mmmmmmmmmmmm
     mmm        mmm              
    mm            mm             
    mm            mm             
   mm              mm
   mm              mm            
   mm              mm            
   mm              mm            
  UUUUUUUUUUUUUUUUUUUU           
  UUUUUUUUUUUUUUUUUUUU           
  UUUUUUUUU   UUUUUUUU           
  UUUUUUUU     UUUUUUU           
  UUUUUUUUU   UUUUUUUU           
   UUUUUUUI   IUUUUUU            
   UUUUUUUI   IUUUUUU            
    UUUUUUUuuuUUUUUU             
     UUUUUUUUUUUUUU
Security Tooling Aggregator by  @dtmsecurity - API
NorthwaveSecurity : kernel-mii ★18 ⑂3
Wra7h : PEResourceInject C ★27 ⑂10
HackingLZ : ExtractedDefender ★103 ⑂12
paranoidninja : Brute-Ratel-C4-Community-Kit ★41 ⑂4
optiv : Mangle Go ★421 ⑂40
joe-desimone : patriot C++ ★65 ⑂9
Wh04m1001 : DFSCoerce Python ★391 ⑂53
Cracked5pider : Ekko ★225 ⑂31
trustedsec : SliverKeylogger JSON ★86 ⑂18
BinaryDefense : symbiote-preload-check Bash ★0 ⑂0
vxunderground : VX-API ★143 ⑂15
SecIdiot : TransitionalPeriod ★25 ⑂15
SecIdiot : bootdoor ★21 ⑂13
SecIdiot : beacon ★47 ⑂23
SecIdiot : FOLIAGE ★30 ⑂18
SecIdiot : TitanLdr ★37 ⑂21
s1ckb017 : PoC-CVE-2022-26809 Python ★74 ⑂20
ChoiSG : sNanoDumpInject C# ★7 ⑂1
Anlominus : Bug-Bounty ★94 ⑂12
ariary : Dogwalk-rce-poc ★60 ⑂9
rxwx : 9f6500c7baef98226c2006c6c4b48162 Mathematica
synacktiv : ica2tcp ★61 ⑂5
skahwah : Conference-Talks ★6 ⑂1
Nwqda : CVE-2022-26134 Python ★229 ⑂60
mttaggart : pwfuzz-rs ★4 ⑂0
mattifestation : AntimalwareBlight ★94 ⑂12
GhostPack : DeepPass YAML ★90 ⑂12
Octoberfest7 : BeatRev ★89 ⑂8
tothi : 66290a42896a97920055e50128c9f040
code-scrap : 23b16d829b81fe0285d6a570a7efbd13 C#
pan-unit42 : dotnetfile ★22 ⑂2
chvancooten : follina.py Python ★978 ⑂230
Cracked5pider : KaynStrike ★255 ⑂45
S4ntiagoP : freeBokuLoader ★71 ⑂15
Idov31 : Nidhogg ★367 ⑂62
klezVirus : NimlineWhispers3 Python ★102 ⑂12
NtQuerySystemInformation : NlsCodeInjectionThroughRegistry ★105 ⑂21
freefirex : dec308e1d95c6ea090c61d31a4db6f89 Text only
thefLink : DeepSleep ★194 ⑂36
horizon3ai : CVE-2022-22972 Python ★121 ⑂25
pr0xylife : Bumblebee Text only ★2 ⑂0
code-scrap : DynamicWrapperDotNet ★43 ⑂13
lowleveldesign : comon CMake ★76 ⑂11
taviso : 123elf GAS ★614 ⑂42
mgeeky : b9f0e6849b8bb53dabb27c05cfe53f22 Python
improsec : SharpEventPersist ★233 ⑂35
sailay1996 : SpoolTrigger ★97 ⑂18
tothi : f89a37127f2233352d74eef6c748ca25
ChadMotivation : SysWhispers-FunctionRandomizer Python ★12 ⑂1
kris-nova : kush ★38 ⑂1
ivigamberdiev : 9705621088359bd1a7cceca53608875f HTML
dmchell : 478d83f369260bd4e4cd380712f6bb6e C#
mubix : c74d9998944651776982865e7fac5e4f JSON
alufers : mitmproxy2swagger TOML ★3791 ⑂139
fortalice : bofhound TOML ★89 ⑂10
Pear1y : CVE-2022-26133 Python ★132 ⑂35
ZephrFish : F5-CVE-2022-1388-Exploit Python ★44 ⑂24
FuzzySecurity : WWHF-WayWest-2022 ★32 ⑂0
paranoidninja : Brute-Ratel-External-C2-Specification ★13 ⑂2
Sq00ky : SMB-Session-Spoofing ★89 ⑂12
secretsquirrel : encryptAgit TOML ★20 ⑂0
xforcered : SQLRecon ★63 ⑂7
h4x0r-dz : be69c7533075ab0d3f0c9b97f7c93a59
davidortinau : dotnet-maui-samples ★25 ⑂4
hakluke : hakoriginfinder Go ★311 ⑂35
NVIDIA : open-gpu-kernel-modules Makefile ★12145 ⑂827
forrest-orr : WizardOpium HTML ★47 ⑂11
med0x2e : NTLMRelay2Self ★263 ⑂33
EspressoCake : BeaconDownloadSync ★84 ⑂6
ayadim : nuclei-templates ★37 ⑂11
tothi : bf6c59d6de5d0c9710f23dae5750c4b9
AutomoxSecurity : iShelly Python ★15 ⑂1
trustedsec : ELFLoader ★163 ⑂32
puzzlepeaches : rnotify TOML ★2 ⑂0
trustedsec : CS-Remote-OPs-BOF ★319 ⑂49
Dec0ne : KrbRelayUp ★1005 ⑂138
d4rckh : nimc2 ★142 ⑂12
DebugPrivilege : CPP C++ ★48 ⑂7
outflanknl : C2-Tool-Collection ★538 ⑂75
khalednassar : CVE-2022-21449-TLS-PoC ★112 ⑂26
mandiant : thiri-notebook ★115 ⑂11
Grazee : CVE-2022-1329-WordPress-Elementor-RCE ★1 ⑂0
HuskyHacks : RustyTokenManipulation ★14 ⑂4
Antonlovesdnb : c85053f4171bfa92a7ea4b0b56e5c50e
mcdulltii : CVE-2022-1329 Python ★8 ⑂7
kagancapar : CVE-2022-29072 YAML ★670 ⑂107
AkuCyberSec : CVE-2022-1329-WordPress-Elementor-3.6.0-3.6.1-3.6.2-Remote-Code-Execution-Exploit Python ★8 ⑂3
malwarejake-public : packets ★2 ⑂2
rootkit-io : awesome-malware-development ★245 ⑂40
grigoritchy : pocs ★62 ⑂11
invictus-0x90 : 2e1ebcfefd8d7478e695131b88ce2926 Text only
invictus-ir : Invictus-AWS Python ★28 ⑂3
nayjones : inflate.py Python ★91 ⑂11
HuskyHacks : CobaltNotion ★46 ⑂13
cedowens : ioreg-and-sysctl-examples ★7 ⑂0
GhostPack : Invoke-Evasion ★117 ⑂13
singe : b300fbeb9723b06cf882ddb1d66c9466 Bash
byt3bl33d3r : tailscalesd TOML ★18 ⑂4
garrettfoster13 : aced ★61 ⑂4
realoriginal : 56158a6a8ea118baf358e5ae87ffabec
onurgule : S4S-Scanner ★59 ⑂25
Raz0r : semgrep-smart-contracts ★257 ⑂25
SwitHak : 0be6e857174d6ba2a6973f9ff9030c94
NCSC-NL : spring4shell ★173 ⑂33
pwn1sher : frostbyte ★248 ⑂31
Retrospected : spring-rce-poc ★86 ⑂23
scrt : avdebugger JSON ★59 ⑂8
dinosn : CVE-2022-22963 YAML ★97 ⑂35
daem0nc0re : AtomicSyscall ★109 ⑂21
IcebreakerSecurity : PersistBOF ★150 ⑂28
IcebreakerSecurity : DelegationBOF C ★102 ⑂19
skahwah : a585e176e4a5cf319b0c759637f5c410 C#
doulos0 : hackinglz ★5 ⑂1
VirtualAlllocEx : Shellcode-Downloader-CreateThread-Execution ★136 ⑂34
shogunlab : Mochi ★81 ⑂10
Wra7h : ARCInject ★90 ⑂15
nmantani : archiver-MOTW-support-comparison ★49 ⑂4
KeenSecurityLab : BinAbsInspector Groovy ★1113 ⑂162
Sh0ckFR : DLLirant Python ★217 ⑂33
breakpointHQ : TCC-ClickJacking Swift ★54 ⑂10
nonamecoder : CVE-2022-27254 ★346 ⑂45
waldo-irc : YouMayPasser Python ★143 ⑂36
Dhaiwat10 : create-web3-frontend TypeScript ★105 ⑂10
tyranid : c24cfd1bd141d14d4925043ee7e03c82 C++
snovvcrash : KeeThief ★76 ⑂9
nerdprof : BsidesRoc-2022 ★2 ⑂0
arch4ngel : sec-vault-gen Python ★67 ⑂7
Antonlovesdnb : 1c9f32237794be08a1d8ca347e4ccce5
PwnDefend : NetworkAttackMap ★34 ⑂4
frank2 : oxide Rust ★41 ⑂3
jhftss : CVE-2022-22639 Objective-C ★101 ⑂18
joe-desimone : 654cd1aef6ae5b9c3e0af7e1c42e2e06 C++
awslabs : aws-automated-incident-response-and-forensics ★268 ⑂27
NtQuerySystemInformation : CustomKeyboardLayoutPersistence ★137 ⑂29
AlexisAhmed : CVE-2022-0847-DirtyPipe-Exploits C ★282 ⑂73
NotMedic : 6e027bb3dc9f512b68e69de08a20be7d HTML
datadog : dirtypipe-container-breakout-poc ★71 ⑂12
nettitude : SyscallsExtractor ★22 ⑂2
cube0x0 : SyscallPack ★220 ⑂42
0xe7 : PowerSploit ★13 ⑂2
MythicAgents : tetanus ★165 ⑂16
paranoidninja : O365-Doppelganger ★213 ⑂29
klezVirus : SysWhispers3 Python ★520 ⑂86
microsoft : routeros-scanner Python ★747 ⑂110
rootsecdev : pyKerbrute Python ★11 ⑂4
HuskyHacks : RustyProcessInjectors ★78 ⑂8
chvancooten : CloudLabsAD ★207 ⑂31
alfarom256 : StinkyLoader ★75 ⑂14
cxnder : bn-dyldsharedcache Python ★68 ⑂3
0vercl0k : CVE-2022-21971 ★273 ⑂61
0vercl0k : CVE-2022-21974 ★49 ⑂12
curated-intel : Ukraine-Cyber-Operations ★816 ⑂88
mez-0 : YaraEngine ★1 ⑂1
woanware : etw-event-dumper ★28 ⑂4
cube0x0 : LdapSignCheck ★104 ⑂14
Allevon412 : TeamsImplant Python ★168 ⑂38
jsecurity101 : 6b9e87f5a428f31d41ffc8c1ee05a999 PowerShell
icyguider : Nimcrypt2 Nimrod ★363 ⑂73
johnnyxmas : 7a2e78a1d46512c0b1d9c1f8b3a03ee9
N7WEra : BofAllTheThings Text only ★135 ⑂28
secureworks : family-of-client-ids-research Text only ★32 ⑂3
parsdefense : ios-kernel-heap-profiler ★76 ⑂10
cube0x0 : BofRoast ★161 ⑂27
Cracked5pider : ShellcodeTemplate ★323 ⑂60
PwnDefend : RPDHoneyNet ★9 ⑂1
0xsha : 0859033e1777490576923a27fbcd23ac Python
Dramelac : GoldenCopy Python ★47 ⑂8
parsdefense : CVE-2021-1965 C ★163 ⑂29
jweny : zabbix-saml-bypass-exp ★87 ⑂37
mpgn : BackupOperatorToDA ★213 ⑂39
pr0xylife : Qakbot Text only ★33 ⑂7
cube0x0 : KrbRelay ★622 ⑂87
tothi : SharpStay ★64 ⑂11
FortyNorthSecurity : RandomScripts ★14 ⑂7
memN0ps : arsenal-rs ★32 ⑂5
pr0xylife : IcedID Text only ★4 ⑂0
mgeeky : PackMyPayload Python ★302 ⑂51
mlcsec : SharpSQL ★62 ⑂9
puzzlepeaches : msprobe TOML ★114 ⑂11
Flangvik : CobaltBus ★176 ⑂32
trustedsec : User-Behavior-Mapping-Tool Python ★123 ⑂13
bugch3ck : SharpLdapWhoami ★47 ⑂7
jsa2 : aadcookiespoof JavaScript+Genshi Text ★23 ⑂3
Cerbersec : KillDefenderBOF C ★151 ⑂20
S3cur3Th1sSh1t : Nim-RunPE Nimrod ★155 ⑂21
LeeHolmes : wordle-open-recovery-data-system HTML ★0 ⑂0
p0dalirius : RDWArecon Python ★49 ⑂8
L4ys : CVE-2022-21882 C++ ★160 ⑂43
pwn1sher : KillDefender C++ ★535 ⑂96
ORCA666 : T.D.P
TheCloudScout : sentinel-pricing ★2 ⑂2
mrd0x : EvilSelenium C# ★503 ⑂73
dosxuz : DefenderStop C# ★143 ⑂26
qtc-de : a87b2c97fd9e0330ad2dc67789a62ba5 PowerShell
S3cur3Th1sSh1t : NimGetSyscallStub ★132 ⑂25
merces : entropy JSON ★38 ⑂8
arata-nvm : mitnal ★482 ⑂7
arget13 : DDexec Bash ★345 ⑂37
KaLendsi : CVE-2022-21882 NASM ★417 ⑂132
pr0xylife : Emotet Text only ★40 ⑂5
chvancooten : NimPackt-v1 Python ★303 ⑂47
hlldz : RefleXXion ★354 ⑂65
MythicAgents : Athena ★78 ⑂13
mhaskar : b6bb8d5eaf676281565ca2ac4c4ca100 C
waldo-irc : MalMemDetect ★118 ⑂29
zyn3rgy : LdapRelayScan Python ★241 ⑂25
Cerbersec : Ares ★289 ⑂49
snovvcrash : VeraCryptThief ★185 ⑂35
trustedsec : SeeYouCM-Thief Bash ★99 ⑂19
shogunlab : Sukoshi ★32 ⑂2
frkngksl : ParallelNimcalls Nimrod ★103 ⑂13
EspressoCake : 4910a11d4f678da9c46505fda58f582f
N1ght-W0lf : fd00f58511786c7a4e8e4a4440703b82
cube0x0 : ParallelSyscalls C# ★130 ⑂27
paranoidninja : EtwTi-Syscall-Hook NASM ★175 ⑂30
thefLink : Hunt-Sleeping-Beacons C ★166 ⑂28
DarkCoderSc : PowerRemoteDesktop ★1643 ⑂183
ioncodes : ceload ★114 ⑂33
DataDog : stratus-red-team YAML ★959 ⑂92
datadog : stratus-red-team YAML ★959 ⑂92
olliencc : 2ebe7c1305f45175fc3972b99a769a2f C
EspressoCake : 7ba2371d9d6f7d3a6b0077563f819d36
warhorse : warhorse YAML ★182 ⑂20
olliencc : 90f6e040dfef1dccb61f5b3fdc62fa00 C++
kyleavery : inject-assembly ★309 ⑂56
Droogy : b5e0480815e6a960c2858ec4b1f9ba84
ioncodes : pooldump ★26 ⑂11
bohops : 2444129419c8acf837aedda5f0e7f340 Text only
hrbrmstr : hashlookup ★4 ⑂0
olliencc : 9f4bb9535c4f0ef0e54eac7912ab49c0 C++
ScarredMonk : SysmonSimulator ★599 ⑂80
sbasu7241 : 5dd8c278762c6305b4b2009d44d60c13 C#
ShutdownRepo : ShadowCoerce Python ★182 ⑂23
daem0nc0re : PrivFu ★272 ⑂49
olliencc : 881ea27b1fd0765fd44dbf75095bd183 C++
Gr1mmie : AtlasC2 ★148 ⑂28
tothi : 8abd2de8f4948af57aa2d027f9e59efe
Cracked5pider : KaynLdr ★352 ⑂79
r4j0x00 : ctf-challenges ★18 ⑂0
odzhan : 81b73e8218701d85a33215c16db9a70f
Dump-GUY : CrackMe-Examples ★15 ⑂2
NotMedic : ArtifactKit ★47 ⑂21
sunnyc7 : DefenderDocs ★0 ⑂0
jklepsercyber : defender-detectionhistory-parser Python ★93 ⑂12
c3c : ADExplorerSnapshot.py INI ★484 ⑂68
p0dalirius : ldap2json JSON ★55 ⑂8
EvotecIT : OfficeIMO ★54 ⑂7
nccgroup : DetectWindowsCopyOnWriteForAPI ★77 ⑂13
ajpc500 : NimlineWhispers2 Python ★90 ⑂8
bohops : RogueAssemblyHunter ★103 ⑂9
mufeedvh : moonwalk ★971 ⑂97
tothi : log4shell-vulnerable-app Groovy ★29 ⑂13
0x00Jeff : BetterGetProcAddress C ★79 ⑂12
immunityinc : Log4j-JNDIServer Maven ★8 ⑂0
palantir : log4j-sniffer ★186 ⑂21
sbasu7241 : 4c2640fb6dd5bfdcfac07b83f1648ee0 C#
VollRagm : KernelBypassSharp ★245 ⑂59
teslamotors : light-show ★2315 ⑂229
Mr-Un1k0d3r : WindowsDllsExport JSON ★178 ⑂29
slyd0g : log4j-honeypot-flask ★4 ⑂0
Cracked5pider : 8f6196b4da16368318a75ff3b1836195 C
EspressoCake : 3c7743742840992c7d7424d569ae5e02 JavaScript+Genshi Text
BinaryDefense : log4j-honeypot-flask ★140 ⑂23
Yaxser : COFFLoader2 C ★108 ⑂30
ly4k : Pachine Python ★232 ⑂32
DallasFR : Cobalt-Clip Bash ★68 ⑂15
cyberstruggle : L4sh Python ★253 ⑂67
kafkaesqu3 : SharpStomp C# ★18 ⑂5
cisagov : log4j-affected-db ★1097 ⑂295
ridter : nopac Python ★363 ⑂72
fullhunt : log4j-scan Text only ★2926 ⑂712
S3cur3Th1sSh1t : 0ed2fb0b5ae485b68cbc50e89581baa6 PowerShell
Malwar3Ninja : Exploitation-of-Log4j2-CVE-2021-44228 ★10 ⑂3
NCSC-NL : log4shell ★1876 ⑂657
cube0x0 : noPac ★1112 ⑂294
proferosec : log4jScanner ★476 ⑂47
WazeHell : sam-the-admin Python ★815 ⑂175
Neo23x0 : log4shell-detector Python ★722 ⑂135
maxsam4 : bad-lending-demo JSON ★25 ⑂5
karanlyons : 8635587fd4fa5ddb4071cc44bb497ab6 Python
SwitHak : b66db3a06c2955a9cb71a8718970c592
Cybereason : Logout4Shell ★1720 ⑂115
nathanqthai : 01808c569903f41a52e7e7b575caa890
superducktoes : 9b742f7b44c71b4a0d19790228ce85d8
mubix : CVE-2021-44228-Log4Shell-Hashes ★152 ⑂39
snovvcrash : 3bf1a771ea6b376d374facffa9e43383 Python
0vercl0k : wtf ★917 ⑂70
zodiacon : TotalRegistry ★951 ⑂82
anthemtotheego : InlineExecute-Assembly ★324 ⑂86
rvrsh3ll : TokenTactics PowerShell ★246 ⑂42
hakluke : hakcertstream ★30 ⑂5
Group3r : Group3r ★273 ⑂23
sstadick : hck Bash ★559 ⑂14
ConsciousHacker : WFH Python ★164 ⑂44
eksperience : KnockOutlook C# ★188 ⑂25
center-for-threat-informed-defense : attack-flow ★216 ⑂22
punk-security : SMBeagle ★397 ⑂47
mgraeber-rc : a780834c983bc0d53121c39c276bd9f3 PowerShell
xforcered : InvisibilityCloak Python ★332 ⑂65
forrest-orr : Exploits ★76 ⑂10
h4wkst3r : InvisibilityCloak Python ★181 ⑂102
netbiosX : AMSI-Provider ★87 ⑂7
qtKite : defender-control ★292 ⑂39
VirtualAlllocEx : Payload-Download-Cradles Batchfile ★148 ⑂32
Yamato-Security : WELA ★437 ⑂42
9emin1 : charlotte Python ★822 ⑂187
BloodHoundAD : SharpHoundCommon ★37 ⑂12
micahvandeusen : gMSADumper Python ★126 ⑂26
moloch-- : sliver-py Bash ★14 ⑂2
knavesec : o365fedenum Python ★27 ⑂1
BinaryDefense : YaraMemoryScanner PowerShell ★49 ⑂11
fraktalcyber : Fransom ★88 ⑂15
y11en : FOLIAGE ★75 ⑂46
Mr-Un1k0d3r : EDRs Python ★1404 ⑂239
s4r1n : AlternativeShellcodeExec ★740 ⑂176
KarimPwnz : dns-exfil Python ★44 ⑂2
antonioCoco : RemotePotato0 OMG Interface Definition Language ★1075 ⑂181
pwn1sher : uuid-loader C ★61 ⑂19
wader : fq ★4084 ⑂84
iann0036 : iamlive ★1901 ⑂71
postrequest : link TOML ★378 ⑂67
MythicAgents : merlin ★31 ⑂5
optiv : ScareCrow ★1918 ⑂330
chronicle : detection-rules ★92 ⑂24
ajpc500 : NimExamples ★63 ⑂12
httpvoid : writeups ★1015 ⑂170
blockthreat : blocksec-ctfs ★575 ⑂83
csandker : InterProcessCommunication-Samples ★66 ⑂28
mdsecresearch : BurpSuiteSharpener Batchfile ★227 ⑂28
six2dez : reconftw Bash ★2787 ⑂510
StrangerealIntel : EternalLiberty ★78 ⑂25
ethereal-vx : Antivirus-Artifacts ★569 ⑂115
Dump-GUY : Malware-analysis-and-Reverse-engineering ★419 ⑂82
C0nd4 : OSCP-Priv-Esc ★229 ⑂52
cygenta : CVE-2020-3452 Python ★25 ⑂9
pimps : JNDI-Exploit-Kit Maven ★740 ⑂147
Danielv123 : serverManager YAML ★37 ⑂6
morrownr : 8814au ★215 ⑂45
PacktPublishing : Penetration-Testing-Azure-for-Ethical-Hackers ★49 ⑂24
hashview : hashview Python ★123 ⑂17
six2dez : OneListForAll ★1089 ⑂212
MythicAgents : Apollo ★345 ⑂53
byt3bl33d3r : OffensiveNim ★1641 ⑂222
PwnDefend : wallpapers ★12 ⑂0
xforcered : StandIn ★237 ⑂30
CCob : BOF.NET CMake ★406 ⑂64
bohops : UltimateWDACBypassList ★269 ⑂40
Cloud-Architekt : AzureAD-Attack-Defense ★635 ⑂108
Sysinternals : SysmonForLinux Bash ★1090 ⑂127
kleiton0x00 : Advanced-SQL-Injection-Cheatsheet ★1240 ⑂350
vxunderground : VXUG-Papers Text only ★662 ⑂156
vxunderground : MalwareSourceCode ★10416 ⑂1157
dnif : content ★17 ⑂6
Chick3nman : e4fcee00cb6d82874dace72106d73fef
SecuProject : ADenum Python ★213 ⑂45
saeidshirazi : awesome-android-security ★927 ⑂144
artsploit : rogue-jndi Maven ★69 ⑂11
chvancooten : BugBountyScanner Bash ★533 ⑂81
redcanaryco : AtomicTestHarnesses ★162 ⑂27
NVISOsecurity : nviso-cti ★27 ⑂4
rxwx : chlonium ★181 ⑂39
projectdiscovery : mapcidr ★428 ⑂48
Unknow101 : FuckThatPacker ★500 ⑂74
SpiderLabs : DoHC2 ★402 ⑂98
SwiftOnSecurity : sysmon-config XML ★3600 ⑂1331
WhiteWinterWolf : wwwolf-php-webshell PHP ★252 ⑂107
PortSwigger : active-scan-plus-plus HTML ★165 ⑂44
SigmaHQ : sigma ★5177 ⑂1525
swisskyrepo : PayloadsAllTheThings ★38467 ⑂10472
kimci86 : bkcrack Text only ★405 ⑂54
mohabouje : WinToast ★448 ⑂99
lgandx : Responder ★3611 ⑂584
benwebber : tunnelblickctl YAML ★85 ⑂6
MicrosoftDocs : windows-itpro-docs ★1223 ⑂1737
linuz : Sticky-Keys-Slayer Bash ★291 ⑂74
BloodHoundAD : BloodHound JavaScript+Genshi Text ★6887 ⑂1360
BurntSushi : ripgrep ★31690 ⑂1415
mdamien : chrome-extensions-archive Python ★369 ⑂74
matthewdunwoody : block-parser ★80 ⑂10
Neo23x0 : signature-base Python ★1711 ⑂458
processhacker : processhacker Text only ★7642 ⑂1078
winsiderss : systeminformer Text only ★7642 ⑂1078
Bo0oM : fuzz.txt Text only ★1862 ⑂354
MichaelGrafnetter : DSInternals YAML ★1137 ⑂201
LordNoteworthy : al-khaser ★3970 ⑂959
googleprojectzero : sandbox-attacksurface-analysis-tools ★1565 ⑂381
jasonreisman : Timeline Python ★422 ⑂48
microsoft : Windows-classic-samples ★3525 ⑂2679
trustedsec : ptf Bash ★4299 ⑂1130
Yara-Rules : rules Bash ★3125 ⑂837
Kevin-Robertson : Inveigh PowerShell ★1847 ⑂383
hfiref0x : UACME YAML ★4402 ⑂1105
osquery : osquery CMake ★18998 ⑂2310
naokikimura : ognl-repl Maven ★3 ⑂1
NLua : NLua ★1573 ⑂272
aws : aws-sdk-js ★7063 ⑂1491
zer0fl4g : DebugDetector ★101 ⑂60
tyranid : oleviewdotnet ★830 ⑂156