Lists (22)
Sort Name ascending (A-Z)
AI
attack-tools
benchmark
binary-protect
bugbounty
bypass webshell
cloud security
Collection of programming
common-use
CTF
ebpf
Fuzzing-tech
hardware
mobile
myself
Now-work
OS
paper
payload
static-analysis
TEE-list
sev sgx trustzonewebassembly
Starred repositories
🥢像老乡鸡🐔那样做饭。主要部分于2024年完工,非老乡鸡官方仓库。文字来自《老乡鸡菜品溯源报告》,并做归纳、编辑与整理。CookLikeHOC.
Intelligent automation and multi-agent orchestration for Claude Code
Keeps track of transactions sent via Safe contacts and confirmed transactions. It also keeps track of Ether and ERC20 token transfers to Safe contracts.
Grafana Dashboards for Prometheus Exporter
Aptos is a layer 1 blockchain built to support the widespread use of blockchain through better technology and user experience.
The all-in-one Desktop & Docker AI application with built-in RAG, AI agents, No-code agent builder, MCP compatibility, and more.
Zero shot vulnerability discovery using LLMs
RoleLLM: Benchmarking, Eliciting, and Enhancing Role-Playing Abilities of Large Language Models
Generative Agents: Interactive Simulacra of Human Behavior
MagicMirror² is an open source modular smart mirror platform. With a growing list of installable modules, the MagicMirror² allows you to convert your hallway or bathroom mirror into your personal a…
Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()
A patch to hide qemu itself, bypass mhyprot,EAC,nProtect / VMProtect,VProtect, Themida, Enigma Protector,Safegine Shielden
A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
Reverse Engineering: Decompiling Binary Code with Large Language Models
WireGuard VPN installer for Linux servers
Tools to help with Reverse Engineering UEFI-based firmware
FPGA modules used together with the PCILeech Direct Memory Access (DMA) Attack Software
Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities
A practical attack framework for precise enclave execution control