-
ctf-skills Public
Forked from ljagiello/ctf-skillsClaude Code skills for solving CTF challenges - web exploitation, binary pwn, crypto, reverse engineering, forensics, OSINT, and more
MIT License UpdatedFeb 9, 2026 -
awesome-claude-skills-security Public
Forked from Eyadkelleh/awesome-claude-skills-securitySecurity testing toolkit for Claude Code: curated SecLists wordlists, injection payloads, and expert agents for authorized pentesting, CTFs, and bug bounties
-
pypykatz Public
Forked from skelsec/pypykatzMimikatz implementation in pure Python
Python MIT License UpdatedNov 11, 2025 -
smram_parse Public
System Management RAM analysis tool
-
s6_pcie_microblaze Public
PCI Express DIY hacking toolkit for Xilinx SP605. This repository is also home of Hyper-V Backdoor and Boot Backdoor, check readme for links and info
-
SmmBackdoorNg Public
Updated version of System Management Mode backdoor for UEFI based platforms: old dog, new tricks
-
pico_dma Public
Autonomous pre-boot DMA attack hardware implant for M.2 slot based on PicoEVB development board
-
SmmBackdoor Public
First open source and publicly available System Management Mode backdoor for UEFI based platforms. Good as general purpose playground for various SMM experiments.
-
vmlinux-to-elf Public
Forked from marin-m/vmlinux-to-elfA tool to recover a fully analyzable .ELF from a raw kernel, through extracting the kernel symbol table (kallsyms)
-
-
masscan Public
Forked from robertdavidgraham/masscanTCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
-
efiXplorer Public
Forked from REhints/efiXplorerIDA plugin for UEFI firmware analysis and reverse engineering automation
-
portage Public
Forked from gentoo/portagePortage Package Manager - this is just a mirror, see https://wiki.gentoo.org/wiki/Project:Portage#Contributing_to_Portage
-
fwexpl Public
PC firmware exploitation tool and library
-
ThinkPwn Public
Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0day vulnerability in machines of many vendors
-
MicroBackdoor Public
Small and convenient C2 tool for Windows targets
-
KernelForge Public
A library to develop kernel level Windows payloads for post HVCI era
-
zc_pcie_dma Public
DMA attacks over PCI Express based on Xilinx Zynq-7000 series SoC
-
PeiBackdoor Public
PEI stage backdoor for UEFI compatible firmware
-
openreil Public archive
Open source library that implements translator and tools for REIL (Reverse Engineering Intermediate Language)
-
qc_debug_monitor Public
Debug messages monitor for Qualcomm cellular modems
-
chipsec Public
Forked from chipsec/chipsecPlatform Security Assessment Framework
-
PowerShell-Suite Public
Forked from FuzzySecurity/PowerShell-SuiteMy musings with PowerShell
-
r0ak Public
Forked from codingtest/r0akr0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems
-
WindowsRegistryRootkit Public archive
Kernel rootkit, that lives inside the Windows registry values data
-
Aptiocalypsis Public
Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwares
-
secretnet_expl Public
LPE exploits for Secret Net and Secret Net Studio
-
UEFI_boot_script_expl Public
CHIPSEC module that exploits UEFI boot script table vulnerability
-
capstone Public
Forked from capstone-engine/capstoneCapstone disassembly/disassembler framework: Core (Arm, Arm64, Mips, PPC, Sparc, SystemZ, X86, X86_64, XCore) + bindings (Python, Java, Ocaml)
-
ioctlfuzzer Public archive
Automatically exported from code.google.com/p/ioctlfuzzer