Block or Report
Block or report xiosec
Contact GitHub support about this user’s behavior. Learn more about reporting abuse.
Report abuseStars
Language
Sort by: Recently starred
The best tools and resources for forensic analysis.
.NET Decompiler with support for PDB generation, ReadyToRun, Metadata (&more) - cross-platform!
30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, mssql, mysql, ntp, oracle, pjl, pop3, postgres, rdp, redis, si…
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them
OSINT from your favorite services in a friendly terminal user interface - integrations for Virustotal, Shodan, and Censys
A curated list of CTF frameworks, libraries, resources and softwares
A curated list of useful resources that cover Offensive AI.
These templates are suggestions of how the Obsidian notetaking tool can be used during an OSINT investigation. The example data in those files should allow you to make some connections (see what I …
Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts.
An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting its contents
Artificial Intelligence: A Modern Approach - First Edition Exercise Solutions
A little toolbox to play with Microsoft Kerberos in C
🌴Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file (提权漏洞合集)
MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, insider intel, network architecture information, etc.). It ca…
Windows System Call Tables (NT/2000/XP/2003/Vista/7/8/10/11)
PowerShell Pass The Hash Utils
Collection of scripts, binaries and the like to aid in WhiteList Evasion on a Microsoft Windows Network.
Tools for discovery and abuse of COM hijacks
PoCs and tools for investigation of Windows process execution techniques
Red Teaming Tactics and Techniques
A Python based ingestor for BloodHound
RetDec is a retargetable machine-code decompiler based on LLVM.