Ma3k4H3d
Are you a slacker? Study as if you were to live forever, live as if you were to die tomorrow.
Pinned Repositories
2020-QWB-PWN
PWN & Reverse
2021_Hvv
2021 hw
AEG
the auto heap exploit analysis based on Angr
APT_CyberCriminal_Campagin_Collections
APT & CyberCriminal Campaign Collection
ArcHeap
ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives
GithubHack
Collect some repository about github hack
Malware_SourceCode
collect malware source code
SomeCollections
Collect something
Top-Cyber-Security-Conference
top cyber security conferences
XuanWu_SecNews
SecNews
Ma3k4H3d's Repositories
Ma3k4H3d/GithubHack
Collect some repository about github hack
Ma3k4H3d/2020-QWB-PWN
PWN & Reverse
Ma3k4H3d/Top-Cyber-Security-Conference
top cyber security conferences
Ma3k4H3d/2021_Hvv
2021 hw
Ma3k4H3d/AEG
the auto heap exploit analysis based on Angr
Ma3k4H3d/ArcHeap
ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives
Ma3k4H3d/articles
Article Publish in Wechat & Toutiao
Ma3k4H3d/bfe
Open-source layer 7 load balancer derived from proprietary Baidu FrontEnd
Ma3k4H3d/BinaryDatabase
Collate and collect binary related materials, including papers, tools, etc. Now,there are the following categories: 1、Fuzzing
Ma3k4H3d/BullshitGenerator
Needs to generate some texts to test if my GUI rendering codes good or not. so I made this.
Ma3k4H3d/CVE-2020-17144
weaponized tool for CVE-2020-17144
Ma3k4H3d/DefaultCreds-cheat-sheet
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Ma3k4H3d/exploit_mitigations
Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.
Ma3k4H3d/Exploits-1
Windows Exploits
Ma3k4H3d/iot
Ma3k4H3d/janus
Janus: a state-of-the-art file system fuzzer on Linux
Ma3k4H3d/K8tools
K8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)
Ma3k4H3d/Kernelhub
:palm_tree:Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file
Ma3k4H3d/Middleware-Vulnerability-detection
CVE、CMS、中间件漏洞检测利用合集 Since 2019-9-15
Ma3k4H3d/Nmap-Xmind
Nmap思维导图
Ma3k4H3d/pocs
Ma3k4H3d/pupy
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
Ma3k4H3d/pwndocker
A docker environment for pwn in ctf
Ma3k4H3d/redteam_vul
红队作战中比较常遇到的一些重点系统漏洞整理。
Ma3k4H3d/Routers-vuls
Ma3k4H3d/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
Ma3k4H3d/SysmonTools
Utilities for Sysmon
Ma3k4H3d/System-Vulnerability
系统漏洞合集 Since 2019-10-16
Ma3k4H3d/traitor
:arrow_up: :skull_and_crossbones: Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
Ma3k4H3d/unicorefuzz
Fuzzing the Kernel Using Unicornafl and AFL++