☆17Dec 16, 2021Updated 4 years ago
Alternatives and similar repositories for Research_Papers
Users that are interested in Research_Papers are comparing it to the libraries listed below
Sorting:
- CTF toolbox☆23Apr 2, 2023Updated 2 years ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆29May 1, 2018Updated 7 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Apr 19, 2021Updated 4 years ago
- The all-in-one Red Team extension for Web Pentester. Added more functionality☆17Dec 21, 2021Updated 4 years ago
- WebApp intentionally made vulnerable to Race Condition for practicing Race Condition☆25Feb 23, 2022Updated 4 years ago
- 🤖 The Modern Port Scanner 🤖☆22Jul 1, 2021Updated 4 years ago
- Satanic Crypter A powerful tool designed to convert EXE files into BAT files with advanced features and a modern GUI interface.☆11Jan 4, 2025Updated last year
- Directory/File, DNS and VHost busting tool written in Go☆24Jan 3, 2020Updated 6 years ago
- A couple of different scripts, made to automate attacks against NoSQL databases.☆66Mar 13, 2024Updated last year
- Apple BLE research☆31Dec 1, 2019Updated 6 years ago
- Material For Malware Analysis Fundamentals Workshop By Eslam Abbas "Mr Robot"☆23Oct 9, 2025Updated 4 months ago
- just a little treasure chest of stuff I need to watch / read later☆32Mar 26, 2021Updated 4 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Dec 28, 2023Updated 2 years ago
- A backdoor is a tool used to gain remote access to a machine. Typically, backdoor utilities such as NetCat have 2 main functions: to pip…☆13Apr 26, 2021Updated 4 years ago
- A Golang implementation of clubby789's implementation of CVE-2021-4034☆11Jan 27, 2022Updated 4 years ago
- ☆14May 14, 2022Updated 3 years ago
- Automated pipeline for downloading, staging, ingesting, and investigating leaked and declassified archives (DDoSecrets, National Security…☆31Sep 22, 2025Updated 5 months ago
- Analyze your tryhackme progress!☆12May 27, 2024Updated last year
- Discord RAT made in powershell (open source)☆12Jul 16, 2025Updated 7 months ago
- TWRP device tree for ZTE Axon 7 (ailsa_ii)☆12Mar 7, 2022Updated 3 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- Adds some useful YAML frontmatter to your Obsidian notes☆11May 3, 2024Updated last year
- Powershell scripts for exfiltration.☆12Oct 5, 2024Updated last year
- Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum…☆17Jun 12, 2025Updated 8 months ago
- "My 5-Year IoT Mission" presentation at Hackware 3 Dec 2019☆10Dec 3, 2019Updated 6 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated last week
- This project enables malware to resurrect and remain hidden even after termination, using a User-Mode Program and Kernel-Mode Driver as p…☆10Jan 7, 2025Updated last year
- A tool that automates the mundane tasks of pentesting Android apps. It uses APKTool and Dex2Jar.☆11May 29, 2020Updated 5 years ago
- Study of a hypothetical attack scenario where an attacker corrupts images that are fed into an AI system, and has only a few chances befo…☆14Aug 31, 2021Updated 4 years ago
- Implementation of SelfExtend from the paper "LLM Maybe LongLM: Self-Extend LLM Context Window Without Tuning" from Pytorch and Zeta☆13Nov 11, 2024Updated last year
- My implementation of the model KosmosG from "KOSMOS-G: Generating Images in Context with Multimodal Large Language Models"☆14Nov 11, 2024Updated last year
- Various Atlassian Confluence related tools☆19Feb 19, 2026Updated last week
- VSP Stats Game Log Processor - updated and working version of vsp-0.45-xp-1.2-full.zip from https://vsp.goquake.com/ as docker image: ht…☆13Jan 28, 2026Updated last month
- Common Errors,self-written scripts related to information security,CTF challenges,steganography,forensics,web,crypto or OSINT and more☆14Nov 10, 2025Updated 3 months ago
- sms sniffer and imsi catcher☆18Apr 9, 2021Updated 4 years ago
- An information-retrieval-based approach to recover the variable names in minified JS code by searching for them in a large corpus of open…☆16Apr 26, 2021Updated 4 years ago
- Python TCP server for terminal rickrolls☆13Nov 23, 2021Updated 4 years ago
- VBS Crypter, Exe To VBS☆15Aug 5, 2022Updated 3 years ago
- [ICLR 2026] "When AI Agents Collude Online: Financial Fraud Risks by Collaborative LLM Agents on Social Platforms"☆26Feb 3, 2026Updated last month