简历
☆16Aug 13, 2020Updated 5 years ago
Alternatives and similar repositories for resume
Users that are interested in resume are comparing it to the libraries listed below
Sorting:
- A semantic-based tool to detect credential leakage in mini-apps.☆18Sep 8, 2024Updated last year
- Technology, papers, products and other documents related to large language models and large language model security☆17Mar 29, 2024Updated last year
- Load the evilDLL from socket connection without touch disk☆15Aug 27, 2021Updated 4 years ago
- 使用微信聊天记录统计信息☆19Oct 21, 2017Updated 8 years ago
- 蓝凌OA漏洞利用工具/前台无条件RCE/文件写入☆19Jun 29, 2021Updated 4 years ago
- ☆22Jul 29, 2021Updated 4 years ago
- Example implementation of DNSAdmin DLL PrivEsc attack☆28Dec 11, 2019Updated 6 years ago
- CVE-2022-46463(Harbor 未授权)☆30Jul 15, 2025Updated 7 months ago
- Exploit for LPE in ZoneAlarm Antivirus/Firewall☆32Apr 25, 2022Updated 3 years ago
- 一个基于分布式爬虫的信安文章搜索引擎☆27May 22, 2023Updated 2 years ago
- ☆30Mar 21, 2023Updated 2 years ago
- 安全卫士项目☆32Aug 4, 2017Updated 8 years ago
- ☆39Oct 12, 2022Updated 3 years ago
- generate CobaltStrike's cross-platform payload☆34Jun 16, 2024Updated last year
- Windows kernel PDB data parsed into YAML☆42Nov 2, 2025Updated 4 months ago
- ☆36Nov 12, 2021Updated 4 years ago
- Quick tool for checking CVE-2020-0688 on multiple hosts with a non-intrusive method.☆38Jun 1, 2021Updated 4 years ago
- PoCs and technical analysis of three vulnerabilities found on Cisco AnyConnect for Windows: CVE-2020-3433, CVE-2020-3434 and CVE-2020-343…☆43Sep 25, 2020Updated 5 years ago
- Slides of my public talks☆62Feb 20, 2026Updated 2 weeks ago
- PoC-Malware-TTPs☆48Mar 26, 2023Updated 2 years ago
- A collection of weaponized LPE exploits written in Go☆53Jan 23, 2025Updated last year
- AdHoc solutions☆49Aug 29, 2023Updated 2 years ago
- 数据安全风险枚举框架(Data Security Risk Enumeration)☆53Mar 2, 2026Updated last week
- Apache-backdoor Apache 中间件模块后门☆53Jan 10, 2020Updated 6 years ago
- This PoC uses two diferent technics for stealing the primary token from all running processes, showing that is possible to impersonate a…☆57Nov 4, 2021Updated 4 years ago
- Clone running process with ZwCreateProcess☆59Nov 8, 2020Updated 5 years ago
- Proof of Concept for EFSRPC Arbitrary File Upload (CVE-2021-43893)☆64Feb 14, 2022Updated 4 years ago
- CobaltStrike and Google Auth twice☆63Oct 11, 2021Updated 4 years ago
- C# version of NTLMRawUnHide☆72Oct 8, 2022Updated 3 years ago
- ☆74Jul 23, 2021Updated 4 years ago
- Windows MSI Installer LPE (CVE-2021-43883)☆79Dec 17, 2021Updated 4 years ago
- cmd2shellcode☆79May 6, 2021Updated 4 years ago
- DLL Hollowing PoC - Remote and Self shellcode injection☆85Nov 10, 2021Updated 4 years ago
- C# Tool to interact with MS Exchange based on MS docs☆102Dec 7, 2022Updated 3 years ago
- ☆88Jun 28, 2022Updated 3 years ago
- Research project for understanding how Mimikatz work and become better at C☆123Oct 22, 2021Updated 4 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆94Mar 8, 2023Updated 3 years ago
- A proof of concept for a clickjacking attack on macOS.☆97Feb 12, 2024Updated 2 years ago
- NoPacScan is a CVE-2021-42287/CVE-2021-42278 Scanner,it scan for more domain controllers than other script☆87Feb 17, 2022Updated 4 years ago