sanreee's Stars
nomi-sec/PoC-in-GitHub
📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.
cirosantilli/linux-kernel-module-cheat
The perfect emulation setup to study and develop the Linux kernel v5.4.3, kernel modules, QEMU, gem5 and x86_64, ARMv7 and ARMv8 userland and baremetal assembly, ANSI C, C++ and POSIX. GDB step debug and KGDB just work. Powered by Buildroot and crosstool-NG. Highly automated. Thoroughly documented. Automated tests. "Tested" in an Ubuntu 24.04 host.
t3l3machus/Villain
Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and share them among connected sibling servers (Villain instances running on different machines).
AsahiLinux/m1n1
A bootloader and experimentation playground for Apple Silicon
find-sec-bugs/find-sec-bugs
The SpotBugs plugin for security audits of Java web applications and Android applications. (Also work with Kotlin, Groovy and Scala projects)
a13xp0p0v/linux-kernel-defence-map
Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and defence technologies
KeenSecurityLab/BinAbsInspector
BinAbsInspector: Vulnerability Scanner for Binaries
newbit1/rootAVD
Script to root AVDs running with QEMU Emulator from Android Studio
xairy/vmware-exploitation
A collection of links related to VMware escape exploits
wh1t3p1g/tabby
A CAT called tabby ( Code Analysis Tool )
0xacb/recollapse
REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications
ycdxsb/PocOrExp_in_Github
Automatically Collect POC or EXP from GitHub by CVE ID.
mandiant/GoReSym
Go symbol recovery tool
p0dalirius/windows-coerced-authentication-methods
A list of methods to coerce a windows machine to authenticate to an attacker-controlled machine through a Remote Procedure Call (RPC) with various protocols.
zyn3rgy/LdapRelayScan
Check for LDAP protections regarding the relay of NTLM authentication
xforcered/Windows_LPE_AFD_CVE-2023-21768
LPE exploit for CVE-2023-21768
testanull/ProxyNotShell-PoC
iustin24/chameleon
netero1010/ScheduleRunner
A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation
fuzzware-fuzzer/fuzzware
Fuzzware's main repository. Start here to install.
Guardsquare/proguard-core
Library to read, write, analyze, and process java bytecode
infosecn1nja/red-team-scripts
A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc
andreafioraldi/angrgdb
Use angr inside GDB. Create an angr state from the current debugger state.
gabriel-sztejnworcel/pipe-intercept
Intercept Windows Named Pipes communication using Burp or similar HTTP proxy tools
mistymntncop/CVE-2022-1802
MlsDmitry/better-rtti-parser
IDA script to parse RTTI information in executable.
SeifElsallamy/gip
Google IP Search Engine
Marcono1234/codeql-java-queries
Personal CodeQL queries
haramel/l2fuzz
L2Fuzz Source Code
ZetaTwo/binja-experiments
Experiments, snippets and other things related to Binary Ninja