Phenomite's Stars
zadam/trilium
Build your personal knowledge base with Trilium Notes
RustScan/RustScan
🤖 The Modern Port Scanner 🤖
k4yt3x/video2x
A machine learning-based lossless video super resolution framework. Est. Hack the Valley II, 2018.
redcanaryco/atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
baowenbo/DAIN
Depth-Aware Video Frame Interpolation (CVPR 2019)
frohoff/ysoserial
A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
xmendez/wfuzz
Web application fuzzer
RsaCtfTool/RsaCtfTool
RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data
andrew-d/static-binaries
Various *nix tools built as statically-linked binaries
calebstewart/pwncat
Fancy reverse and bind shell handler
ohpe/juicy-potato
A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM.
thewhiteh4t/FinalRecon
All In One Web Recon
phra/PEzor
Open-Source Shellcode & PE Packer
SecuraBV/CVE-2020-1472
Test tool for CVE-2020-1472
S3cur3Th1sSh1t/Amsi-Bypass-Powershell
This repo contains some Amsi Bypass methods i found on different Blog Posts.
byt3bl33d3r/DeathStar
Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Directory environments using some of the most common offensive TTPs.
EgeBalci/sgn
Shikata ga nai (仕方がない) encoder ported into go with several improvements
akai-katto/dandere2x
Dandere2x - Fast Waifu2x Video Upscaling.
darkr4y/geacon
Practice Go programming and implement CobaltStrike's Beacon in Go
blasty/CVE-2021-3156
foxglovesec/Potato
dostoevskylabs/dostoevsky-pentest-notes
Notes for taking the OSCP in 2097. Read in book form on GitBook
sereneblue/chameleon
WebExtension port of Random Agent Spoofer
andryou/scriptsafe
a browser extension to bring security and privacy to chrome, firefox, and opera
Kevin-Robertson/Tater
Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec
jas502n/CVE-2020-14882
CVE-2020–14882、CVE-2020–14883
stuntbanana/stuntbanana
Minimalist Asterisk Caller ID Spoofer and Secondary VOIP Line Configuration Built for AWS
cnotin/SplunkWhisperer2
Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurations
swimlane/elk-tls-docker
This repository contains code to create a ELK stack with certificates & security enabled using docker-compose
FelisDiligens/Fallout76-QuickConfiguration
Change *.ini settings and install mods.