Stars
基于DeepSeek-R1黑盒蒸馏的网络安全渗透领域推理模型。可高效的应对断网情况下的网络安全大赛。简介写完整了,图片加载不出来看看是否梯子挂好了。2025.5.14更新英文数据集
IngressNightmare POC. world first non-blind remote execution exploitation with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - …
:: Prism X · Automated Enterprise Network Security Risk Detection and Vulnerability Scanning Tool / 棱镜 X · 自动化企业网络安全风险检测、漏洞扫描工具
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
Red Teaming Tactics and Techniques
Windows Research Kernel Source Code
"AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS
坤坤CS 基于CobaltStrike cat 4.5二开项目 添加反沙箱、反测绘。集成常用后渗透插件,开箱即用
StoneKeeper C2, an experimental EDR evasion framework for research purposes
kernel callback removal (Bypassing EDR Detections)
shellcode免杀加载器,使用go实现,免杀bypass火绒、360、核晶、def等主流杀软
Attack tool for altering packed samples so that they evade static packing detection
Free VMware Workstation Pro 17 full license keys. We've meticulously organized thousands of keys, catering to all major versions of VMware Workstation Pro 17 Choose from our curated selection to en…
Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR hooks in Windows.
match command-line arguments to their help text
AV/EDR evasion via direct system calls.
AV/EDR Lab environment setup references to help in Malware development
Project to check which Nt/Zw functions your local EDR is hooking