-
[undisclosed, they don't pay me enough]
- Denver
-
22:31
(UTC -06:00) - https://orcid.org/0009-0007-7537-5703
- @da5ch0
- in/da5ch0
- @dascho.bsky.social
- @dash@infosec.exchange
Stars
- All languages
- Adblock Filter List
- Assembly
- Batchfile
- Bicep
- Blade
- Brainfuck
- C
- C#
- C++
- CSS
- Common Lisp
- Dart
- Dockerfile
- Elixir
- FreeMarker
- Go
- HCL
- HTML
- Haskell
- JCL
- Java
- JavaScript
- Jupyter Notebook
- Lean
- Lua
- M4
- MDX
- Makefile
- Markdown
- Mermaid
- Nix
- Objective-C
- OpenSCAD
- PHP
- Perl
- PostScript
- PowerShell
- Python
- REXX
- Ruby
- Rust
- SCSS
- Shell
- Solidity
- Swift
- TSQL
- TeX
- TypeScript
- VHDL
- Verilog
- Visual Basic
- Visual Basic .NET
- Vue
- YARA
- Zig
A repo for jailbreaking various LLMs, mainly Claude
Repository hosting windows defender DOS tool
Set of tools to analyze Windows sandboxes for exposed attack surface.
Documentation for the Microsoft Graph REST API
A sysmon configuration designed for monitoring RMM solutions from the LOLRMM framework on the OS Microsoft Windows. 10/11
A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.
reverse engineering Gemini's SynthID detection
WhatsYourSign adds a menu item to Finder.app. Simply right-, or control-click on any file to display its cryptographic signing information!
ralphje / mscerts
Forked from certifi/python-certifiMakes the Microsoft Trusted Root Program's Certificate Trust Lists available in Python
Deobfuscate batch scripts obfuscated using string substitution and escape character techniques.
wmetcalf / W64oWoW64
Forked from georgenicolaou/W64oWoW64Library that allows you to run 64bit code on a Wow64 32bit process
Go Based Conversion From HAR/SAZ files to PCAP. Should be faster than Scapy based things of yesteryear.
Convert a Har to a PCAP.. Probably useful to like 4 people... Based on the fiddler2pcap
Proofpoint - Emerging Threats - Threat Research tools + publicly shared intel and documentation
Library for reducing tail latency in RAM reads
Repository hosting the bluehammer vulnerability
This is a archival release of the Doxbin codebase from October 2024.
All parts of Claude Code's system prompt, 24 builtin tool descriptions, sub agent prompts (Plan/Explore/Task), utility prompts (CLAUDE.md, compact, statusline, magic docs, WebFetch, Bash cmd, secur…
Claude Code is an agentic coding tool that lives in your terminal, understands your codebase, and helps you code faster through natural language commands. Rebuilt from leaked source.
Local platform that operationalizes Apple partial open source, binaries, and unified logs into a prioritized vulnerability research queue
Defanged malware stages from the telnyx 4.87.1/4.87.2 PyPI supply chain compromise — WAV steganography, credential stealer, Windows persistence
LiteLLM and telnyx compromise check scripts for macOS/Linux and Windows