Skip to content
View nvtinh368's full-sized avatar

Block or report nvtinh368

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

FreeProxy: Collecting free proxies from internet. (全球海量高质量免费代理,支持爬取20+代理源,支持自定义规则代理筛选,爬虫与数据分析必备,每小时自动更新。)

Python 186 30 Updated Jan 1, 2026

the LLM vulnerability scanner

Python 6,695 740 Updated Dec 26, 2025

Awesome EDR Bypass Resources For Ethical Hacking

1,430 140 Updated Oct 16, 2025

This program is designed to demonstrate various process injection techniques

C# 1,215 190 Updated Aug 7, 2025

The project page of portrait3d

JavaScript 2 Updated Apr 20, 2025

AirPods liberated from Apple's ecosystem.

Kotlin 23,906 1,254 Updated Dec 29, 2025

We present StableAvatar, the first end-to-end video diffusion transformer, which synthesizes infinite-length high-quality audio-driven avatar videos without any post-processing, conditioned on a re…

Python 1,187 101 Updated Dec 8, 2025

Free API access using your web-based chatbots

Python 52 14 Updated Sep 28, 2025

Transparent SSL/TLS proxy for decrypting and diverting network traffic to other programs, such as UTM services, for deep SSL inspection

C 464 111 Updated Dec 9, 2025

Toolkit to turn Chromium vulnerabilities into full-chain exploits

JavaScript 261 49 Updated Sep 16, 2025

Rust bindings to Windows API

Rust 1,920 394 Updated Apr 27, 2024

Rust bindings to Windows API

Rust 20 10 Updated Apr 15, 2019

Memory Obfuscation in Rust

Rust 272 27 Updated Dec 1, 2025

Because AV evasion should be easy.

Go 847 81 Updated Nov 28, 2024

Zscan a scan blasting tool set

Go 541 76 Updated Dec 5, 2023

Zscan a scan blasting tool set

Go 1 Updated Jan 7, 2022
Go 3 129 Updated Apr 30, 2021

A collection of various awesome lists for hackers, pentesters and security researchers

1 1 Updated Mar 7, 2022

Bypass Antivirus by Golang

Go 177 24 Updated Aug 4, 2022

A library for building fast, reliable and evolvable network services.

Rust 25,824 1,544 Updated Dec 19, 2025

A Cloudflare Worker-based Proxy, processing and forwarding HTTP(S) requests, enabling clients to access otherwise inaccessible network resources.

JavaScript 86 51 Updated Dec 16, 2025
Jupyter Notebook 8 2 Updated May 7, 2025

net/http.Client like HTTP Client with options to select specific client TLS Fingerprints to use for requests.

Go 1,386 242 Updated Dec 25, 2025

Gmail Username Checker, no ratelimit

Python 27 7 Updated May 29, 2022

MikroTik RouterOS Patch Public Key and Generate License

Python 2,176 1,024 Updated Dec 31, 2025

内网穿透、远程文件上传下载、命令执行

Go 232 72 Updated Jan 9, 2018

tunnel over http[s]

Go 155 41 Updated Apr 16, 2025

Cobalt Strike Beacon Object File for bypassing UAC via the CMSTPLUA COM interface.

C 211 29 Updated Oct 9, 2022

c++ fully undetected shellcode launcher ;)

Python 978 211 Updated Jun 11, 2021

Android Remote Access Trojan

Java 501 173 Updated Dec 24, 2016
Next