Stars
- All languages
- Assembly
- Batchfile
- C
- C#
- C++
- CMake
- CSS
- CodeQL
- Dart
- Dockerfile
- Erlang
- FreeMarker
- Go
- Groovy
- HTML
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- Lua
- Makefile
- NSIS
- Nim
- Objective-C
- Objective-C++
- PHP
- PLpgSQL
- Pascal
- PowerShell
- Python
- QMake
- Rich Text Format
- Roff
- Ruby
- Rust
- Shell
- Smarty
- Solidity
- Swift
- TypeScript
- Vue
- YARA
🎬 卡卡字幕助手 | VideoCaptioner - 基于 LLM 的智能字幕助手,无需GPU一键高质量字幕视频合成!视频字幕生成、断句、校正、字幕翻译全流程。让字幕制作简单高效!
ysoSimple:简易的Java漏洞利用工具,集成Java反序列化,Hessian反序列化,XStream反序列化,SnakeYaml反序列化,Shiro550,JSF反序列化,SSTI模板注入,JdbcAttackPayload,JNDIAttack,字节码生成。
一个 CLASS 文件混淆工具,支持方法名/字段名/参数名引用分析和重命名混淆方式,支持字符串提取/AES加密运行时解密/整型异或混淆/垃圾代码花指令混淆/等方式,支持方法和字段的隐藏,配置简单,容易上手
Jar Analyzer - 一个JAR包分析工具,批量分析,SCA漏洞分析,方法调用关系搜索,字符串搜索,Spring组件分析,信息泄露检查,CFG程序分析,JVM栈帧分析,进阶表达式搜索,字节码指令级的动态调试分析,反编译JAR包一键导出,一键提取序列化数据恶意代码,一键分析BCEL字节码
An inject tools for injecting js code into electron application
Solutions and Notes for Labs of Computer Systems: A Programmer's Perspective 3rd Editon 《深入理解计算机系统》第三版配套实验作业和笔记
一个好用的越权扫描工具。越权漏洞自动化检测难、易发生且危害严重,但我们仍可以尽力自动化检测一部分越权漏洞。
Hook system calls on Windows by using Kaspersky's hypervisor
📱 Graphical Scrcpy to display and control Android, devices powered by Electron.
A simple zero-config tool to make locally trusted development certificates with any names you'd like.
dnSpyEx / dnSpy
Forked from dnSpy/dnSpyUnofficial revival of the well known .NET debugger and assembly editor, dnSpy
自动化反编译微信小程序,小程序安全评估工具,发现小程序安全问题,自动解密,解包,可还原工程目录,支持Hook,小程序修改
Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)
Web 版 Java Payload 生成与利用工具,提供 Java 反序列化、Hessian 1/2 反序列化等Payload生成,以及 JNDI、Fake Mysql、JRMPListener 等利用|The web version of Java Payload generation and utilization tool provides Payload generation su…
【WIP】📦 一款脱壳工具,能够识别并尝试脱除常见的PE壳,如UPX、ASPack等,帮助用户进行软件逆向工程和恶意软件分析。This is an unpacking tool that can identify and attempt to remove common PE shells like UPX and ASPack, aiding in software reverse eng…
k0otkit is a universal post-penetration technique which could be used in penetrations against Kubernetes clusters.
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.