iamalsaher
I like to make things. I like to break things. I like to make things that break things.
@fourcorelabsNew Delhi
iamalsaher's Stars
wellrodrig/Whatsapp-Spy
WhatsApp Spy is an app designed to monitor and log all on-screen texts whenever a user opens WhatsApp / Whatsapp Business. It also supports Instagram and Messenger, sending logs to either Discord or Telegram, without port forwarding.
tera-insights/go-win64api
GoLang Windows API wrappers for System Info / User Management
praetorian-inc/goffloader
A Go implementation of Cobalt Strike style BOF/COFF loaders.
XiaoliChan/winrm-PTH
Golang implement winrm client with pass the hash
oiweiwei/go-msrpc
The DCE/RPC / MS-RPC Codegen/Client for Go
thedonutfactory/donut
🍩 Donut is a novel runtime environment for developing and executing fully homomorphic software programs
jfjallid/go-smb
A client library to interact with Windows RPC services such as MS-SRVS and MS-RRP.
fin3ss3g0d/NativeThreadpool
Work, timer, and wait callback example using solely Native Windows APIs.
wabzsy/gonut
Generator of https://github.com/TheWover/donut in pure Go. supports compression, AMSI/WLDP/ETW bypass, etc.
Atsika/mkwinsyscall
mkwinsyscall fork including API hashing
ropnop/go-windapsearch
Utility to enumerate users, groups and computers from a Windows domain through LDAP queries
diversenok/TokenUniverse
An advanced tool for working with access tokens and Windows security policy.
gabriellandau/PPLFault
hlldz/RefleXXion
RefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc. In order to bypass the user-mode hooks, it first collects the syscall numbers of the NtOpenFile, NtCreateSection, NtOpenSection and NtMapViewOfSection found in the LdrpThunkSignature array.
matthieu-hackwitharts/Win32_Offensive_Cheatsheet
Win32 and Kernel abusing techniques for pentesters
Amzza0x00/go-impacket
基于golang实现的impacket
RedTeamPentesting/pretender
Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.
wtsxDev/reverse-engineering
List of awesome reverse engineering resources
Ne0nd0g/go-shellcode
A repository of Windows Shellcode runners and supporting utilities. The applications load and execute Shellcode using various API calls or techniques.
Flangvik/SharpCollection
Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure DevOps release pipelines.
projectdiscovery/nuclei
Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabling collaboration to tackle trending vulnerabilities on the internet. It helps you find vulnerabilities in your applications, APIs, networks, DNS, and cloud configurations.
projectdiscovery/nuclei-templates
Community curated list of templates for the nuclei engine to find security vulnerabilities.
RocketRace/easy_z3
Using z3's never been easier (maybe)
mvt-project/mvt
MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.
Mr-Un1k0d3r/EDRs
commial/experiments
Expriments
struct/mms
Modern Memory Safety in C/C++
svv232/1nsanity
LLVM pass that obfuscates against symbolic execution
m0bilesecurity/RMS-Runtime-Mobile-Security
Runtime Mobile Security (RMS) 📱🔥 - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime
niklashigi/apk-mitm
🤖 A CLI application that automatically prepares Android APK files for HTTPS inspection