) of our various investigations
🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)
Weaponizing the Linux Kernel (Hide Files/PID, SSH backdoors, SSL Sniffer, ...) by poking around eBPF/XDP
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
Course to get into Large Language Models (LLMs) with roadmaps and Colab notebooks.
Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.
eBPF-based Linux high-performance transparent proxy solution.
Learn and contribute by exploring blockchain attacks in detail. Maintained by Coinspect smart contract audit team, renowned for their top-tier smart contract audit services.
Killer is a super simple tool designed to bypass AV/EDR security tools using various evasive techniques.
YARA Rules I come across on the internet
A collection of eBPF programs demonstrating bad behavior, presented at DEF CON 29