hh11100's Stars
iosiro/baserunner
A tool for exploring Firebase datastores.
mshumer/gpt-investor
assetnote/batchql
GraphQL security auditing script with a focus on performing batch GraphQL queries and mutations
0vercl0k/rp
rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.
j00ru/windows-syscalls
Windows System Call Tables (NT/2000/XP/2003/Vista/7/8/10/11)
Zeyad-Azima/Offensive-Resources
A Huge Learning Resources with Labs For Offensive Security Players
vinusankars/BEAST
Implementation of BEAST adversarial attack for language models (ICML 2024)
paul-gauthier/aider
aider is AI pair programming in your terminal
lllyasviel/Fooocus
Focus on prompting and generating
m-star18/langchain-pdf-qa
Use langchain to create a model that returns answers based on online PDFs that have been read.
lem0nSec/ShellGhost
A memory-based evasion technique which makes shellcode invisible from process start to end.
openai/openai-cookbook
Examples and guides for using the OpenAI API
honeycombio/microservices-demo
delvelabs/batea
AI-based, context-driven network device ranking
duo-labs/cloudmapper
CloudMapper helps you analyze your Amazon Web Services (AWS) environments.
RedSiege/EyeWitness
EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.
nickmccullum/algorithmic-trading-python
The repository for freeCodeCamp's YouTube course, Algorithmic Trading in Python
KathanP19/JSFScan.sh
Automation for javascript recon in bug bounty.
jaeles-project/jaeles
The Swiss Army knife for automated Web Application Testing
processing/p5.js
p5.js is a client-side JS platform that empowers artists, designers, students, and anyone to learn to code and express themselves creatively on the web. It is based on the core principles of Processing. http://twitter.com/p5xjs —
Escapingbug/awesome-browser-exploit
awesome list of browser exploitation tutorials
corelan/windbglib
Public repository for windbglib, a wrapper around pykd.pyd (for Windbg), used by mona.py
justinsteven/dostackbufferoverflowgood
DSU-Projects/CSC-748-Software-Exploitation-Spring-2020
This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools as well as the process of exploitation discovery and development. Vulnerability analysis, debugging, fuzzing, shellcode, and mitigation techniques will be explored. Both Windows and Linux platforms will be covered.
jeromegamez/terraform-aws-enforce-mfa
A terraform module to enforce MFA for AWS groups and users
cobbr/Covenant
Covenant is a collaborative .NET C2 framework for red teamers.
jeremydaly/data-api-client
A "DocumentClient" for the Amazon Aurora Serverless Data API
threatexpress/red-team-scripts
A collection of Red Team focused tools, scripts, and notes
mandiant/commando-vm
Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mandiant.com
rancher/rke
Rancher Kubernetes Engine (RKE), an extremely simple, lightning fast Kubernetes distribution that runs entirely within containers.