Hutt0n0's Stars
practical-tutorials/project-based-learning
Curated list of project-based tutorials
All-Hands-AI/OpenHands
🙌 OpenHands: Code Less, Make More
termux/termux-app
Termux - a terminal emulator application for Android OS extendible by variety of packages.
istio/istio
Connect, secure, control, and observe services.
cilium/ebpf
ebpf-go is a pure-Go library to read, modify and load eBPF programs and attach them to various hooks in the Linux kernel.
xaoyaoo/PyWxDump
获取微信信息;读取数据库,本地查看聊天记录并导出为csv、html等格式用于AI训练,自动回复等。支持多账户信息获取,支持所有微信版本。
Ne0nd0g/merlin
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
Mikaelemmmm/go-zero-looklook
🔥基于go-zero(go zero) 微服务全技术栈开发最佳实践项目。Develop best practice projects based on the full technology stack of go zero (go zero) microservices.
greycodee/wechat-backup
微信聊天记录持久化备份本地硬盘,释放手机存储空间。
ambionics/phpggc
PHPGGC is a library of PHP unserialize() payloads along with a tool to generate them, from command line or programmatically.
abcz316/SKRoot-linuxKernelRoot
新一代SKRoot,挑战全网root检测手段,跟面具完全不同思路,摆脱面具被检测的弱点,完美隐藏root功能,全程不需要暂停SELinux,实现真正的SELinux 0%触碰,通用性强,通杀所有内核,不需要内核源码,直接patch内核,兼容安卓APP直接JNI调用,稳定、流畅、不闪退。
mpaland/printf
Tiny, fast, non-dependent and fully loaded printf implementation for embedded systems. Extensive test suite passing.
tyilo/insert_dylib
Command line utility for inserting a dylib load command into a Mach-O binary
lasting-yang/frida_hook_libart
Frida hook some jni functions
l3m0n/Bypass_Disable_functions_Shell
一个各种方式突破Disable_functions达到命令执行的shell
SeeFlowerX/stackplz
基于eBPF的堆栈追踪工具
Le0nsec/SecCrawler
一个方便安全研究人员获取每日安全日报的爬虫和推送程序,目前爬取范围包括先知社区、安全客、Seebug Paper、跳跳糖、奇安信攻防社区、棱角社区以及绿盟、腾讯玄武、天融信、360等实验室博客,持续更新中。
sajjadium/ctf-archives
CTF Archives: Collection of CTF Challenges.
outlaws-bai/Galaxy
一个想让你测试加密流量像测试明文一样简单高效的 Burp 插件。 A Burp plugin that makes testing encrypted traffic as simple and efficient as testing plaintext.
TKkk-iOSer/TKTweakDemo
iOS 逆向 -- 简单 hook 微信,实现hello World
BeichenDream/InjectJDBC
注入JVM进程 动态获取目标进程连接的数据库
pl4int3xt/cve_2024_0044
CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions 12 and 13
CrossC2/CrossC2Kit
CrossC2 developed based on the Cobalt Strike framework can be used for other cross-platform system control. CrossC2Kit provides some interfaces for users to call to manipulate the CrossC2 Beacon session, thereby extending the functionality of Cobalt Strike.
timob/jnigi
Golang Java JNI library
safebuffer/CVE-2024-32002
CVE-2024-32002 RCE PoC
Rvn0xsy/DumperAnalyze
通过JavaAgent与Javassist技术对JVM加载的类对象进行动态插桩,可以做一些破解、加密验证的绕过等操作
outflanknl/linux_bof_template
ELF Beacon Object File (BOF) Template
mbadanoiu/CVE-2024-22274
CVE-2024-22274: Authenticated Remote Code Execution in VMware vCenter Server
cosycode/bit-data-map
比特数据图片, 一种以图片信息的形式传递数据的方式, 已上传至**仓库
mbadanoiu/CVE-2024-22275
CVE-2024-22275: Partial File Read in VMware vCenter Server