Stars
Educational proof-of-concept demonstrating DEP/NX bypass using hardware breakpoints, vectored exception handling, and instruction emulation on Windows x64. For security research and learning purpos…
Load .net assemblies from memory while having them appear to be loaded from an on-disk location.
C++ self-Injecting dropper based on various EDR evasion techniques.
Olive: Simplify ML Model Finetuning, Conversion, Quantization, and Optimization for CPUs, GPUs and NPUs.
Generative AI extensions for onnxruntime
A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its minimalist, robust, and highly adaptable architecture, this solu…
365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack.
Infisical is the open-source platform for secrets, certificates, and privileged access management.
Hooking KPRCB IdlePreselect function to gain execution inside PID 0.
Advanced Active Directory network topology analyzer with SMB validation, multiple authentication methods (password/NTLM/Kerberos), and comprehensive network discovery. Export results as BloodHound‑…
DiffRays is a research-oriented tool for binary patch diffing, designed to aid in vulnerability research, exploit development, and reverse engineering.
Unified Efficient Fine-Tuning of 100+ LLMs & VLMs (ACL 2024)
Source code for the worst malware classifier of all time
Workshop on firmware reverse engineering
A pointer encryption library intended for Red Team implant design in Rust.
A collection of useful API endpoints for security operators and administrators
Dataset with labeled benign and malicious files 🗃️
☁️ Nextcloud server, a safe home for all your data
RunPE implementation with multiple evasive techniques
D(COM) V(ulnerability) S(canner) AKA Devious swiss army knife - Lateral movement using DCOM Objects
Intercept Windows Named Pipes communication using Burp or similar HTTP proxy tools