Skip to content
View nclv's full-sized avatar
🖥️
Focusing
🖥️
Focusing

Organizations

@Calypt

Block or report nclv

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

ArgoCD container image integrating helm-secrets, SOPS, vals and K8s auth wrapper for Hashicorp Vault helm wrapper to be used as argocd-repo-server

Dockerfile 3 1 Updated Nov 4, 2025

Verify provenance from SLSA compliant builders

Go 290 58 Updated Jul 27, 2025

Bypass WiFi client isolation on Open and WPA2-PSK networks

Python 20 4 Updated Oct 14, 2025

Learn Kubernetes security from Linux kernel primitives to production controls - the hard way

15 1 Updated Oct 29, 2025

Format SSSD Raw Kerberos Payloads into CCACHE files for use on Windows systems

Python 41 4 Updated May 26, 2021

GeoIntel using Google's Gemini API to uncover the location where photos were taken through AI-powered geo-location analysis.

Python 759 86 Updated Aug 29, 2025
TypeScript 447 13 Updated Oct 28, 2025

Proximity is a MCP security scanner powered with NOVA

Python 211 30 Updated Sep 28, 2025

Drop-in provider for Keycloak 22+ that detects password leaks and breached credentials with Google reCAPTCHA Enterprise – Password Defense

Java 11 1 Updated Oct 8, 2025

The simplest way to protect your apps with a login screen.

Go 5,846 178 Updated Nov 10, 2025

😱 Falsehoods Programmers Believe in

26,710 624 Updated Nov 5, 2025

Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.

Rust 33 5 Updated Jan 2, 2025

A little tool to play with Windows security

C 26 6 Updated Oct 16, 2025

Example code on how to use a custom dll during dll hijack on Narrator.exe as a persistence

C++ 19 2 Updated Oct 27, 2025

Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover

C 73 7 Updated Oct 20, 2025
Python 1 Updated Oct 28, 2025

Exhaustive search and flexible filtering of Active Directory ACEs.

Python 59 8 Updated Nov 10, 2025

Source code for the worst malware classifier of all time

Python 7 Updated Oct 5, 2025

A Series of Baseband & LMP Exploits against Bluetooth Classic Controllers

518 92 Updated Aug 31, 2024

Code associated with the talk "Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!'"

C 54 6 Updated Nov 5, 2025

A .NET assembly tracer using Harmony for runtime method interception.

C# 39 3 Updated Oct 24, 2025

a golang based dotnet ysoserial poc generation tool. Operated by cursor and reproduce from metasploit

Go 13 Updated Oct 21, 2025

Detonate malware on VMs and get logs & detection status

C# 60 5 Updated Nov 2, 2025

Educational proof-of-concept demonstrating DEP/NX bypass using hardware breakpoints, vectored exception handling, and instruction emulation on Windows x64. For security research and learning purpos…

C 89 11 Updated Oct 17, 2025

Chalk allows you to follow code from development, through builds and into production.

Nim 410 23 Updated Nov 10, 2025

An NTP channel for Beacons, implemented using Cobalt Strike’s External C2 framework.

C++ 24 3 Updated Oct 6, 2025

A pointer encryption library intended for Red Team implant design in Rust.

Rust 62 3 Updated Oct 1, 2025

Pentesting post exploitation tool for slack

Go 29 3 Updated Nov 1, 2025

A collection of useful API endpoints for security operators and administrators

12 2 Updated Oct 7, 2025
Next