Eazor's Stars
ChrisTheCoolHut/Zeratool
Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems
DeimosC2/DeimosC2
DeimosC2 is a Golang command and control framework for post-exploitation.
rootkit-io/awesome-malware-development
Organized list of my malware development resources
Orange-Cyberdefense/GOAD
game of active directory
atxsinn3r/VulnCases
Vulnerability examples.
analang/ana
muleyo/VideoAdBlockForTwitch
Blocks Ads on Twitch.tv.
tihanyin/PSSW100AVB
A list of useful Powershell scripts with 100% AV bypass (At the time of publication).
TheDistroHopper/i3wm-nord
These are my i3wm config files, inspired by nord-theme
sundaysec/Android-Exploits
A collection of android Exploits and Hacks
Arinerron/CVE-2022-0847-DirtyPipe-Exploit
A root exploit for CVE-2022-0847 (Dirty Pipe)
sysdream/ligolo
Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/
7h3h4ckv157/Binary-exploitation-series
A series of writes about “Binary Exploitation”.
MimicLynx/GotHosts
Simple subnet host discovery tool written in bash. uses nmap and fping to generate a list of active hosts for further enumeration.
ToKKaN/better-external-backtrack
improved external backtrack
NoraCodes/crackmes
Some CrackMe codes for Linux x86/x86_64
plackyhacker/Shellcode-Injection-Techniques
A collection of C# shellcode injection techniques. All techniques use an AES encrypted meterpreter payload. I will be building this project up as I learn, discover or develop more techniques. Some techniques are better than others at bypassing AV.
0vercl0k/rp
rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.
KooroshRZ/Windows-DLL-Injector
Some DLL Injection techniques in C++ implemented for both x86 and x64 windows OS processes
saeidshirazi/awesome-android-security
A curated list of Android Security materials and resources For Pentesters and Bug Hunters
mytechnotalent/Reverse-Engineering
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM and embedded RISC-V architectures.
sysprog21/lkmpg
The Linux Kernel Module Programming Guide (updated for 5.0+ kernels)
wtsxDev/reverse-engineering
List of awesome reverse engineering resources
0x4143/malware-gems
A not so awesome list of malware gems for aspiring malware analysts
hardik05/Damn_Vulnerable_C_Program
An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.
PowerShellMafia/PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework
Avielyo10/DNS-Amplification-Lab
Using Scapy for DNS amplification
tony2037/Dns-Amplification-Attack
Dns amplification attack
ethanwilloner/DNS-Amplification-Attack
chris408/ct-exposer
An OSINT tool that discovers sub-domains by searching Certificate Transparency logs