famasoon's Stars
opendatalab/MinerU
A high-quality tool for convert PDF to Markdown and JSON.一站式开源高质量数据提取工具,将PDF转换成Markdown和JSON格式。
2Retr0/GodotOceanWaves
FFT-based ocean-wave rendering, implemented in Godot
cddmp/enum4linux-ng
A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for security professionals and CTF players.
bl4de/security-tools
My collection of various security tools created mostly in Python and Bash. For CTFs and Bug Bounty.
pl4int3xt/cve_2024_0044
CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions 12 and 13
dhammon/ai-goat
Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.
trickster0/NamelessC2
Nameless C2 - A C2 with all its components written in Rust
H4NM/WhoYouCalling
Records an executable's network activity into a Full Packet Capture file (.pcap) and much more.
mandiant/dncil
The FLARE team's open-source library to disassemble Common Intermediate Language (CIL) instructions.
jhalon/SharpCall
Simple PoC demonstrating syscall execution in C#
PeterGabaldon/CVE-2024-7479_CVE-2024-7481
TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.
mlcsec/EDRenum-BOF
Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.
plackyhacker/Sys-Calls
An example of using Syscalls in C# to get a meterpreter shell.
ichitaso/EpicGamesIPA
Collection of IPAs from the Epic Games Store for sideloading on iOS devices outside of the EU
NyanSatan/Anya
iBoot/SEPOS decryption kit for JTAGgable iOS device prototypes
TheresAFewConors/MSSprinkler
MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It employs a 'low-and-slow' approach to avoid locking out accounts, and provides verbose information related to accounts and tenant information.
Recon-Fuzz/chimera
Smart Contract Property-Based Testing Framework
Evi1Grey5/Bypass-Smartscreen-
Let's analyze one of the ways to bypass the smart screen and write our own simple cryptor that runs the shellcode
fortra/CVE-2024-6769
Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)
Teach2Breach/noldr
Dynamically resolve API function addresses at runtime in a secure manner.
p33d/CVE-2024-45519
mr-r3bot/bof-modules
BOF for C2 framework
Alignof/hikami
Light weight hypervisor for RISC-V H-extension.
binarly-io/ToolsAndPoCs
BINARLY Research Tools and PoCs
mr-r3b00t/CVE-2024-47176
Scanner
AlmondOffSec/GOAD_hyperv
Vagrant style script to build GOAD on Hyper-V
alex-dengx/WSUSpendu
Implement WSUSpendu attack
gam4er/FindGT
PoC Windows Token Anomaly Detector
SpiralBL0CK/CVE-2024-45383
poc for CVE-2024-45383
tony-go/antidebug-examples
Draft reporsitory for experimenting with fork as an anti debugging technique