Stars
- All languages
- ASP.NET
- Ada
- Adblock Filter List
- Assembly
- Astro
- AutoHotkey
- AutoIt
- Awk
- Batchfile
- Bicep
- Bikeshed
- BitBake
- BlitzBasic
- C
- C#
- C++
- CMake
- CSS
- Cap'n Proto
- Clojure
- CoffeeScript
- Common Lisp
- Crystal
- Cuda
- Cython
- Dart
- Dockerfile
- Elixir
- Erlang
- GAMS
- Go
- Groovy
- HCL
- HTML
- Hack
- Handlebars
- Haskell
- Inno Setup
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Just
- Kaitai Struct
- Kotlin
- LLVM
- Lua
- M4
- MDX
- Makefile
- Markdown
- Max
- NSIS
- Nim
- Nix
- OCaml
- Objective-C
- Odin
- Open Policy Agent
- PHP
- PLpgSQL
- Pascal
- Pawn
- Perl
- PostScript
- PowerShell
- Python
- QMake
- REXX
- Raku
- Rich Text Format
- Roff
- Ruby
- Rust
- SCSS
- SRecode Template
- Sage
- Scala
- Shell
- SmPL
- Smarty
- Solidity
- Starlark
- Svelte
- Swift
- TSQL
- Tcl
- TeX
- Text
- TypeScript
- Typst
- VBA
- VBScript
- Vala
- Verilog
- Visual Basic .NET
- Vue
- XSLT
- YAML
- YARA
- Zeek
- Zig
ArgoCD container image integrating helm-secrets, SOPS, vals and K8s auth wrapper for Hashicorp Vault helm wrapper to be used as argocd-repo-server
Verify provenance from SLSA compliant builders
Bypass WiFi client isolation on Open and WPA2-PSK networks
Learn Kubernetes security from Linux kernel primitives to production controls - the hard way
Format SSSD Raw Kerberos Payloads into CCACHE files for use on Windows systems
GeoIntel using Google's Gemini API to uncover the location where photos were taken through AI-powered geo-location analysis.
Proximity is a MCP security scanner powered with NOVA
Drop-in provider for Keycloak 22+ that detects password leaks and breached credentials with Google reCAPTCHA Enterprise – Password Defense
The simplest way to protect your apps with a login screen.
Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.
LDAx2012 / mimikatz
Forked from gentilkiwi/mimikatzA little tool to play with Windows security
Example code on how to use a custom dll during dll hijack on Narrator.exe as a persistence
Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover
Exhaustive search and flexible filtering of Active Directory ACEs.
Source code for the worst malware classifier of all time
A Series of Baseband & LMP Exploits against Bluetooth Classic Controllers
Code associated with the talk "Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!'"
A .NET assembly tracer using Harmony for runtime method interception.
a golang based dotnet ysoserial poc generation tool. Operated by cursor and reproduce from metasploit
Detonate malware on VMs and get logs & detection status
Educational proof-of-concept demonstrating DEP/NX bypass using hardware breakpoints, vectored exception handling, and instruction emulation on Windows x64. For security research and learning purpos…
Chalk allows you to follow code from development, through builds and into production.
An NTP channel for Beacons, implemented using Cobalt Strike’s External C2 framework.
A pointer encryption library intended for Red Team implant design in Rust.
A collection of useful API endpoints for security operators and administrators