Lists (14)
Sort Name ascending (A-Z)
Stars
Manage Android machines with pre-defined behaviors for Cyber Range environments.
Opinionated defaults, documentation, and workflows for Claude Code at Trail of Bits
A secure, durable runtime to sandbox AI agent tasks. Run untrusted code in isolated WebAssembly environments.
Local-first AI-powered document intelligence platform for investigative journalism
Small library allowing to use dlopen() from statically-linked applications (where statically-linked executable vs loaded shared library may use completely different libc's)
Modern Java decompiler aiming to be as accurate as possible, with an emphasis on output quality. Fork of the Fernflower decompiler.
An ergonomic and safe syscall interception framework for Linux.
A Linux version of the Procmon Sysinternals tool
Personal AI Notebooks. Organize files & webpages and generate notes from them. Open source, local & open data, open model choice (incl. local).
A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Integrates with LLM agents via MCP for enhanced analysis capabil…
a lightweight library to parse Linux's /proc/[pid]/maps file, which contains the memory map of a process
ELEGANTBOUNCER is a detection tool for file-based mobile exploits.
Official python implementation of UTCP. UTCP is an open standard that lets AI agents call any API directly, without extra middleware.
A list of awesome things related to the Starlark language
rasta-mouse / ThreatCheck
Forked from matterpreter/DefenderCheckIdentifies the bytes that Microsoft Defender / AMSI Consumer flags on.
tiny, portable SOCKS5 server with very moderate resource usage
Python Command-Line Ghidra Binary Diffing Engine
pwn++ is a Windows & Linux library oriented for exploit dev but mostly used to play with modern C++ features
Top 500 DNS domains seen on the Quad9 recursive resolver array each day
Memstop monitors available memory and waits until a configurable percentage of memory becomes available before allowing a program to start.
Share a single keyboard and mouse between multiple computers.
A collection of methods to learn who the owner of an IP address is.
Data from a BRAWL Automated Adversary Emulation Exercise
Decompiler from Java bytecode to Java, used in IntelliJ IDEA.