pierre0210's Stars
etcd-io/etcd
Distributed reliable key-value store for the most critical data of a distributed system
grpc/grpc
The C based gRPC (C++, Python, Ruby, Objective-C, PHP, C#)
skylot/jadx
Dex to Java decompiler
charmbracelet/bubbletea
A powerful little TUI framework 🏗
gocolly/colly
Elegant Scraper and Crawler Framework for Golang
dockur/windows
Windows inside a Docker container.
peass-ng/PEASS-ng
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
KindXiaoming/pykan
Kolmogorov Arnold Networks
cert-manager/cert-manager
Automatically provision and manage TLS certificates in Kubernetes
asciimoo/wuzz
Interactive cli tool for HTTP inspection
haad/proxychains
proxychains - a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy. Supported auth-types: "user/pass" for SOCKS4/5, "basic" for HTTP.
mandiant/capa
The FLARE team's open-source tool to identify capabilities in executable files.
hmgle/graftcp
A flexible tool for redirecting a given program's TCP traffic to SOCKS5 or HTTP proxy.
kevoreilly/CAPEv2
Malware Configuration And Payload Extraction
desaster/kippo
Kippo - SSH Honeypot
tulir/gomuks
A terminal based Matrix client written in Go.
ParrotSec/mimikatz
prsyahmi/GpuRamDrive
RamDrive that is backed by GPU Memory
iamhyc/Overleaf-Workshop
Open Overleaf/ShareLaTex projects in vscode, with full collaboration support.
notthehiddenwiki/NTHW
Not The Hidden Wiki - The largest repository of links related to cybersecurity
khalladay/render-with-notepad
A series of programs demonstrating the basics of Memory Scanning, Api Hooking and DLL Injection. The high point is using Notepad.exe as a render target, and playing snake in a notepad window
acrono/cve-2024-6387-poc
32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo/cve-2024-6387-poc
dod-cyber-crime-center/DC3-MWCP
DC3 Malware Configuration Parser (DC3-MWCP) is a framework for parsing configuration information from malware. The information extracted from malware includes items such as addresses, passwords, filenames, and mutex names.
StavC/ComPromptMized
ComPromptMized: Unleashing Zero-click Worms that Target GenAI-Powered Applications
dod-cyber-crime-center/pyhidra
Pyhidra is a Python library that provides direct access to the Ghidra API within a native CPython interpreter using jpype.
zeze-zeze/NamedPipeMaster
a tool used to analyze and monitor in named pipes
Yamato-Security/takajo
Takajō (鷹匠) is a Hayabusa results analyzer.
i-m-down-QQ/writeups
CTF Writeups Backup
ZanzyTHEbar/Scripts
Various Windows Scripts I find useful
namwoam/roxy
RTOS(RTEMS)-like realtime application SDK using pure POSIX interface on top of preempt-rt linux