-
AratanCoders.Blockchain
- Spain
-
00:58
(UTC -12:00) - https://learn.microsoft.com/es-es/users/victorarbiolmartinez/transcript/dg8okh959eqqw4q
- https://orcid.org/0000-0002-7790-0678
- https://medium.com/saturdays-ai/introduction-welcome-to-the-fascinating-world-of-artificial-intelligence-development-3a523ac5ab6f
- https://victorarbiol.medium.com/
- https://huggingface.co/Aratan/
- https://medium.com/@aratan
Lists (3)
Sort Name ascending (A-Z)
Starred repositories
The awesome collection of OpenClaw skills. 5,400+ skills filtered and categorized from the official OpenClaw Skills Registry.🦞
AI & Quantum Computing Mastery - From Zero to Expert Bootcamp, Published by Packt Publishing
An open source, self-hosted implementation of the Tailscale control server
Files and resources for the cyberdeck RPI DEV (Raspberry Pi Development Platform). This includes .stl files, kicad files, BOM, instructions, and sample code.
Six Degrees of Domain Admin
Ladon大型内网渗透扫描器,PowerShell、Cobalt Strike插件、内存加载、无文件扫描。含端口扫描、服务识别、网络资产探测、密码审计、高危漏洞检测、漏洞利用、密码读取以及一键GetShell,支持批量A段/B段/C段以及跨网段扫描,支持URL、主机、域名列表扫描等。网络资产探测32种协议(ICMP\NBT\DNS\MAC\SMB\WMI\SSH\HTTP\HTTPS\Exc…
Cobalt Strike is a post-exploitation framework designed to be extended and customized by the user community. Several excellent tools and scripts have been written and published, but they can be cha…
AI / LLM Red Team Field Manual & Consultant’s Handbook
A collection of Cobalt Strike Aggressor scripts.
Este repositorio contiene una colección de scripts diseñados para ejecutarse en endpoints Windows a través de ESET Protect.
The official repository for ERNIE 4.5 and ERNIEKit – its industrial-grade development toolkit based on PaddlePaddle.
🌐 The open-source Agentic browser; alternative to ChatGPT Atlas, Perplexity Comet, Dia.
A small set of tools to convert packets from capture files to hash files for use with Hashcat or John the Ripper.
MiniMax-M2, a model built for Max coding & agentic workflows.
Privilege Escalation Enumeration Script for Windows
This comprehensive guide aims to provide a standardized approach to ethical hacking and promote best practices within our red team. By following this guide, we can ensure a uniform and consistent m…
Handy Linux commands for post-exploitation and privilege escalation
Tools and Techniques for Red Team / Penetration Testing
User-friendly AI Interface (Supports Ollama, OpenAI API, ...)
A guide to LLM hacking: fundamentals, prompt injection, offense, and defense
🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)
Exploit Database binary exploits located in the /sploits directory
Distribute and run LLMs with a single file.
A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM.



