vulnscanA static binary vulnerability scanner
Stars: ✭ 47 (-88.04%)
Macapps分享个人收集的Mac的App,持续更新中...
Stars: ✭ 311 (-20.87%)
XSS-CheatsheetXSS Cheatsheet - A collection of XSS attack vectors https://xss.devwerks.net/
Stars: ✭ 26 (-93.38%)
NeurokitNeuroKit2: The Python Toolbox for Neurophysiological Signal Processing
Stars: ✭ 264 (-32.82%)
FidlA sane API for IDA Pro's decompiler. Useful for malware RE and vulnerability research
Stars: ✭ 319 (-18.83%)
SQL-XSSA few SQL and XSS attack tools
Stars: ✭ 29 (-92.62%)
RspirvRust implementation of SPIR-V module processing functionalities
Stars: ✭ 332 (-15.52%)
GowaptGo Web Application Penetration Test
Stars: ✭ 300 (-23.66%)
xbpchxarray interface for bpch files
Stars: ✭ 17 (-95.67%)
specificationSoftware Bill of Material (SBOM) standard designed for use in application security contexts and supply chain component analysis
Stars: ✭ 129 (-67.18%)
XcframeworksDemonstration of creating and integrating xcframeworks and their co-op with static libraries and Swift packages
Stars: ✭ 272 (-30.79%)
NvcheckerNew version checker for software releases
Stars: ✭ 256 (-34.86%)
Blog个人知识集合整理
Stars: ✭ 34 (-91.35%)
ApiVulners Python API wrapper
Stars: ✭ 313 (-20.36%)
klustair(Deprecated) Submit all images in your Kubernetes cluster to Anchore for a vulnerability check and check your configuration with kubeaudit
Stars: ✭ 15 (-96.18%)
gtfoSearch for Unix binaries that can be exploited to bypass system security restrictions.
Stars: ✭ 88 (-77.61%)
JaadasJoint Advanced Defect assEsment for android applications
Stars: ✭ 304 (-22.65%)
xsymlinkXbox One Symbolic Link Exploit: Access restricted/encrypted volumes using the Xbox File Explorer.
Stars: ✭ 18 (-95.42%)
VbscanOWASP VBScan is a Black Box vBulletin Vulnerability Scanner
Stars: ✭ 295 (-24.94%)
hugo-wrapperThe universal way to include Hugo binary to your project.
Stars: ✭ 27 (-93.13%)
ezinjectModular binary injection framework, successor of libhooker
Stars: ✭ 47 (-88.04%)
FaradayFaraday introduces a new concept - IPE (Integrated Penetration-Test Environment) a multiuser Penetration test IDE. Designed for distributing, indexing, and analyzing the data generated during a security audit.
Stars: ✭ 3,198 (+713.74%)
StructuraeData structures for high-performance JavaScript applications.
Stars: ✭ 323 (-17.81%)
Application Security Engineer Interview QuestionsSome of the questions which i was asked when i was giving interviews for Application/Product Security roles. I am sure this is not an exhaustive list but i felt these questions were important to be asked and some were challenging to answer
Stars: ✭ 267 (-32.06%)
BinarycodableSwift Codable-like interfaces for binary representations.
Stars: ✭ 359 (-8.65%)
B2r2B2R2 is a collection of useful algorithms, functions, and tools for binary analysis.
Stars: ✭ 262 (-33.33%)
E9patchA powerful static binary rewriting tool
Stars: ✭ 317 (-19.34%)
Droid Hunter(deprecated) Android application vulnerability analysis and Android pentest tool
Stars: ✭ 256 (-34.86%)
CerasUniversal binary serializer for a wide variety of scenarios https://discord.gg/FGaCX4c
Stars: ✭ 374 (-4.83%)
PeaclockA responsive and customizable clock, timer, and stopwatch for the terminal.
Stars: ✭ 314 (-20.1%)
redesocialProjeto do Curso de Sistemas de Informação sobre Rede Social
Stars: ✭ 38 (-90.33%)
RbndrSimple DNS Rebinding Service
Stars: ✭ 343 (-12.72%)
plenopticamLight-field imaging application for plenoptic cameras
Stars: ✭ 111 (-71.76%)
A Red Teamer DiariesRedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (-2.8%)
mondoo🕵️♀️ Mondoo Cloud-Native Security & Vulnerability Risk Management
Stars: ✭ 60 (-84.73%)
CedBose Firmware / Software - ced (AE2, Frames, Noise Cancelling Headphones 700, OE, On-Ear Wireless, QuietComfort 35 II / QC35 / QC35II, QuietControl 30 / QC30, SoundLink Color II, Micro, SL Mini Special Edition, Mini II, Revolve, SoundSport Free, Pulse, Wireless, SoundWear Companion, connect)
Stars: ✭ 313 (-20.36%)
waithaxAn implementation of the waithax / slowhax 3DS Kernel11 exploit.
Stars: ✭ 64 (-83.72%)
GasperYour Cloud in a Binary
Stars: ✭ 331 (-15.78%)
NSE-scriptsNSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473
Stars: ✭ 105 (-73.28%)
FspicklerA fast multi-format message serializer for .NET
Stars: ✭ 299 (-23.92%)
ferrydFast, safe and reliable transit for the delivery of software updates to users.
Stars: ✭ 43 (-89.06%)
GrypeA vulnerability scanner for container images and filesystems
Stars: ✭ 362 (-7.89%)
ExploitsReal world and CTFs exploiting web/binary POCs.
Stars: ✭ 69 (-82.44%)
ZelosA comprehensive binary emulation and instrumentation platform.
Stars: ✭ 298 (-24.17%)
lightify-binary-protocolDocumentation of the OSRAM Lightify Binary Protocol for communication between Lightify Gateway and applications
Stars: ✭ 26 (-93.38%)
DdisasmA fast and accurate disassembler
Stars: ✭ 325 (-17.3%)
caribouliteCaribouLite turns any 40-pin Raspberry-Pi into a Tx/Rx 6GHz SDR
Stars: ✭ 785 (+99.75%)
Pwn2exploitall mine papers, pwn & exploit
Stars: ✭ 289 (-26.46%)
ExecaProcess execution for humans
Stars: ✭ 4,318 (+998.73%)
ReplThe Learning Hub for UoL's Online CS Students
Stars: ✭ 367 (-6.62%)
Javadeserh2hcSample codes written for the Hackers to Hackers Conference magazine 2017 (H2HC).
Stars: ✭ 361 (-8.14%)
Iblessingiblessing is an iOS security exploiting toolkit, it mainly includes application information collection, static analysis and dynamic analysis. It can be used for reverse engineering, binary analysis and vulnerability mining.
Stars: ✭ 326 (-17.05%)