mmmmmmmmmmmm
     mmm        mmm              
    mm            mm             
    mm            mm             
   mm              mm
   mm              mm            
   mm              mm            
   mm              mm            
  UUUUUUUUUUUUUUUUUUUU           
  UUUUUUUUUUUUUUUUUUUU           
  UUUUUUUUU   UUUUUUUU           
  UUUUUUUU     UUUUUUU           
  UUUUUUUUU   UUUUUUUU           
   UUUUUUUI   IUUUUUU            
   UUUUUUUI   IUUUUUU            
    UUUUUUUuuuUUUUUU             
     UUUUUUUUUUUUUU
Security Tooling Aggregator by  @dtmsecurity - API
reveng007 : AMSI-patches-learned-till-now ★2 ⑂3
boku7 : azureOutlookC2
TheD1rkMtr : NTDLLReflection
mdecrevoisier : Splunk-input-windows-baseline
duc-nt : CVE-2022-44268-ImageMagick-Arbitrary-File-Read-PoC ★113 ⑂17
sdcampbell : 41dcaef1068b6b44fd05ac1d3a0dc661 C#
microsoft : WSL2-Linux-Kernel
Laokoon-SecurITy : Cortex-XDR-Config-Extractor Python
jfmaes : AmsiHooker C#
Neo23x0 : auditd
snovvcrash : 35773330434e738bd86155894338ba4f C#
OtterHacker : eebd9aaba18afba395be6e381d0787a7 Python
C0axx : ebf65d863ee708464287c7040b15162a PowerShell
code-scrap : 9fb07d656dd3c8f0995019edfd8f3518 C#
Samirbous : ace96ae7ec63ecf36df7a20fcaa52613
Chick3nman : 32e662a5bb63bc4f51b847bb422222fd
Antonlovesdnb : 65400b3e89605f77d4a96ad1af5faff3
olliencc : 90f6e040dfef1dccb61f5b3fdc62fa00 C++
tothi : 392dbb008ae0b60d25cfa4447bc21121
xpn : 5f497d2725a041922c427c3aaa3b37d1 C#
EvanMcBroom : 525d84b86f99c7a4eeb4e3495cffcbf0 C
weslambert : 0d055aefbc167e0314514bb2d979fc82
trimarcjared : 1646d242dbb4765e4500faebeb411361 PowerShell
olliewuk : c518e820784d72cc8b1ce6f26be7a968 Java
S3cur3Th1sSh1t : 0ed2fb0b5ae485b68cbc50e89581baa6 PowerShell
zhuowei : bc7a90bdc520556fda84d33e0583eb3e Objective-C
tothi : f89a37127f2233352d74eef6c748ca25
mpgn : 9fc08b0f0fde55e8c322518bc1f9c317
passthehashbrowns : a6f46856219ef353be2e49bf323f173d
testanull : 518871a2e2057caa2bc9c6ae6634103e PowerShell
bananabr : TimeException C++
objective-see : Malware
cedowens : ioreg-and-sysctl-examples
Mr-Un1k0d3r : AMSI-ETW-Patch C#
last-byte : PersistenceSniper
SolomonSklash : SleepyCrypt NASM
NotMedic : ArtifactKit
Cerbersec : KillDefenderBOF C
Bo0oM : fuzz.txt Text only
CodeXTF2 : Burp2Malleable
ke0z : VulChatGPT Python
smokeme : airstrike
NUL0x4C : APCLdr
splunk : melting-cobalt Python
scrt : avdebugger JSON
mandiant : flare-floss Text only
lorentzenman : sheepl Python
dodo-sec : asta-decrypt.py Python
OpenAttackDefenseTools : tulip Python
berthubert : googerteller CMake
NtQuerySystemInformation : CustomKeyboardLayoutPersistence
nerdprof : BsidesRoc-2022
ChoiSG : sNanoDumpInject C#
BinaryDefense : YaraMemoryScanner PowerShell
dcsync : pycobalt Python
tihanyin : PSSW100AVB PowerShell
mdsecactivebreach : DragonCastle
trustedsec : SliverKeylogger JSON
N1ght-W0lf : MalwareAnalysis
Ge0rg3 : requests-ip-rotator Python
redteamsocietegenerale : DLLirant XML
bats3c : shad0w Python
NextronSystems : gimphash
nopbrick : SeeProxy
rad9800 : WatchOwl
helpsystems : CreateProcess
GhostPack : DeepPass YAML
zyn3rgy : ClickonceHunter
woj-ciech : Kamerka-GUI
SnaffCon : Snaffler
SunWeb3Sec : DeFiHackLabs
skahwah : Conference-Talks
Coldzer0 : ReverseSock5Proxy
jamf : aftermath
xenoscr : manual-syscall-detect
horizon3ai : CVE-2022-22972 Python
mandiant : heyserial Python
danielbohannon : Invoke-Obfuscation
akamai : akamai-security-research
ion-storm : sysmon-config XML
bohops : Notes
xorrior : macOSTools Python
n00py : GetFGPP Python
CodeXTF2 : cobaltstrike-headless
lgandx : Responder
onekey-sec : unblob Python
Bdenneu : CVE-2022-33679 Python
CronUp : Malware-IOCs Batchfile
CodeXTF2 : WindowSpy
Pear1y : CVE-2022-26133 Python
codewhitesec : HandleKatz Python
kyleavery : AceLdr
thinkst : canarytokens
d3lb3 : KeeFarceReborn
KeenSecurityLab : BinAbsInspector Groovy
Checkmarx : kics
rad9800 : WTSRM
jorgeorchilles : presentations
mandiant : STrace
projectdiscovery : mapcidr
NagliNagli : BountyTricks YAML
BishopFox : unredacter HTML
antonioCoco : RunasCs C#
weak1337 : Alcatraz
djsime1 : awesome-flipperzero
bfuzzy1 : auditd-attack
dbgsymbol : getsymbol
juanfont : headscale Go
icyguider : Shhhloader
hrbrmstr : hashlookup
0x90n : InfoSec-Black-Friday
nheiniger : SnaffPoint
Gerenios : AADInternals
xillwillx : winnuke NASM
Gekkio : gb-research
azeemidrisi : phonesploit-pro Python
ironmansoftware : psedit
Idov31 : Nidhogg
soufianetahiri : RemoteShellCodeInjection
jart : blink
rapid7 : metasploit-framework Ruby
zcgonvh : DCOMPotato C#
persistence-info : persistence-info.github.io
johnnyxmas : ScanCannon Bash
KULeuven-COSIC : Starlink-FI
t3l3machus : hoaxshell Python
sandflysecurity : sandfly-entropyscan Go
peasead : elastic-container YAML
morRubin : NegoExRelay Python
fin3ss3g0d : evilgophish
uforia : MatterBot Python
rasta-mouse : SharpC2
ceramicskate0 : SharpExchange
armvirus : SinMapper
horizon3ai : CVE-2022-40684 Python
acidanthera : MacHyperVSupport
f1zm0 : hades
azure : azure-sentinel
iamtrask : Grokking-Deep-Learning
HavocFramework : Havoc
mez-0 : YaraEngine
VollRagm : KernelBypassSharp
SpiderLabs : DoHC2
tjnull : TJ-OSINT-Notebook
Eng1n33r : flipperzero-firmware Batchfile
naokikimura : ognl-repl Maven
wavestone-cdt : EdrSandblast
parsdefense : ios-kernel-heap-profiler
zblurx : certsync
void-stack : VMUnprotect.Dumper
C0axx : CanaryHunter
slyd0g : ObjCShellcodeLoader
Octoberfest7 : Presentations
zdhenard42 : SOC-Multitool
TurtleARM : CVE-2023-0179-PoC C
rad9800 : talks
ps1337 : reinschauer
gildas-lormeau : SingleFile-Lite
NVISOsecurity : Interceptor
forrest-orr : Exploits
optiv : Mangle
redhat-infosec : priority-intelligence-requirements-dev
Mr-Un1k0d3r : Windows-SignedBinary Python
BloodHoundAD : SharpHound XML
zadewg : RIUS Python
horizon3ai : vRealizeLogInsightRCE Text only ★112 ⑂21
snovvcrash : 123945e8f06c7182769846265637fedb Bash
Squiblydoo : debloat ★85 ⑂4
eddiechu : File-Smuggling HTML ★152 ⑂17
Octoberfest7 : Inline-Execute-PE ★309 ⑂45
tijme : amd-ryzen-master-driver-v17-exploit ★99 ⑂17
daddycocoaman : AzBelt JSON ★89 ⑂5
ustayready : golddigger Python ★102 ⑂13
0xmachos : macOS-Security-Research ★65 ⑂8
vullabs : Crassus ★270 ⑂35
Wh04m1001 : RazerEoP ★22 ⑂6
BushidoUK : e0b1961da6992f0f55fee446b91acb40
dievus : msLDAPDump Python ★93 ⑂11
rad9800 : WTSRM2 ★117 ⑂20
snovvcrash : 09deab831d49028e194e8ee83f2616a9 C#
mlcsec : ASRenum-BOF ★104 ⑂14
Antonlovesdnb : e738c5a745e3513bf2d0c71c4f13a29c
stacksmashing : flipperzero-firmware Batchfile ★59 ⑂2
nettitude : ShellcodeMutator Python ★169 ⑂24
binderlabs : DirCreate2System ★217 ⑂27
chm0dx : creepyCrawler Python ★33 ⑂2
mgeeky : msi-shenanigans ★53 ⑂9
blasty : printer-cracktro ★31 ⑂8
bohops : DynamicDotNet ★80 ⑂11
yuriisanin : CVE-2022-45025 ★86 ⑂18
fr0gger : IATelligence ★297 ⑂32
OccamsXor : Dragnmove ★175 ⑂20
JusticeRage : Gepetto Python ★1812 ⑂164
Wh04m1001 : SysmonEoP ★169 ⑂30
ironmansoftware : psmsi C# ★217 ⑂15
Kudaes : Unwinder ★134 ⑂15
testanull : ProxyNotShell-PoC Python ★369 ⑂80
google : osv-scanner YAML ★4400 ⑂206
Eandrju : cellular-automaton.nvim ★1229 ⑂19
CCob : Volumiser ★260 ⑂26
icyguider : MoreImpacketExamples Python ★220 ⑂17
MalwareTech : SpookySSLTools Bash ★37 ⑂16
Haunted-Banshee : ErebusGate ★145 ⑂13
xforcered : AdvSim.Compression ★8 ⑂0
sensepost : impersonate C ★194 ⑂23
liamg : siphon ★164 ⑂7
t3l3machus : Villain Python ★2398 ⑂405
singe : singrep ★44 ⑂2
elastic : Silhouette ★67 ⑂6
bugch3ck : SharpEfsPotato ★194 ⑂28
OPENCYBER-FR : RustHound ★513 ⑂37
embee-research : Yara ★25 ⑂8
S3cur3Th1sSh1t : NimShellcodeFluctuation ★67 ⑂9
microsoft : aka ★180 ⑂12
cat-alyst : presentations ★3 ⑂0
med0x2e : vba2clr C# ★113 ⑂18
code-scrap : awesome-tunneling ★73 ⑂4
CodeXTF2 : PyHmmm Python ★51 ⑂9
wssheldon : osintui ★652 ⑂33
WithSecureLabs : TickTock ★62 ⑂11
jazzpizazz : BloodHound.py-Kerberos Python ★68 ⑂6
Idov31 : Cronos ★368 ⑂48
code-scrap : 4448a63f236f5c3705030332b9cc1689 Text only
MattKeeley : Spoofy Python ★97 ⑂21
NUL0x4C : Syscallslib ★69 ⑂17
jsa2 : caOptics JSON ★163 ⑂15
lkarlslund : ldapnomnom Go ★618 ⑂50
xRET2pwn : Teamsniper Python ★180 ⑂13
0xd4y : AWSealion Python ★63 ⑂12
HavocFramework : Modules ★89 ⑂19
mgeeky : 82d6abe0508ae81f107689864fb5dfc0 Text only
hackerhouse-opensource : NoFaxGiven ★26 ⑂5
troyhunt : d238ded80353cce53bea4545545ed172 Text only
xforcered : AdvSim.Cryptography ★24 ⑂1
Wra7h : FlavorTown ★374 ⑂65
necst : CANflict ★11 ⑂0
iilegacyyii : Shellcrypt Python ★89 ⑂10
mhaskar : ExchangeFinder TOML ★162 ⑂23
Idov31 : Sandman ★538 ⑂67
mistymntncop : CVE-2022-1802 JavaScript ★141 ⑂26
KiFilterFiberContext : warbird-hook ★180 ⑂21
naksyn : talks ★5 ⑂1
epi052 : feroxfuzz TOML ★145 ⑂8
ancailliau : SynSharp ★2 ⑂0
sneakid : DC30-PhineasTalk ★22 ⑂1
deepinstinct : Lsass-Shtinkering ★291 ⑂33
Rog3rSm1th : kharma TOML ★38 ⑂5
tyranid : blackhat-usa-2022-demos PowerShell ★256 ⑂27
N4kedTurtle : 5d5ecb916c45ad7f8da9dee740700ec7 C
besimorhino : cbee284f532eaba45396973ffd268080 XML
redballoonsecurity : ofrak Python ★1448 ⑂104
d4rckh : gorilla ★353 ⑂18
mttaggart : efc870e02eb603943e0dae8ebd54d3dc JSON
ergrelet : cpplumber ★74 ⑂5
rad9800 : TamperingSyscalls ★374 ⑂56
C0axx : Modified-Thycotic-Secret-Stealer PowerShell ★16 ⑂1
rad9800 : VehApiResolve ★86 ⑂20
h4wkst3r : Blackhat-USA-2022-Materials ★61 ⑂11
Sprocket-Security : fireproxng TOML ★21 ⑂1
Henkru : cs-get-last-error ★19 ⑂3
janoglezcampos : DeathSleep ★386 ⑂58
Henkru : cs-token-vault ★116 ⑂23
Techryptic : Pokemon-Shellcode-Loader C++ ★89 ⑂13
usualsuspect : 791fc53a62d9a42836fef5e0412dd686 Python
MolecularMatters : dbf39ea79fdf0ca00ca5083cba3a1da9 C++
Cracked5pider : CoffeeLdr ★206 ⑂27
ChoiSG : OneDriveUpdaterSideloading ★69 ⑂14
vletoux : PingCastleCloud ★117 ⑂12
m3rcer : Chisel-Strike ★388 ⑂51
netero1010 : RDPHijack-BOF C ★241 ⑂37
mdsecactivebreach : SharpAltiris ★23 ⑂4
xforcered : BokuLoader ★171 ⑂11
wavvs : nanorobeus JSON ★119 ⑂17
frkngksl : NiCOFF Nimrod ★131 ⑂17
jgamblin : 5252c791362460c733d8aded1d7d00ae
Wh04m1001 : IDiagnosticProfileUAC C++ ★159 ⑂26
NoDataFound : IDrawAPT ★5 ⑂0
yardenshafir : IoRingReadWritePrimitive ★108 ⑂25
p0dalirius : windows-coerced-authentication-methods ★332 ⑂42
layer8secure : SilentHound Python ★352 ⑂37
WithSecureLabs : CallStackSpoofer ★264 ⑂38
Flangvik : TeamFiltration ★613 ⑂72
NorthwaveSecurity : kernel-mii ★29 ⑂4
Wra7h : PEResourceInject C ★45 ⑂15
olafhartong : WDACme XML ★12 ⑂0
HackingLZ : ExtractedDefender ★162 ⑂20
paranoidninja : Brute-Ratel-C4-Community-Kit ★167 ⑂24
crisprss : magicNetdefs OMG Interface Definition Language ★43 ⑂5
joe-desimone : patriot C++ ★102 ⑂19
brandonprry : crestron C# ★22 ⑂3
Cracked5pider : Ekko ★384 ⑂70
memN0ps : srdi-rs ★172 ⑂16
S3cur3Th1sSh1t : 6022dc2050bb1b21be2105b8b0dc077d Nimrod
vxunderground : VX-API ★785 ⑂140
s1ckb017 : PoC-CVE-2022-26809 Python ★103 ⑂30
Anlominus : Bug-Bounty ★223 ⑂47
ariary : Dogwalk-rce-poc ★74 ⑂11
tothi : impacket INI ★11 ⑂3
synacktiv : ica2tcp ★71 ⑂8
mttaggart : pwfuzz-rs ★6 ⑂0
Octoberfest7 : BeatRev ★133 ⑂20
tothi : 66290a42896a97920055e50128c9f040
code-scrap : 23b16d829b81fe0285d6a570a7efbd13 C#
pan-unit42 : dotnetfile ★79 ⑂9
chvancooten : follina.py Python ★1073 ⑂250
Cracked5pider : KaynStrike ★319 ⑂54
S4ntiagoP : freeBokuLoader ★73 ⑂15
NtQuerySystemInformation : NlsCodeInjectionThroughRegistry ★116 ⑂25
freefirex : dec308e1d95c6ea090c61d31a4db6f89 Text only
pr0xylife : Bumblebee Text only ★12 ⑂2
chvancooten : conferences ★23 ⑂0
lowleveldesign : comon CMake ★94 ⑂14
taviso : 123elf GAS ★765 ⑂53
capt-meelo : laZzzy Python ★370 ⑂54
mgeeky : b9f0e6849b8bb53dabb27c05cfe53f22 Python
SECFORCE : SharpWhispers ★57 ⑂13
kris-nova : kush ★44 ⑂2
dmchell : 478d83f369260bd4e4cd380712f6bb6e C#
mubix : c74d9998944651776982865e7fac5e4f JSON
alufers : mitmproxy2swagger TOML ★4170 ⑂166
fortalice : bofhound TOML ★146 ⑂16
chvancooten : maldev-for-dummies ★923 ⑂115
ZephrFish : F5-CVE-2022-1388-Exploit Python ★52 ⑂27
CronUp : Vulnerabilidades ★111 ⑂28
Sq00ky : SMB-Session-Spoofing ★111 ⑂14
secretsquirrel : encryptAgit ★26 ⑂2
xforcered : SQLRecon ★216 ⑂22
daddycocoaman : dumpscan ★75 ⑂18
BloodHoundAD : BARK PowerShell ★246 ⑂41
h4x0r-dz : be69c7533075ab0d3f0c9b97f7c93a59
davidortinau : dotnet-maui-samples ★30 ⑂4
NVIDIA : open-gpu-kernel-modules Makefile ★12861 ⑂919
forrest-orr : WizardOpium HTML ★53 ⑂13
med0x2e : NTLMRelay2Self ★301 ⑂38
tothi : bf6c59d6de5d0c9710f23dae5750c4b9
trustedsec : ELFLoader C ★190 ⑂37
puzzlepeaches : rnotify TOML ★3 ⑂0
r4wd3r : Suborner ★363 ⑂45
Dec0ne : KrbRelayUp ★1222 ⑂165
olafhartong : MDE-AuditCheck PowerShell ★83 ⑂5
outflanknl : C2-Tool-Collection ★700 ⑂109
mandiant : thiri-notebook ★134 ⑂12
HuskyHacks : RustyTokenManipulation ★19 ⑂4
Antonlovesdnb : c85053f4171bfa92a7ea4b0b56e5c50e
kagancapar : CVE-2022-29072 YAML ★680 ⑂109
AkuCyberSec : CVE-2022-1329-WordPress-Elementor-3.6.0-3.6.1-3.6.2-Remote-Code-Execution-Exploit Python ★15 ⑂5
malwarejake-public : packets ★5 ⑂2
ZephrFish : AzureAttackKit ★57 ⑂14
invictus-0x90 : 2e1ebcfefd8d7478e695131b88ce2926 Text only
invictus-ir : Invictus-AWS Python ★47 ⑂6
singe : b300fbeb9723b06cf882ddb1d66c9466 Bash
onurgule : S4S-Scanner ★66 ⑂31
hrbrmstr : escpos ★17 ⑂1
pwn1sher : frostbyte ★329 ⑂45
dinosn : CVE-2022-22963 YAML ★105 ⑂40
IcebreakerSecurity : DelegationBOF C ★113 ⑂21
VirtualAlllocEx : Shellcode-Downloader-CreateThread-Execution ★171 ⑂38
shogunlab : Mochi ★87 ⑂11
Wra7h : ARCInject ★96 ⑂16
nmantani : archiver-MOTW-support-comparison ★88 ⑂7
Sh0ckFR : DLLirant ★312 ⑂51
breakpointHQ : TCC-ClickJacking Swift ★65 ⑂15
assume-breach : Home-Grown-Red-Team ★199 ⑂46
nonamecoder : CVE-2022-27254 ★417 ⑂60
waldo-irc : YouMayPasser Python ★182 ⑂41
tyranid : c24cfd1bd141d14d4925043ee7e03c82 C++
arch4ngel : sec-vault-gen Python ★72 ⑂8
Antonlovesdnb : 1c9f32237794be08a1d8ca347e4ccce5
PwnDefend : NetworkAttackMap ★33 ⑂5
frank2 : oxide Rust ★45 ⑂4
rxwx : 55b486031fb44d94351174d8b340c8fe JavaScript
jhftss : CVE-2022-22639 Objective-C ★114 ⑂22
joe-desimone : 654cd1aef6ae5b9c3e0af7e1c42e2e06 C++
awslabs : aws-automated-incident-response-and-forensics ★290 ⑂39
NotMedic : 6e027bb3dc9f512b68e69de08a20be7d HTML
winsecurity : Offensive-C-Sharp ★132 ⑂36
datadog : dirtypipe-container-breakout-poc ★76 ⑂12
nettitude : SyscallsExtractor ★20 ⑂4
0xe7 : PowerSploit ★22 ⑂2
MythicAgents : tetanus ★198 ⑂20
paranoidninja : O365-Doppelganger ★226 ⑂32
klezVirus : SysWhispers3 Python ★755 ⑂113
microsoft : routeros-scanner Python ★835 ⑂117
rootsecdev : pyKerbrute Python ★10 ⑂4
HuskyHacks : RustyProcessInjectors ★81 ⑂10
chvancooten : CloudLabsAD ★238 ⑂47
alfarom256 : StinkyLoader ★93 ⑂17
cudeso : misp-tip-of-the-week JSON ★57 ⑂4
cxnder : bn-dyldsharedcache Python ★77 ⑂3
0vercl0k : CVE-2022-21971 ★287 ⑂65
0vercl0k : CVE-2022-21974 ★55 ⑂14
curated-intel : Ukraine-Cyber-Operations ★857 ⑂94
woanware : etw-event-dumper ★29 ⑂5
cube0x0 : LdapSignCheck ★133 ⑂19
Allevon412 : TeamsImplant Python ★194 ⑂41
jsecurity101 : 6b9e87f5a428f31d41ffc8c1ee05a999 PowerShell
icyguider : Nimcrypt2 Nimrod ★548 ⑂95
johnnyxmas : 7a2e78a1d46512c0b1d9c1f8b3a03ee9
N7WEra : BofAllTheThings Text only ★213 ⑂34
secureworks : family-of-client-ids-research Text only ★77 ⑂8
cube0x0 : BofRoast ★180 ⑂31
Cracked5pider : ShellcodeTemplate ★518 ⑂89
PwnDefend : RPDHoneyNet Text only ★9 ⑂0
0xsha : 0859033e1777490576923a27fbcd23ac Python
tothi : SharpStay ★64 ⑂11
FortyNorthSecurity : RandomScripts ★25 ⑂13
memN0ps : arsenal-rs ★66 ⑂12
pr0xylife : IcedID Text only ★28 ⑂4
mgeeky : PackMyPayload Python ★601 ⑂104
mlcsec : SharpSQL ★69 ⑂9
puzzlepeaches : msprobe TOML ★219 ⑂31
MeViMo : youbit TOML ★641 ⑂20
Flangvik : CobaltBus ★194 ⑂35
trustedsec : User-Behavior-Mapping-Tool Python ★138 ⑂14
bugch3ck : SharpLdapWhoami ★52 ⑂8
jsa2 : aadcookiespoof JavaScript+Genshi Text ★24 ⑂3
S3cur3Th1sSh1t : Nim-RunPE Nimrod ★205 ⑂29
LeeHolmes : wordle-open-recovery-data-system HTML ★1 ⑂0
p0dalirius : RDWArecon Python ★59 ⑂11
L4ys : CVE-2022-21882 C++ ★185 ⑂49
pwn1sher : KillDefender C++ ★576 ⑂111
PortSwigger : oauth-scan HTML ★172 ⑂5
thefLink : RecycledGate ★299 ⑂44
RedTeamOperations : Advanced-Process-Injection-Workshop ★550 ⑂112
TheCloudScout : sentinel-pricing ★19 ⑂8
mrd0x : EvilSelenium C# ★545 ⑂85
dosxuz : DefenderStop C# ★157 ⑂30
qtc-de : a87b2c97fd9e0330ad2dc67789a62ba5 PowerShell
merces : entropy JSON ★42 ⑂9
arata-nvm : mitnal ★496 ⑂8
arget13 : DDexec Bash ★476 ⑂51