-
Practical Security Analytics
- https://practicalsecurityanalytics.com/
- @prac_sec
Stars
reflectively load and execute PEs locally and remotely bypassing EDR hooks
a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )
The 100 Days of YARA Challenge to write YARA rules consistently
Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabling collaboration to tackle trending vulnerabilities on the β¦
A complete, beginner-friendly bug bounty roadmap that takes you from zero experience to earning your first bounty.
AI-powered pentesting framework with automated recon and exploitation. Multi-source subdomain discovery, active vuln testing (XSS/SQLi/SSRF/IDOR), AI-driven payload generation, local inference, strβ¦
C# implementation of LangChain. We try to be as close to the original as possible in terms of abstractions, but are open to new entities.
C# - Opensource OSINT program, using google dorking methods, free api's and much more.
Utility libraries to interact with discs, filesystem formats and more
KittyLoader is a highly evasive loader written in C / Assembly
User-friendly AI Interface (Supports Ollama, OpenAI API, ...)
demonstrates the execution of an executable directly in memory, without leaving a trace on the hard drive.
Run a Exe File (PE Module) in memory (like an Application Loader)
Fine-tuning & Reinforcement Learning for LLMs. π¦₯ Train OpenAI gpt-oss, DeepSeek, Qwen, Llama, Gemma, TTS 2x faster with 70% less VRAM.
Execute unmanaged Windows executables in CobaltStrike Beacons
SharpSploit is a .NET post-exploitation library written in C#
.NET IPv4/IPv6 machine-in-the-middle tool for penetration testers
π₯π Forbidden collection of Red Team sorcery ππ₯
Security Software Driver Names and Process Names
Lockless allows for the copying of locked files.
A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.
A PowerShell module to facilitate building, configuring, deploying, and auditing Windows Defender Application Control (WDAC) policies
Adversary simulation and Red teaming platform with AI