Skip to content
View kyle41111's full-sized avatar
  • SpecterOps
  • Mass

Block or report kyle41111

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Automated OSINT on SwaggerHub

Python 206 34 Updated Jan 16, 2024

Educational proof-of-concept demonstrating DEP/NX bypass using hardware breakpoints, vectored exception handling, and instruction emulation on Windows x64. For security research and learning purpos…

C 73 9 Updated Oct 17, 2025

Load .net assemblies from memory while having them appear to be loaded from an on-disk location.

C# 172 25 Updated May 5, 2021

Beads - A memory upgrade for your coding agent

Go 1,922 104 Updated Oct 22, 2025

C++ self-Injecting dropper based on various EDR evasion techniques.

C 408 71 Updated Feb 11, 2024

Olive: Simplify ML Model Finetuning, Conversion, Quantization, and Optimization for CPUs, GPUs and NPUs.

Python 2,159 251 Updated Oct 20, 2025

Generative AI extensions for onnxruntime

C++ 859 221 Updated Oct 21, 2025

A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its minimalist, robust, and highly adaptable architecture, this solu…

JavaScript 124 21 Updated Aug 5, 2025

365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack.

PHP 545 95 Updated Jun 27, 2025

Infisical is the open-source platform for secrets, certificates, and privileged access management.

TypeScript 22,972 1,538 Updated Oct 22, 2025

Hooking KPRCB IdlePreselect function to gain execution inside PID 0.

C++ 73 13 Updated Apr 13, 2025

Local AI Model (GGUF) Management Script

Shell 5 3 Updated Oct 6, 2025

Advanced Active Directory network topology analyzer with SMB validation, multiple authentication methods (password/NTLM/Kerberos), and comprehensive network discovery. Export results as BloodHound‑…

Python 457 52 Updated Oct 21, 2025

DiffRays is a research-oriented tool for binary patch diffing, designed to aid in vulnerability research, exploit development, and reverse engineering.

Python 253 17 Updated Oct 12, 2025

Unified Efficient Fine-Tuning of 100+ LLMs & VLMs (ACL 2024)

Python 60,597 7,340 Updated Oct 21, 2025

Source code for the worst malware classifier of all time

Python 6 Updated Oct 5, 2025

adws enumeration bof

C 148 14 Updated Oct 2, 2025

Workshop on firmware reverse engineering

C 313 39 Updated Sep 25, 2025
Python 11 Updated Oct 1, 2025

A pointer encryption library intended for Red Team implant design in Rust.

Rust 59 3 Updated Oct 1, 2025

A collection of useful API endpoints for security operators and administrators

10 2 Updated Oct 7, 2025

Dataset with labeled benign and malicious files 🗃️

TeX 139 22 Updated Jul 19, 2023

Find jmp gadgets for call stack spoofing.

C# 61 7 Updated Oct 1, 2025

☁️ Nextcloud server, a safe home for all your data

PHP 33,017 4,602 Updated Oct 22, 2025

RunPE implementation with multiple evasive techniques

C 220 30 Updated Sep 25, 2025

D(COM) V(ulnerability) S(canner) AKA Devious swiss army knife - Lateral movement using DCOM Objects

PowerShell 250 44 Updated Oct 13, 2020

Intercept Windows Named Pipes communication using Burp or similar HTTP proxy tools

Python 272 18 Updated Sep 18, 2025
Next