+
Skip to content
View p-g-krish's full-sized avatar
🎯
Focusing
🎯
Focusing
  • crypton

Block or report p-g-krish

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

Showing results

A tool to transform Chromium browsers into a C2 Implant

JavaScript 487 64 Updated Sep 3, 2025

Test your prompts, agents, and RAGs. AI Red teaming, pentesting, and vulnerability scanning for LLMs. Compare performance of GPT, Claude, Gemini, Llama, and more. Simple declarative configs with co…

TypeScript 8,702 731 Updated Oct 14, 2025

A powerful tool for automated LLM fuzzing. It is designed to help developers and security researchers identify and mitigate potential jailbreaks in their LLM APIs.

Jupyter Notebook 801 94 Updated Jul 13, 2025

Linux kernel exploitation experiments

C 359 48 Updated Sep 30, 2025
C++ 153 14 Updated Apr 23, 2025

BSides Prishtina 2024 Malware Development and Persistence workshop

C 99 24 Updated May 29, 2025

A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Payloads can be retrieved directly from the file on disk or from …

C++ 192 39 Updated Oct 1, 2025

Experimental tools to backdoor large language models by re-writing their system prompts at a raw parameter level. This allows you to potentially execute offline remote code execution without runnin…

Python 186 27 Updated Oct 5, 2025

A python based Bot Net Framework

Python 42 5 Updated Aug 14, 2025

Cybersecurity oriented awesome list

2,596 273 Updated Oct 14, 2025

A curated list of awesome reversing resources

4,358 583 Updated Aug 19, 2023

Collection of codes focused on Linux rootkits

C 176 44 Updated Sep 20, 2025

Exploring possibilities of ESP32 platform to attack on nearby Wi-Fi networks.

C 2,598 406 Updated Feb 18, 2024

Pure Malware Development Resource Collections

384 41 Updated Dec 29, 2024
Python 315 37 Updated Dec 19, 2024

A handheld Linux terminal using Raspberry pi Zero 2W as Core with 4" 720X720 TFT display

2,443 142 Updated Feb 17, 2025

Perfect DLL Proxying using forwards with absolute paths.

Python 297 31 Updated Oct 9, 2024

God Mode Detection Rules

YARA 134 20 Updated Aug 8, 2024

Mycroft interface for Raspberry Pi environment

Shell 814 193 Updated Dec 14, 2022

Fast IOC and YARA Scanner

84 7 Updated Mar 23, 2020

A Python library to utilize AWS API Gateway's large IP pool as a proxy to generate pseudo-infinite IPs for web scraping and brute forcing.

Python 1,613 170 Updated Apr 24, 2025

Network Analysis Tool

C# 3,286 357 Updated Apr 10, 2023

Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attributes. This all includes tools to work with anything in gener…

HTML 923 96 Updated Nov 27, 2023

A Retro-style Computer with a Modern Core

827 12 Updated Sep 14, 2022

Basics on commands/tools/info on how to assess the security of mobile applications

1,615 252 Updated Dec 19, 2023

All Algorithms implemented in Python

Python 210,755 48,675 Updated Oct 14, 2025

Browser In The Browser (BITB) Templates

JavaScript 2,851 482 Updated Jan 26, 2024

Bootkit sample for firmware attack

259 38 Updated Dec 1, 2024

A curated list of deep learning resources for computer vision

11,067 2,784 Updated Aug 15, 2023

A curated list of awesome Machine Learning frameworks, libraries and software.

Python 70,159 15,124 Updated Oct 6, 2025
Next
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载