useful-gw
Popular repositories Loading
-
SnD_AMSI
SnD_AMSI PublicForked from whydee86/SnD_AMSI
Start new PowerShell without etw and amsi in pure nim
Nim
-
DInjector
DInjector PublicForked from snovvcrash/DInjector
Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL
C#
-
SharpLdapWhoami
SharpLdapWhoami PublicForked from bugch3ck/SharpLdapWhoami
WhoAmI by asking the LDAP service on a domain controller.
C#
-
Advanced-Process-Injection-Workshop
Advanced-Process-Injection-Workshop PublicForked from RedTeamOperations/Advanced-Process-Injection-Workshop
C++
-
PowerShellArmoury
PowerShellArmoury PublicForked from cfalta/PowerShellArmoury
A PowerShell armoury for security guys and girls
PowerShell
-
Invoke-SharpLoader
Invoke-SharpLoader PublicForked from S3cur3Th1sSh1t/Invoke-SharpLoader
PowerShell
Repositories
- AIstudioProxyAPI Public template Forked from CJackHwang/AIstudioProxyAPI
Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
- ecapture Public Forked from gojue/ecapture
Capturing SSL/TLS plaintext without a CA certificate using eBPF. Supported on Linux/Android kernels for amd64/arm64.
- CCT-APP-Prep Public Forked from root-at-iyn/CCT-APP-Prep
Preparation and notes for the Crest Certified Web Application Tester (CCT APP) exam
- BounceBack Public Forked from D00Movenok/BounceBack
↕️ 🤫 Stealth redirector for your red team operation security - sharem Public Forked from Bw3ll/sharem
SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also contains its own custom disassembler, with many innovative features, such as being able to show the deobfuscated disassembly of an encoded shellcode, or integrating emulation data to enhance the disassembly.
- kotori-plugins Public Forked from OreoCupcakes/kotori-plugins
Source code for my and ported RuneLite plugins
- S4UTomato Public Forked from wh0amitz/S4UTomato
Escalate Service Account To LocalSystem via Kerberos
People
This organization has no public members. You must be a member to see who’s a part of this organization.
Top languages
Loading…
Most used topics
Loading…