Stars
Public library of space documents and tutorials
Repository of companion code for "Social Media Exposed" (No Starch Press)
Extract Windows credentials directly from VM memory snapshots and virtual disks
Project N.O.M.A.D, is a self-contained, offline survival computer packed with critical tools, knowledge, and AI to keep you informed and empowered—anytime, anywhere.
Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.
Emulation of the Drosophila Fly brain: Brian2, Brian2CUDA, PyTorch, NEST GPU, and neuromorphic chips
macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other formats for pentest, demo, and social engineering assessments…
Advanced keyboard-walk generator with configureable basechars, keymap and routes
This repo covers some code execution and AV Evasion methods for Macros in Office documents
This open-source curriculum introduces the fundamentals of Model Context Protocol (MCP) through real-world, cross-language examples in .NET, Java, TypeScript, JavaScript, Rust and Python. Designed …
The Developer's Guide to AI - A Field Guide for the Working Developer
Collection of various malicious functionality to aid in malware development
Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).
For educational purposes only, exhaustive samples of 500+ classic/modern trojan builders including screenshots.
Research code & papers from members of vx-underground.
A reference of Windows API function calls, including functions for file operations, process management, memory management, thread management, dynamic-link library (DLL) management, synchronization,…
A curated list of awesome YARA rules, tools, and people.
Program for determining types of files for Windows, Linux and MacOS.
A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
Collection of malware source code for a variety of platforms in an array of different programming languages.
Azul is a malware repository for reverse engineers, incident responders and everyone in-between.
A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk