zjx137 / hexo-theme-TsuView external linksLinks
A light and simple theme for Hexo
☆17Feb 24, 2021Updated 4 years ago
Alternatives and similar repositories for hexo-theme-Tsu
Users that are interested in hexo-theme-Tsu are comparing it to the libraries listed below
Sorting:
- Community Eventing and Scripting examples☆18Aug 11, 2025Updated 6 months ago
- Cobaltstrike UDRL with memory evasion☆15May 16, 2024Updated last year
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- Linux privilege escalation auditing tool☆10Aug 24, 2017Updated 8 years ago
- A tracker DLL which enables 'NTAPI->Syscall' tracking whenever it is loaded. It calls 'NtSetInformationProcess' API call with a callback …☆14Oct 21, 2024Updated last year
- 注入c#控制台到非托管进程☆17May 9, 2022Updated 3 years ago
- A Multi-Threaded PE Export Collection Utility☆14May 13, 2023Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that uses RegConnectRegistryA + RegOpenKeyExA API to dump registry hives on remote computer☆17Mar 4, 2023Updated 2 years ago
- Golang PoC that sandboxes Defender (or other PPL) by setting its token integrity to Untrusted.☆12May 28, 2025Updated 8 months ago
- ollvm, based on llvm-clang 5.0.2, 6.0.1, 7.0.1, 8.0, 9.0, 9.0.1☆19Apr 4, 2022Updated 3 years ago
- Fast Windows post-exploitation wins after initial access.☆28Jan 28, 2026Updated 2 weeks ago
- Rust implementation of the Process Herpaderping☆25Jul 6, 2023Updated 2 years ago
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆20Apr 17, 2023Updated 2 years ago
- A C# tool for extracting information from SCCM PXE boot media.☆45Jan 14, 2026Updated last month
- Windows Access token manipulation tool made in C#☆24Aug 24, 2025Updated 5 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆25Dec 20, 2025Updated last month
- Dump LSASS process in Task Manager without triggering Defender.☆18Apr 6, 2023Updated 2 years ago
- A basic PE bootloader☆15Oct 21, 2023Updated 2 years ago
- Exploit for elevation of privilege vulnerability in QuickHeal's Seqrite EPS (CVE-2023-31497).☆18Oct 30, 2023Updated 2 years ago
- 存储练习项目,目前有GetWeChatBOF☆19Jul 26, 2023Updated 2 years ago
- A National Vulnerability Database (NVD) API query tool☆17Jun 27, 2023Updated 2 years ago
- A Cobalt Strike Beacon Notifier Via Telegram Bot.☆19Dec 2, 2023Updated 2 years ago
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆16May 21, 2023Updated 2 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- open source port/reimplementation of the Cobalt Strike BOF Loader as is☆64Feb 3, 2026Updated last week
- Exploits written while preparing for the OSED exam☆26Apr 30, 2024Updated last year
- Enumerate the Domain for Readable and Writable Shares☆23Nov 14, 2025Updated 3 months ago
- Mythic Scripting PyPi package - mythic☆28Oct 10, 2025Updated 4 months ago
- Convert VBS file to EXE☆17May 17, 2025Updated 8 months ago
- Detect and remove the presence of canary tokens☆25Dec 9, 2023Updated 2 years ago
- A library to make HTTP requests with the Windows winhttp API☆25Feb 8, 2024Updated 2 years ago
- A thin Rust wrapper around Windows' hardware breakpoints.☆21Jul 14, 2022Updated 3 years ago
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆25Jun 5, 2024Updated last year
- 🔐 explores techniques to exploit and manipulate buffer overflow vulnerabilities in a program.☆23Jun 18, 2023Updated 2 years ago
- Learning notes of amazing Sliver C2 project.☆25Apr 14, 2023Updated 2 years ago
- Bytesafe Community Edition is a security platform that protects organizations from open source software supply chain attacks.☆24Sep 15, 2024Updated last year
- A Ruby micro-framework for writing and running exploit payloads☆23Jan 16, 2026Updated last month
- Tools/scripts I used/developed during the EXP-301 course.☆26May 17, 2022Updated 3 years ago
- BOF and C++ implementation of the Windows Defender sandboxing technique described by Elastic Security Labs/Gabriel Landau.☆24Jul 5, 2023Updated 2 years ago