Pinned Repositories
.tmux
🇫🇷 Oh My Tmux! Pretty & versatile tmux configuration made with ❤️ (imho the best tmux configuration that just works)
0x00sec_code
Code for my 0x00sec.org posts
100-gdb-tips
A collection of gdb tips. 100 maybe just mean many here.
7kbscan-RDP-Sniper
一款有图形界面的RDP(3389)口令检测工具
AFLplusplus
afl++ is afl 2.53b with community patches, AFLfast power schedules, qemu 3.1 upgrade + laf-intel support, MOpt mutators, InsTrim instrumentation, unicorn_mode and a lot more!
aflsmart
Smart Greybox Fuzzing
airspy
AirSpy - Frida-based tool for exploring and tracking the evolution of Apple's AirDrop protocol implementation on i/macOS, from the server's perspective. Released during BH USA 2019 Training https://www.nowsecure.com/event/advanced-frida-and-radare-a-hackers-delight/
AST_Webshell_Detect
A webshell detect engine by analysing AST of php scripte generated from PHP-Parser
justniffer
Justniffer Just A Network TCP Packet Sniffer .Justniffer is a network protocol analyzer that captures network traffic and produces logs in a customized way, can emulate Apache web server log files, track response times and extract all "intercepted" files from the HTTP traffic
Struts2-Vul
Apache Struts2 Vulnerability environment(S2-001 ~ S2-057)
0x6b7966's Repositories
0x6b7966/kata-containers
Kata Containers version 2.x repository. Kata Containers is an open source project and community working to build a standard implementation of lightweight Virtual Machines (VMs) that feel and perform like containers, but provide the workload isolation and security advantages of VMs. https://katacontainers.io/
0x6b7966/bap
Binary Analysis Platform
0x6b7966/Azure-Pentest
A collection of resources, tools and more for penetration testing and securing Microsofts cloud platform Azure.
0x6b7966/blackhat_wasm
blackhat usa 2022 I attended
0x6b7966/Bypass-AMSI
0x6b7966/CoWTools
Tools for analyzing Windows containers and break container's isolation
0x6b7966/CVE-2022-0847-DirtyPipe-Exploit
A root exploit for CVE-2022-0847 (Dirty Pipe)
0x6b7966/CVE-2022-23222
CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation
0x6b7966/CVE-2024-21626
PoC and Detection for CVE-2024-21626
0x6b7966/datadog-agent
Datadog Agent
0x6b7966/decap
This tool set can generate required capabilities for binaries. A system call to capability mapping is used to assign capability to the binary. Static analysis is performed to extract system calls from binary.
0x6b7966/e9patch
A powerful static binary rewriting tool
0x6b7966/EffectiveSan
Runtime type and bounds-error checking for C/C++
0x6b7966/HAKC
0x6b7966/hfi-nginx
0x6b7966/hfi-root
0x6b7966/krie
Linux Kernel Runtime Integrity with eBPF
0x6b7966/ksplit-artifacts
Artifacts for the paper "KSplit: Automating Device Driver Isolation"
0x6b7966/LeetCode_cpp
0x6b7966/lfi
Lightweight Fault Isolation (LFI): Practical, Efficient, and Secure Software Sandboxing
0x6b7966/llvm-course
Code examples used for the LAC LLVM course
0x6b7966/llvm-tutor
A collection of out-of-tree LLVM passes for teaching and learning
0x6b7966/LowFat
Lean C/C++ Bounds Checking with Low-Fat Pointers
0x6b7966/oss-fuzz-gen
LLM powered fuzzing via OSS-Fuzz.
0x6b7966/PermCheck
automatic detection of permission checks
0x6b7966/program-dependence-graph
A multithreading construction of program dependence graph
0x6b7966/RedFat
A binary hardening system
0x6b7966/ReZZan
0x6b7966/rootkit
0x6b7966/VulToolsKit
红队武器库漏洞利用工具合集整理