- Taoyuan, Taiwan
-
20:03
(UTC +08:00) - https://jelyf1shhhhhh.w1nter.cc
- 70ny._.w4n9.h
Highlights
- Pro
Stars
A Windows AD Password Manager for ATTACKER(Redteamer/Pentester).
The contents of /mnt/skills in Claude's code interpreter environment
Flutter Mobile Application Reverse Engineering Tool
Collection of CTF Web challenges I made
Small and highly portable detection tests based on MITRE's ATT&CK.
Katana - Automatic CTF Challenge Solver in Python3
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Run macOS VM in a Docker! Run near native OSX-KVM in Docker! X11 Forwarding! CI/CD for OS X Security Research! Docker mac Containers.
OWASP Foundation web repository
Little PoC for AIS3 2025 AI Course
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
Real-time command injection monitor with syntax highlighting and balance analysis.
An open source IoT Hacker Tool by using Raspberry Pi Zero 2 W
A simple extension for kdnet kernel mode debugger
This is a scanning tools for AIS3 project in group 7
AIS3 2025 課程教材 - 典範轉移:AI 時代的情資運用及防禦
My Binary Exploitation's Course Practice challenge.
This is a simulation of attack by the Cozy Bear group (APT-29) targeting diplomatic missions
This repository aims to hold suggestions (and hopefully/eventually code) for CTF challenges. The "project" is nicknamed Katana.
RootKit-Org / BetterCam
Forked from ra1nty/DXcamWorld's Fastest high-performance Python screen capture library for Windows using Desktop Duplication API
APT & CyberCriminal Campaign Collection
Free and open binary exploitation course for 2024 NCKUCTF
Interesting APT Report Collection And Some Special IOCs
OneDrive public directory listing, powered by Vercel and Next.js