Pinned Repositories
1earn
ffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Academic_LLM_Sec_Papers
Academic Papers about LLM Application on Security
Achademio
AI assistant, based on the GPT-3.5 model by OpenAI, designed to enhance your proficiency in writing research papers. Allows you to adapt your content to academic standards, transform bullet points into eloquent text, or enhance the quality of your writing through error detection.
active-learning-workshop
Active Learning Workshop Materials
advmlthreatmatrix
Adversarial Threat Matrix
ahrid
AHRID - Analysis Hacker's Real-ID Platform
AI-Security-Paper
This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sample detection, and APT overview. Hope these summarized papers are helpful to you~
dailyPaper
每日论文推荐
DetectionLab
Automate the creation of a lab environment complete with security tooling and logging best practices
provenance-kernel-evaluation
The code and data used in the evaluation of provenance kernels
hjmark2010's Repositories
hjmark2010/Academic_LLM_Sec_Papers
Academic Papers about LLM Application on Security
hjmark2010/Achademio
AI assistant, based on the GPT-3.5 model by OpenAI, designed to enhance your proficiency in writing research papers. Allows you to adapt your content to academic standards, transform bullet points into eloquent text, or enhance the quality of your writing through error detection.
hjmark2010/attack-surface-framework
Tool to discover external and internal network attack surface
hjmark2010/attack_range
A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
hjmark2010/Awesome-CobaltStrike
CobaltStrike的相关资源汇总 / List of Awesome CobaltStrike Resources
hjmark2010/BlueHound
BlueHound - pinpoint the security issues that actually matter
hjmark2010/CTF-writeups
Writeup Challenges I have solved in CTF competitions
hjmark2010/cybercrime-papers
Recent academic papers related to cybercrime
hjmark2010/hackthebox-writeups
Writeups for HacktheBox 'boot2root' machines
hjmark2010/HyperDbg
State-of-the-art native debugging tool
hjmark2010/iLEAPP
iOS Logs, Events, And Plist Parser
hjmark2010/Information_Security_Books
信息安全方面的书籍书籍
hjmark2010/LEVEN
Source code and dataset for ACL2022 Findings Paper "LEVEN: A Large-Scale Chinese Legal Event Detection dataset"
hjmark2010/libipt
libipt - an Intel(R) Processor Trace decoder library
hjmark2010/logvision
分布式实时日志分析与入侵检测系统
hjmark2010/luci-app-unblockneteasemusic
[OpenWrt] 解除网易云音乐播放限制
hjmark2010/Malware-IOCs
hjmark2010/Mindmap
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them
hjmark2010/MoneyPrinterTurbo
利用AI大模型,一键生成高清短视频 Generate short videos with one click using AI LLM.
hjmark2010/PEASS-ng
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
hjmark2010/private-gpt
Interact with your documents using the power of GPT, 100% privately, no data leaks
hjmark2010/PromptKG
PromptKG Family: a Gallery of Prompt Learning & KG-related research works, toolkits, and paper-list.
hjmark2010/searchall
强大的敏感信息搜索工具
hjmark2010/Some-PoC-oR-ExP
各种漏洞poc、Exp的收集或编写
hjmark2010/spiderfoot
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
hjmark2010/sysmon-dfir
Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.
hjmark2010/Tracer-FIRE
hjmark2010/unicorn
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.
hjmark2010/velociraptor
Digging Deeper....
hjmark2010/Vulnerability-Wiki
基于 docsify 部署,目前漏洞数量 1000+