Yekuuun's Stars
TelegramMessenger/Telegram-iOS
Telegram-iOS
ChaosArnhug/Quine-Mc.Cluskey
Rust learning project based on Quine-Mc.Cluskey logic method
Viincenttt/MollieApi
This project allows you to easily add the Mollie payment provider to your application.
valentindebrabandere/dp-rentree-2024
Infisical/infisical
♾ Infisical is the open-source secret management platform: Sync secrets across your team/infrastructure, prevent secret leaks, and manage internal PKI
winsiderss/phnt
Native API header files for the System Informer project.
ihebski/DefaultCreds-cheat-sheet
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
zodiacon/winnativeapibooksamples
Samples from my book Windows Native API programming
tbhaxor/WinAPI-RedBlue
Source code of exploiting windows API for red teaming series
peass-ng/PEASS-ng
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
pentestmonkey/php-reverse-shell
Kitsun3Sec/Pentest-Cheat-Sheets
A collection of snippets of codes and commands to make your life easier!
killswitch-GUI/CobaltStrike-ToolKit
Some useful scripts for CobaltStrike
S3cur3Th1sSh1t/Pentest-Tools
S3cur3Th1sSh1t/Caro-Kann
Encrypted shellcode Injection to avoid Kernel triggered memory scans
S3cur3Th1sSh1t/Creds
Some usefull Scripts and Executables for Pentest & Forensics
danielmiessler/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
411Hall/JAWS
JAWS - Just Another Windows (Enum) Script
bats3c/ChromeTools
A collection of tools to abuse chrome browser
FULLSHADE/WindowsExploitationResources
Resources for Windows exploit development
snovvcrash/PPN
Pentester's Promiscuous Notebook
tishion/mmLoader
A library for loading dll module bypassing windows PE loader from memory (x86/x64)
antonioCoco/RoguePotato
Another Windows Local Privilege Escalation from Service Account to System
DrNseven/SetWindowsHookEx-Injector
SetWindowsHookEx Injector
Mattiwatti/PPLKiller
Protected Processes Light Killer
EgeBalci/Hook_API
Assembly block for hooking windows API functions.
EgeBalci/amber
Reflective PE packer.
Flangvik/SharpCollection
Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure DevOps release pipelines.
dievus/threader3000
Multi-threaded Python Port Scanner with Nmap Integration
aaaddress1/RunPE-In-Memory
Run a Exe File (PE Module) in memory (like an Application Loader)