y0ug's Stars
projectdiscovery/httpx
httpx is a fast and multi-purpose HTTP toolkit that allows running multiple probes using the retryablehttp library.
qilingframework/qiling
A True Instrumentable Binary Emulation Framework
antonioCoco/Mapping-Injection
Just another Windows Process Injection
nettitude/PoshC2
A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.
p3nt4/Nuages
A modular C2 framework
Mr-Un1k0d3r/SCShell
Fileless lateral movement tool that relies on ChangeServiceConfigA to run command
0xthirteen/SharpMove
.NET Project for performing Authenticated Remote Execution
api0cradle/UltimateAppLockerByPassList
The goal of this repository is to document the most common techniques to bypass AppLocker.
ANSSI-FR/MLA
Multi Layer Archive - A pure rust encrypted and compressed archive file format
cobbr/Covenant
Covenant is a collaborative .NET C2 framework for red teamers.
matterpreter/DefenderCheck
Identifies the bytes that Microsoft Defender flags on.
ChrisAD/linkedin-employee-scraper
Extract all employees from LinkedIn. Especially useful for companies with thousands of employees.
kmkz/Pentesting
Tricks for penetration testing
emc2314/YANSOllvm
Yet Another Not So Obfuscated LLVM
rsmudge/Layer2-Pivoting-Client
A simple client to demonstrate Layer-2 pivoting. Compatible with the simpletun.c server written by Davide Brini.
byt3bl33d3r/SILENTTRINITY
An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
EgeBalci/sgn
Shikata ga nai (仕方がない) encoder ported into go with several improvements
TheWover/donut
Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
0xZDH/redirect.rules
Quick and dirty dynamic redirect.rules generator
fboldewin/COM-Code-Helper
Two IDAPython Scripts help you to reconstruct Microsoft COM (Component Object Model) Code
s0md3v/Predator
Anti-Automation System
can1357/ByePg
Defeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI.
86hh/DreamLoader
Simple 32/64-bit PEs loader.
s0md3v/Diggy
Extract endpoints from apk files.
OALabs/frida-extract
Frida.re based RunPE (and MapViewOfSection) extraction tool
InQuest/malware-samples
A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net
vngkv123/aSiagaming
My Chrome and Safari exploit code + write-up repo
exodusintel/Chromium-941743
Chrome v8 1Day Exploit by István Kurucsai
WithSecureLabs/ModuleStomping
https://blog.f-secure.com/hiding-malicious-code-with-module-stomping/
BishopFox/sliver
Adversary Emulation Framework