A collection of tools created for computer security research purposes.
☆139Feb 2, 2026Updated 2 months ago
Alternatives and similar repositories for tools
Users that are interested in tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆51Feb 2, 2026Updated 2 months ago
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆182Feb 2, 2026Updated 2 months ago
- Papers, presentations and documents from the team at Hacker House.☆53Feb 2, 2026Updated 2 months ago
- exploits and proof-of-concept vulnerability demonstration files from the team at Hacker House☆468Feb 22, 2026Updated last month
- cve-2018-10933 libssh authentication bypass☆110Feb 2, 2026Updated 2 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- AES-256 Microsoft Cryptography API Example Use.☆35Feb 2, 2026Updated 2 months ago
- CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation☆23Feb 2, 2026Updated 2 months ago
- Offensive Lua.☆225Feb 2, 2026Updated 2 months ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆34Feb 2, 2026Updated 2 months ago
- Github profile☆21Feb 2, 2026Updated 2 months ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆57Feb 2, 2026Updated 2 months ago
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆320Feb 2, 2026Updated 2 months ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆184Feb 2, 2026Updated 2 months ago
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Patching "signtool.exe" to accept expired certificates for code-signing.☆343Feb 2, 2026Updated 2 months ago
- This is a malware repo. Use them at your own risk. This is strictly for educational purposes only.☆12May 22, 2019Updated 6 years ago
- UAC bypass for x64 Windows 7 - 11☆836Feb 2, 2026Updated 2 months ago
- ☆11Feb 12, 2023Updated 3 years ago
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆111Feb 2, 2026Updated 2 months ago
- A cloud based remote android managment suite(Botnet), powered by NodeJS☆11Apr 27, 2021Updated 4 years ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆78Feb 8, 2023Updated 3 years ago
- a windows kernel keylogger that works☆20Feb 12, 2024Updated 2 years ago
- A Python-Based script designed to output stable and screen-scrapable lists of wireless networks☆15Jun 19, 2014Updated 11 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated 11 months ago
- ☆12Oct 9, 2022Updated 3 years ago
- Git All the Payloads! A collection of web attack payloads.☆10Dec 31, 2018Updated 7 years ago
- Because I can't find scripts to do this anywhere else...☆26Dec 27, 2016Updated 9 years ago
- An 💦 orgasmic 💦 Python library for the Docker Engine API 🥵☆13Jan 13, 2024Updated 2 years ago
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆131Oct 10, 2021Updated 4 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- ☆22Jun 9, 2025Updated 10 months ago
- Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.☆83Feb 2, 2026Updated 2 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆13Sep 6, 2019Updated 6 years ago
- Detonate malware on VMs and get logs & detection status☆89Mar 17, 2026Updated 3 weeks ago
- Hide Port In Windows☆42Oct 24, 2024Updated last year
- Just an experiment with hash cracking :) few password lists along with some good password cracking rule sets.☆13Feb 29, 2020Updated 6 years ago
- C# havoc implant☆100Feb 12, 2023Updated 3 years ago
- CVE-2018-19276 - OpenMRS Insecure Object Deserialization RCE☆16Mar 11, 2019Updated 7 years ago
- Information for accessing The Cyber Plumber's Handbook Lab☆30Oct 10, 2022Updated 3 years ago