Penelope – A Versatile Shell Handler For Exploiting RCE Vulnerabilities

11 months ago

Penelope is a shell handler designed to be easy to use and intended to replace netcat when exploiting RCE vulnerabilities.…

Vulnhuntr – Unleashing LLMs For Advanced Security Vulnerability Detection In Codebases

11 months ago

Vulnhuntr leverages the power of LLMs to automatically create and analyze entire code call chains starting from remote user input…

LsassReflectDumping – A Deep Dive Into Secure Credential Extraction Techniques

11 months ago

This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone is…

CVE-2024-30090 : LPE Proof Of Concept Detailed

11 months ago

In the evolving landscape of cybersecurity, understanding the mechanisms behind vulnerabilities is crucial for both mitigation and responsible exploitation. This…

Arena-Hard-Auto : Advancing LLM Evaluation With Style Control Integration

11 months ago

Arena-Hard-Auto-v0.1 (See Paper) is an automatic evaluation tool for instruction-tuned LLMs. It contains 500 challenging user queries sourced from Chatbot…

go-exploitdb : A Comprehensive Guide To Managing Exploit Databases

11 months ago

This is a tool for searching Exploits from some Exploit Databases. Exploits are inserted at sqlite database(go-exploitdb) can be searched…

Awesome LLM AIOps: A Comprehensive Survey Of Incident

11 months ago

A list of awesome academic researches and industrial materials about Large Language Model (LLM) and Artificial Intelligence for IT Operations…

PwnedPasswordsDownloader – Efficient Downloading Of HIBP Password Hashes Using Curl Parallelism

11 months ago

Thanks for HIBP and this downloader. At first I was considering using it, but the API of HIBP passwords is…

Cybersecurity Conferences – A Comprehensive Slide Collection

11 months ago

Comprehensive repository for presentation slides from major cybersecurity conferences held in 2023 and 2024. It provides quick access to the…

DLL Proxy Generator – Harnessing Advanced Proxy Capabilities

11 months ago

Generate a proxy dll for arbitrary dll, while also loading a user-defined secondary dll. In the evolving landscape of software…