Pinned Repositories
AggressorScripts
Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources
aliyun-accesskey-Tools
AllTools
All reasonably stable tools
AndroidSecurityStudy
安卓应用安全学习
AndroidSlides
anhkgg-tools
Anhkgg's Tools
atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
Awesome-Fuzzing
A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis.
BadCode
恶意代码逃逸源代码 http://payloads.online
llvm-ir-cmake-utils
LLVM IR CMake utils for bitcode file manipulation by opt and friends
allanp0e's Repositories
allanp0e/AllTools
All reasonably stable tools
allanp0e/AndroidSlides
allanp0e/Awesome-Fuzzing
A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis.
allanp0e/capa
The FLARE team's open-source tool to identify capabilities in executable files.
allanp0e/cmd32
Fork of https://github.com/klinix5/InstallerFileTakeOver
allanp0e/Cpp_Primer_Practice
搞定C++:punch:。C++ Primer 中文版第5版学习仓库,包括笔记和课后练习答案。
allanp0e/CppCoreGuidelines
The C++ Core Guidelines are a set of tried-and-true guidelines, rules, and best practices about coding in C++
allanp0e/druid
阿里云计算平台DataWorks(https://help.aliyun.com/document_detail/137663.html) 团队出品,为监控而生的数据库连接池
allanp0e/EDRs
allanp0e/electronegativity
Electronegativity is a tool to identify misconfigurations and security anti-patterns in Electron applications.
allanp0e/Exploit-Development
Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)
allanp0e/exploitkitpub
allanp0e/frida-snippets
Hand-crafted Frida examples
allanp0e/FridaContainer
FridaContainer 整合了网上流行的和自己编写的常用的 frida 脚本,为逆向工作提效之用。 frida 脚本模块化,Java & Jni Trace。
allanp0e/gdrv-loader
Kernel driver loader using vulnerable gigabyte driver (https://www.secureauth.com/labs/advisories/gigabyte-drivers-elevation-privilege-vulnerabilities) to load a unsigned driver
allanp0e/GH-Injector-Library
A feature rich DLL injection library.
allanp0e/goron-llvm14
Migrate goron obfuscator to llvm14(swift-llvm-5.7) in 2022
allanp0e/HackSysExtremeVulnerableDriver
HackSys Extreme Vulnerable Windows Driver
allanp0e/Inline-Execute-PE
Execute unmanaged Windows executables in CobaltStrike Beacons
allanp0e/KDU
Kernel Driver Utility
allanp0e/Nt-Modules
Collect different versions of Crucial modules.
allanp0e/PoCs
Proof-of-concept code for various bugs
allanp0e/Priv2Admin
Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.
allanp0e/process_overwriting
Yet another variant of Process Hollowing
allanp0e/PSBits
Simple (relatively) things allowing you to dig a bit deeper than usual.
allanp0e/r0tracer
安卓Java层多功能追踪脚本
allanp0e/RecycledGate
Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll
allanp0e/RedTeamCCode
Red Team C code repo
allanp0e/The-C-20-Masterclass-Source-Code
Source code for the C++ 20 Masterclass on udemy
allanp0e/tutorials
Just Announced - "Learn Spring Security OAuth":