vest12385's Stars
willswire/unifi-ddns
Cloudflare DDNS (Dynamic DNS) support for UniFi OS
open-webui/open-webui
User-friendly WebUI for LLMs (Formerly Ollama WebUI)
hasherezade/pe-sieve
Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).
j00ru/windows-syscalls
Windows System Call Tables (NT/2000/XP/2003/Vista/7/8/10/11)
mdsecactivebreach/Farmer
c3rb3ru5d3d53c/mwcfg-modules
Malware Configuration Extraction Modules
ErdemOzgen/ActiveDirectoryAttacks
incredibleindishell/Windows-AD-environment-related
This Repository contains the stuff related to windows Active directory environment exploitation
joxeankoret/diaphora
Diaphora, the most advanced Free and Open Source program diffing tool.
nomi-sec/PoC-in-GitHub
📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.
swisskyrepo/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
hardik05/Source-and-Fuzzing
一些阅读源码和Fuzzing 的经验,涵盖黑盒与白盒测试..
Cybereason/siofra
hasherezade/process_ghosting
Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted file
comsec-group/blacksmith
Next-gen Rowhammer fuzzer that uses non-uniform, frequency-based patterns (IEEE S&P '22).
fareedfauzi/Flare-On-Challenges
This repo is aim to compile all Flare-On challenge's binaries. Update: 2014 -2022.
isra17/nrs
NSIS Reversing Suite with IDA Plugins
jesparza/peepdf
Powerful Python tool to analyze PDF documents
abbodi1406/vcredist
AIO Repack for latest Microsoft Visual C++ Redistributable Runtimes
saferwall/saferwall
:cloud: Collaborative Malware Analysis Platform at Scale
decalage2/olefile
olefile is a Python package to parse, read and write Microsoft OLE2 files (also called Structured Storage, Compound File Binary Format or Compound Document File Format), such as Microsoft Office 97-2003 documents, vbaProject.bin in MS Office 2007+ files, Image Composer and FlashPix files, Outlook messages, StickyNotes, several Microscopy file formats, McAfee antivirus quarantine files, etc.
LordNoteworthy/al-khaser
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
commixproject/commix
Automated All-in-One OS Command Injection Exploitation Tool.
CTFTraining/CTFTraining
CTF Training 经典赛题复现环境
cyberark/shimit
A tool that implements the Golden SAML attack
aristocratos/bpytop
Linux/OSX/FreeBSD resource monitor
sandboxie-plus/Sandboxie
Sandboxie Plus & Classic
WinMin/awesome-vm-exploit
share some useful archives about vm and qemu escape exploit.
roblabla/GhiDracula-Ext
Extension version of the ghidracula patches
fofapro/vulfocus
🚀Vulfocus 是一个漏洞集成平台,将漏洞环境 docker 镜像,放入即可使用,开箱即用。