Giter Club home page Giter Club logo

hpvca's Projects

kubei icon kubei

Kubei is a flexible Kubernetes runtime scanner, scanning images of worker and Kubernetes nodes providing accurate vulnerabilities assessment, for more information checkout:

kubernetes-cryptocurrency-mining icon kubernetes-cryptocurrency-mining

A Kubernetes Cluster Miner, which runs containers of miners for a specific currency. Done to learn Kubernetes in a more hands-on fashion.

malchive icon malchive

Various capabilities for static malware analysis.

malwaresourcecode icon malwaresourcecode

Collection of malware source code for a variety of platforms in an array of different programming languages.

netloader icon netloader

Loads any C# binary in mem, patching AMSI + ETW.

netuser icon netuser

使用windows api添加用户,可用于net无法使用时.分为nim版,c++版本,RDI版,BOF版。

nuclei icon nuclei

Nuclei is a fast tool for configurable targeted vulnerability scanning based on templates offering massive extensibility and ease of use.

octopus icon octopus

Open source pre-operation C2 server based on python and powershell

offsecdev icon offsecdev

Working repo used to experiment with various languages as it relates to offensive security & evasion.

paper_collection icon paper_collection

Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read

peirates icon peirates

Peirates - Kubernetes Penetration Testing tool

poc-in-github icon poc-in-github

📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.

powersploit icon powersploit

PowerSploit - A PowerShell Post-Exploitation Framework

pwnshop icon pwnshop

Exploit Development, Reverse Engineering & Cryptography

radareeye icon radareeye

A tool made for specially scanning nearby devices[BLE, Bluetooth & Wifi] and execute our given command on our system when the target device comes in-between range.

rakkess icon rakkess

Review Access - kubectl plugin to show an access matrix for k8s server resources

reflexxion icon reflexxion

RefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc. In order to bypass the user-mode hooks, it first collects the syscall numbers of the NtOpenFile, NtCreateSection, NtOpenSection and NtMapViewOfSection found in the LdrpThunkSignature array.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.