secdev02's Repositories
secdev02/Poker
Fully functional Pokerbot that works on PartyPoker, PokerStars and GGPoker, scraping tables with Open-CV (adaptable via gui) or neural network and making decisions based on a genetic algorithm and montecarlo simulation for poker equity calculation. Binaries can be downloaded with this link:
secdev02/knowledge-graph-studio
WhyHow Knowledge Graph Studio
secdev02/windows-memory-access-traps
A few examples of how to trap virtual memory access on Windows.
secdev02/Windows-classic-samples
This repo contains samples that demonstrate the API used in Windows classic desktop applications.
secdev02/awesome-rl-for-cybersecurity
A curated list of resources dedicated to reinforcement learning applied to cyber security.
secdev02/oleviewdotnet
A .net OLE/COM viewer and inspector to merge functionality of OleView and Test Container
secdev02/GhidrOllama
A Ghidra script that enables the analysis of selected functions and instructions using Large Language Models (LLMs). It aims to make reverse-engineering more efficient by using Ollama's API directly within Ghidra.
secdev02/opencanary
Modular and decentralised honeypot
secdev02/knowledge-table
Knowledge Table is an open-source package designed to simplify extracting and exploring structured data from unstructured documents.
secdev02/bpftool
Automated upstream mirror for bpftool stand-alone build.
secdev02/xdp-tutorial
XDP tutorial
secdev02/win32
Public mirror for win32-pr
secdev02/myJourneyOfBuildingOS
secdev02/Snaffler
a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )
secdev02/Hades
Hades is a Host-Based Intrusion Detection System based on eBPF(mainly)
secdev02/open-interpreter
A natural language interface for computers
secdev02/agent.exe
secdev02/donut
Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
secdev02/TypeLibWalker
TypeLib persistence technique
secdev02/CVE-2024-6778-POC
A POC exploit for CVE-2024-5836 and CVE-2024-6778, allowing for a sandbox escape from a Chrome extension.
secdev02/APT_REPORT
Interesting APT Report Collection And Some Special IOC
secdev02/PSBits
Simple (relatively) things allowing you to dig a bit deeper than usual.
secdev02/boringtun
Userspace WireGuard® Implementation in Rust
secdev02/cred1py
A Python POC for CRED1 over SOCKS5
secdev02/EVTX-ETW-Resources
Event Tracing For Windows (ETW) Resources
secdev02/requestly
Requestly was built to save developers time by intercepting and modifying HTTP Requests. It has now developed into an open-source alternative to Charles Proxy and Telerik Fiddler that works directly in browsers without VPN and proxy Issues. It is used by more than 200,000+ front-end developers and 11,000+ companies worldwide.
secdev02/weevely3
Weaponized web shell
secdev02/ebpf-for-windows
eBPF implementation that runs on top of Windows
secdev02/katran
A high performance layer 4 load balancer
secdev02/winamp
Iconic media player