Skip to content
View HuskyHacks's full-sized avatar
πŸ”¬
πŸ”¬

Highlights

  • Pro

Block or report HuskyHacks

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Python based tool for generating Shellcode from PIC C

C 43 5 Updated Nov 6, 2025
Jupyter Notebook 1 Updated Jul 23, 2025

When good OAuth apps go rogue. Documents observed OAuth application tradecraft

TypeScript 83 11 Updated Dec 13, 2025

Collection of Cyber Threat Intelligence sources from the deep and dark web

6,487 1,091 Updated Jan 17, 2026

Research into Undocumented Behavior of Azure AD Refresh Tokens

Python 332 41 Updated Feb 23, 2024

Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI

HTML 1,007 118 Updated Dec 31, 2025

notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)

Go 3,534 238 Updated Apr 3, 2024

Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in this exciting journey and add your expertise to our collective …

C++ 200 57 Updated Sep 20, 2025

Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.

PowerShell 211 92 Updated Jan 14, 2026

A reference containing Styles and Keywords that you can use with MidJourney AI. There are also pages showing resolution comparison, image weights, and much more!

12,279 1,671 Updated Apr 11, 2025

Creation of a laboratory for malware analysis in AWS

HCL 105 19 Updated Dec 5, 2022

My experiments in weaponizing Nim (https://nim-lang.org/)

Nim 3,026 365 Updated May 13, 2024

Tool for Active Directory Certificate Services enumeration and abuse

Python 3,343 449 Updated Dec 3, 2025

You didn't think I'd go and leave the blue team out, right?

1,726 248 Updated Jan 5, 2026

Pre-Built Vulnerable Environments Based on Docker-Compose

Dockerfile 20,104 4,747 Updated Jan 12, 2026

RedEye is a visual analytic tool supporting Red & Blue Team operations

TypeScript 2,737 288 Updated Oct 20, 2023

Updog is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S, can set ad hoc SSL certificates and use http basic auth.

Python 3,266 332 Updated Nov 16, 2025

The Havoc Framework

Go 8,088 1,160 Updated Dec 18, 2025

Simple HTTP listener for security testing

Python 120 23 Updated Nov 24, 2024

quASAR: ASAR manipulation made easy

JavaScript 38 4 Updated Sep 7, 2022

Sandman is a NTP based backdoor for hardened networks.

C# 815 112 Updated Mar 31, 2024

A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.

C++ 721 148 Updated Aug 5, 2020
Python 112 17 Updated Sep 10, 2025

πŸ” A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.

C++ 52,306 2,325 Updated Jan 18, 2026

πŸ§›πŸ»β€β™‚οΈ One theme. All platforms.

23,303 2,246 Updated Jan 15, 2026

Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post

C++ 100 21 Updated Oct 13, 2022

A proof-of-concept malicious Chrome extension

JavaScript 87 13 Updated Jul 19, 2022

A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.

Python 2,161 211 Updated Jan 5, 2026

Adaptive DLL hijacking / dynamic export forwarding

C++ 805 135 Updated Jul 6, 2020
Next