Argyros's starred repositories
APT_Digital_Weapon
Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.
CVE-2024-36401
Remote Code Execution (RCE) Vulnerability In Evaluating Property Name Expressions with multies ways to exploit
CodeqlLearn
记录学习codeql的过程
learning-codeql
CodeQL Java 全网最全的中文学习资料
OffensiveRust
Rust Weaponization for Red Team Engagements.
Trojan-Rev-Eng
They removed all the endpoints :<
WeblogicScan.go
WeblogicScan一键检测
HackSysExtremeVulnerableDriver
HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux
tencentcloud-cli
Tencent Cloud API 3.0 Command Line Interface
my_C_study
this is a description
hm3u8dl_cli
python m3u8下载,支持windows,linux,mac;支持aes-128、widevine等
Londly01-safety-tool
自动化进行资产探测及漏洞扫描|红蓝对抗 | 快速打点 | 适用黑客进行赏金活动、SRC活动、大规模攻击使用 | 护网
JavaSecInterview
打造最强的Java安全研究与安全开发面试题库,帮助师傅们找到满意的工作
windows-syscalls
Windows System Call Tables (NT/2000/XP/2003/Vista/7/8/10/11)
crack-ezchatter-token
Crack php rand() state
transformers
🤗 Transformers: State-of-the-art Machine Learning for Pytorch, TensorFlow, and JAX.
BLACKHAT_Asia2023
Black Hat Asia 2023 PDF Public
SUDO_KILLER
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.
trojan-source
Trojan Source: Invisible Vulnerabilities
CTF-Repositories
国内外各大CTF赛题