General Windows Hardening Script as well as cybersecuirty resources for cyberpatriot
☆39Oct 1, 2025Updated 7 months ago
Alternatives and similar repositories for Windows-Script-and-Resources-TroyHS
Users that are interested in Windows-Script-and-Resources-TroyHS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cybersecurity scripts created and used during the AFA CyberPatriot VIII competition☆34Dec 22, 2016Updated 9 years ago
- Basic ransomware proof of concept with Python 3.7.☆57Apr 11, 2019Updated 7 years ago
- Fully Undetectable Native C++ Remote Access Agent / Botnet.☆93Mar 11, 2020Updated 6 years ago
- Bitcoin Clipper malware made in Python☆143Jun 8, 2021Updated 4 years ago
- ☆201Aug 15, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Complete Python RansomeWare Source Code With Full Decoumetions.☆224Mar 11, 2023Updated 3 years ago
- Board definitions for SparkFun-manufactured AVR, ARM, and ESP-based Arduino boards.☆279Mar 1, 2025Updated last year
- ☆235Sep 22, 2022Updated 3 years ago
- A simple, fully python ransomware PoC☆376Jun 23, 2020Updated 5 years ago
- OSCP Cheatsheet by Sai Sathvik Ruppa☆1,181Oct 3, 2024Updated last year
- [ICLR 2025] DuoAttention: Efficient Long-Context LLM Inference with Retrieval and Streaming Heads☆543Feb 10, 2025Updated last year
- ESP32S2 native USB library. Implemented few common classes, like MIDI, CDC, HID or DFU (update).☆547Feb 3, 2023Updated 3 years ago
- Penelope Shell Handler☆1,684Apr 18, 2026Updated 3 weeks ago
- BitBLAS is a library to support mixed-precision matrix multiplications, especially for quantized LLM deployment.☆762Aug 6, 2025Updated 9 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Python Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles☆628Mar 5, 2025Updated last year
- Ressources for bug bounty hunting☆1,920Dec 1, 2022Updated 3 years ago
- Penetration tests guide based on OWASP including test cases, resources and examples.☆2,786Mar 23, 2022Updated 4 years ago
- 🐳 Efficient Triton implementations for "Native Sparse Attention: Hardware-Aligned and Natively Trainable Sparse Attention"☆995Feb 5, 2026Updated 3 months ago
- An Python Script For Generating Payloads that Bypasses All Antivirus so far .☆1,000Jan 19, 2024Updated 2 years ago
- EDR Lab for Experimentation Purposes☆1,447Mar 1, 2026Updated 2 months ago
- Awesome EDR Bypass Resources For Ethical Hacking☆1,522Jan 26, 2026Updated 3 months ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆3,430Nov 23, 2022Updated 3 years ago
- Powerful Tool to Grab Front Camera Snaps Using A Link☆1,259Mar 19, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- FB (Facebook) + GEMM (General Matrix-Matrix Multiplication) - https://code.fb.com/ml-applications/fbgemm/☆1,557May 3, 2026Updated last week
- A curated list of awesome OSCP resources☆3,401Apr 28, 2024Updated 2 years ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,989Jan 28, 2026Updated 3 months ago
- RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data☆6,932Apr 22, 2026Updated 2 weeks ago
- Run Nintendo Switch homebrew & games on your Android device!☆2,334Sep 2, 2024Updated last year
- The Havoc Framework☆8,328Dec 18, 2025Updated 4 months ago
- game of active directory☆7,771Mar 12, 2026Updated last month
- The LumenPnP is an open source pick and place machine.☆3,321Feb 25, 2026Updated 2 months ago
- A collection of all the data i could extract from 1 billion leaked credentials from internet.☆3,254Jul 1, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- 🚀 Efficient implementations for emerging model architectures☆5,032May 1, 2026Updated last week
- Wiki to collect Red Team infrastructure hardening resources☆4,476Oct 1, 2025Updated 7 months ago
- Arduino command line tool☆4,887Updated this week
- Experimental PlayStation Vita emulator☆5,218May 3, 2026Updated last week
- An open source cross-platform USB stack for embedded system☆6,774Updated this week
- Efficient Triton Kernels for LLM Training☆6,331Apr 30, 2026Updated last week
- Credentials recovery project☆10,807Sep 18, 2025Updated 7 months ago