mutedmouse Goto Github PK
Name: Muted Mouse
Type: User
Bio: Dabbler in all things! I think the best things come from tinkering with disparate processes until you have a functional automation system.
Name: Muted Mouse
Type: User
Bio: Dabbler in all things! I think the best things come from tinkering with disparate processes until you have a functional automation system.
3D-printable hexagonal mirror array capable of reflecting sunlight into arbitrary patterns
ForensicArtifacts.com Artifact Repository
Live Feed of Suspected C2 Servers
Destiny2 Automated Clan Management for Lazy Poobah and their admins - Sends data to Splunk for Visualizations and Lifecycle statistics
Cloud Security Posture Management (CSPM)
Cobalt Strike is a commercial, full-featured, remote access tool that bills itself as "adversary simulation software designed to execute targeted attacks and emulate the post-exploitation actions of advanced threat actors". Cobalt Strike’s interactive post-exploit capabilities cover the full range of ATT&CK tactics, all executed within a single, integrated system.
CobaltStrike's source code
cobaltstrike4.5版本破/解、去除checksum8特征、bypass BeaconEye、修复错误路径泄漏stage、增加totp双因子验证等
Cronos is Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation.
An unattended easy button for effortlessly building Cuckoo.
Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)
Local Privilege Escalation Edition for CVE-2021-1675
CVE-2022-22963 PoC
poc
CVE-2022-26809-RCE-EXP
WSO2 RCE (CVE-2022-29464) exploit and writeup.
Transforms any file into a protected ELF executable
Rules for the Detection Engine in Elastic Security
Integration with GRR and Timesketch
ELKomply splunk app git repository for most recent updates and changes.
Configs for usage with ELKomply Splunk App
Create tar/zip archives that can exploit directory traversal vulnerabilities
A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows.
simple python socket connection to test if exim is vulnerable to CVE-2019-10149. The payload simply touch a file in /tmp/eximrce.
A python Code to obfuscate any non-fud python payload and generate a ready to use FUD Python executable script
Provides situational awareness of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks in support of network security assessments. #nsacyber
GRR Rapid Response: remote live forensics for incident response
Documentation for the GRR Rapid Reponse framework
grr automated deployment and statistical analysis scripts
ALL IN ONE Hacking Tool For Hackers
A declarative, efficient, and flexible JavaScript library for building user interfaces.
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google ❤️ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.