Highlights
- Pro
Stars
A massively parallel, optimal functional runtime in Rust
A massively parallel, high-level programming language
display a very bright white color on HDR-enabled displays
Finding secrets in kernel and user memory
Monitor linux processes without root permissions
Network analysis tool for Attack Defence CTF
Dissect is a digital forensics & incident response framework and toolset that allows you to quickly access and analyse forensic artefacts from various disk and file formats, developed by Fox-IT (pa…
The Dissect module tying all other Dissect modules together. It provides a programming API and command line tools which allow easy access to various data sources inside disk images or file collecti…
Real-time face swap for PC streaming or video calls
dnSpyEx / dnSpy
Forked from dnSpy/dnSpyUnofficial revival of the well known .NET debugger and assembly editor, dnSpy
Never ever ever use pixelation as a redaction technique
Python implementations of cryptographic attacks and utilities.
Volatility Symbol Generator for Linux Kernels
JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP Server, RMI Server and LDAP Server to exploit java web apps v…
Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)
Trojan Source: Invisible Vulnerabilities
HardeningKitty and Windows Hardening Settings