Lists (7)
Sort Name ascending (A-Z)
Stars
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
Weaponizing DCOM for NTLM Authentication Coercions
xforcered / RemoteMonologue
Forked from 3lp4tr0n/RemoteMonologueWeaponizing DCOM for NTLM Authentication Coercions
🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications
Not The Hidden Wiki - The largest repository of links related to cybersecurity
Investigate malicious Windows logon by visualizing and analyzing Windows event log
KQL Queries. Microsoft Defender, Microsoft Sentinel
LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113
Windows Internals Book 7th edition Tools
This is a repository of resource about Malware techniques
A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.
Find exposed data in Azure with this public blob scanner
Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.
Group Membership Management (GMM) is a service that dynamically manages the membership of AAD Groups. Groups managed by GMM can have their membership defined using existing AAD Groups and/or custom…
Flipper Zero Unleashed Firmware
ChatGPT Jailbreaks, GPT Assistants Prompt Leaks, GPTs Prompt Injection, LLM Prompt Security, Super Prompts, Prompt Hack, Prompt Security, Ai Prompt Engineering, Adversarial Machine Learning.