Lists (18)
Sort Name ascending (A-Z)
Stars
Multi-LLM orchestration plugin for Claude Code — 8 providers (Codex, Gemini, Claude, Perplexity, OpenRouter, Copilot, Qwen, Ollama), 47 commands, 50 skills, Double Diamond workflows
Let your AI go full send. Your home directory stays home.
Agentic AI Infrastructure for magnifying HUMAN capabilities.
An agentic skills framework & software development methodology that works.
The agent harness performance optimization system. Skills, instincts, memory, security, and research-first development for Claude Code, Codex, Opencode, Cursor and beyond.
EvilMist is a collection of scripts and utilities designed to support cloud penetration testing & red teaming. The toolkit helps identify misconfigurations, assess privilege-escalation paths, and s…
A source code static analysis platform for AppSec enthusiasts.
A Beacon Object File (BOF) that talks directly to Windows authentication packages through the LSA untrusted/trusted client interface, without touching LSASS process memory.
Shannon Lite is an autonomous, white-box AI pentester for web applications and APIs. It analyzes your source code, identifies attack vectors, and executes real exploits to prove vulnerabilities bef…
BYOVD: Use 360 WFP driver to block EDR/XDR network connection.
The ADSyncDump BOF is a port of Dirk-Jan Mollema's adconnectdump.py / ADSyncDecrypt into a Beacon Object File (BOF) with zero dependencies.
Dump LSASS via physical memory read primitives in vulnerable kernel drivers
Community-contributed instructions, agents, skills, and configurations to help you make the most of GitHub Copilot.
A collection of 100+ specialized Claude Code subagents covering a wide range of development use cases
🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast. Precise. Effective.
Proof-of-Concept tool for extracting NTLMv1 hashes from sessions on modern Windows systems.
universal text transformation, translation, mutation, encoding/decoding, and promptcrafting
One rule to crack all passwords. or atleast we hope so.
RunPE implementation with multiple evasive techniques (2)
A collection of PoCs to do common things in unconventional ways
Local SYSTEM auth trigger for relaying - X
Waiting Thread Hijacking - injection by overwriting the return address of a waiting thread