1. Threat IntelArchive of publicly available threat INTel reports (mostly APT Reports but not limited to).
2. IrisWinDbg extension to display Windows process mitigations
3. Www.rootkit.comwww.rootkit.com users section mirror, sql database dump, and a few other files/rootkits.
4. KcshellSimple Python3 based interactive assembly/disassembly shell for various architectures powered by Keystone/Capstone.
6. Cve 2018 19320Exploiting ring0 memcpy-like functionality to disable Driver Signing Enforcement (DSE)
7. PoweropsPowerShell Runspace Portable Post Exploitation Tool aimed at making Penetration Testing with PowerShell "easier"
8. ZinesMirror of my favourite hacking Zines for the lulz, nostalgy, and reference
9. Hunter(l)user hunter using WinAPI calls only