scpctg's repositories
Academic_LLM_Sec_Papers
Academic Papers about LLM Application on Security
Achademio
AI assistant, based on the GPT-3.5 model by OpenAI, designed to enhance your proficiency in writing research papers. Allows you to adapt your content to academic standards, transform bullet points into eloquent text, or enhance the quality of your writing through error detection.
attack-surface-framework
Tool to discover external and internal network attack surface
attack_range
A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
Awesome-CobaltStrike
CobaltStrike的相关资源汇总 / List of Awesome CobaltStrike Resources
BlueHound
BlueHound - pinpoint the security issues that actually matter
cybercrime-papers
Recent academic papers related to cybercrime
DroneSecurity
DroneSecurity (NDSS 2023)
hackthebox-writeups
Writeups for HacktheBox 'boot2root' machines
HyperDbg
State-of-the-art native debugging tool
iLEAPP
iOS Logs, Events, And Plist Parser
Information_Security_Books
信息安全方面的书籍书籍
LEVEN
Source code and dataset for ACL2022 Findings Paper "LEVEN: A Large-Scale Chinese Legal Event Detection dataset"
libipt
libipt - an Intel(R) Processor Trace decoder library
logvision
分布式实时日志分析与入侵检测系统
luci-app-unblockneteasemusic
[OpenWrt] 解除网易云音乐播放限制
Mindmap
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them
MoneyPrinterTurbo
利用AI大模型,一键生成高清短视频 Generate short videos with one click using AI LLM.
PEASS-ng
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
private-gpt
Interact with your documents using the power of GPT, 100% privately, no data leaks
PromptKG
PromptKG Family: a Gallery of Prompt Learning & KG-related research works, toolkits, and paper-list.
searchall
强大的敏感信息搜索工具
Some-PoC-oR-ExP
各种漏洞poc、Exp的收集或编写
spiderfoot
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
sysmon-dfir
Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.
unicorn
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.
velociraptor
Digging Deeper....
Vulnerability-Wiki
基于 docsify 部署,目前漏洞数量 1000+