nikhilnayak98's Stars
meta-llama/llama3
The official Meta Llama 3 GitHub site
zeek/zeek
Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.
arkime/arkime
Arkime is an open source, large scale, full packet capturing, indexing, and database system.
opa334/Dopamine
Dopamine is a semi-untethered jailbreak for iOS 15 and 16
meta-llama/PurpleLlama
Set of tools to assess and improve LLM security.
mvp/uhubctl
uhubctl - USB hub per-port power control
mitchellh/libxev
libxev is a cross-platform, high-performance event loop that provides abstractions for non-blocking IO, timers, events, and more and works on Linux (io_uring or epoll), macOS (kqueue), and Wasm + WASI. Available as both a Zig and C API.
Mr-Un1k0d3r/EDRs
klezVirus/inceptor
Template-Driven AV/EDR Evasion Framework
Dec0ne/KrbRelayUp
KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default settings).
antonioCoco/RemotePotato0
Windows Privilege Escalation from User to Domain Admin.
optiv/Mangle
Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs
quantumiracle/Popular-RL-Algorithms
PyTorch implementation of Soft Actor-Critic (SAC), Twin Delayed DDPG (TD3), Actor-Critic (AC/A2C), Proximal Policy Optimization (PPO), QT-Opt, PointNet..
b4rtik/SharpKatz
Porting of mimikatz sekurlsa::logonpasswords, sekurlsa::ekeys and lsadump::dcsync commands
ZeroMemoryEx/Terminator
Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes
RedCursorSecurityConsulting/PPLKiller
Tool to bypass LSA Protection (aka Protected Process Light)
bats3c/ADCSPwn
A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certificate service.
antonioCoco/JuicyPotatoNG
Another Windows Local Privilege Escalation from Service Account to System
nickvourd/Supernova
Real fucking shellcode encryptor & obfuscator tool
skysafe/reblog
SkySafe Miscellaneous Reverse Engineering Blog
risksense/zerologon
Exploit for zerologon cve-2020-1472
0x09AL/IIS-Raid
A native backdoor module for Microsoft IIS (Internet Information Services)
WithSecureLabs/CallStackSpoofer
A PoC implementation for spoofing arbitrary call stacks when making sys calls (e.g. grabbing a handle via NtOpenProcess)
mgeeky/ElusiveMice
Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind
PShlyundin/ldap_shell
AD ACL abuse
Cobalt-Strike/CallStackMasker
A PoC implementation for dynamically masking call stacks with timers.
MrEmpy/Awesome-AV-EDR-XDR-Bypass
Awesome AV/EDR/XDR Bypass Tips
scqubits/scqubits
Superconducting Qubits in Python
VirtualAlllocEx/Direct-Syscalls-vs-Indirect-Syscalls
The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls
Hagrid29/CertifyKit
Active Directory certificate abuse