SIGMA-ResourcesResources To Learn And Understand SIGMA Rules
Stars: ✭ 61 (+1120%)
ObjRecPoseEstObject Detection and 3D Pose Estimation
Stars: ✭ 71 (+1320%)
Rustscan🤖 The Modern Port Scanner 🤖
Stars: ✭ 5,218 (+104260%)
Comet.BoxCollection of Object Detection and Segmentation Pipelines🛸🚀
Stars: ✭ 24 (+380%)
WhalerProgram to reverse Docker images into Dockerfiles
Stars: ✭ 670 (+13300%)
FCOS.Pytorchfcos implementation in pytorch1.x
Stars: ✭ 84 (+1580%)
W5Security Orchestration, Automation and Response (SOAR) Platform. 安全编排与自动化响应平台,无需编写代码的安全自动化,使用 SOAR 可以让团队工作更加高效
Stars: ✭ 367 (+7240%)
SprayingtoolkitScripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient
Stars: ✭ 802 (+15940%)
MonoRUn[CVPR'21] MonoRUn: Monocular 3D Object Detection by Reconstruction and Uncertainty Propagation
Stars: ✭ 85 (+1600%)
Jwt CrackerSimple HS256 JWT token brute force cracker
Stars: ✭ 365 (+7200%)
d00rSimple directory brute-force tool written with python.
Stars: ✭ 35 (+600%)
Npq🎖safely* install packages with npm or yarn by auditing them as part of your install process
Stars: ✭ 513 (+10160%)
mmrazorOpenMMLab Model Compression Toolbox and Benchmark.
Stars: ✭ 644 (+12780%)
K8toolsK8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)
Stars: ✭ 4,173 (+83360%)
Caffe2-yolo-v3A Caffe2 implementation of the YOLO v3 object detection algorithm
Stars: ✭ 32 (+540%)
SwiftnessxA cross-platform note-taking & target-tracking app for penetration testers.
Stars: ✭ 673 (+13360%)
clap-detectionSimple clap rhythm detection on Raspberry Pi using Csound and Python. Toy example.
Stars: ✭ 29 (+480%)
UnsignRemove code signatures from OSX Mach-O binaries (note: unsigned binaries cannot currently be re-codesign'ed. Patches welcome!)
Stars: ✭ 362 (+7140%)
AutomataAutomatic detection engineering technical state compliance
Stars: ✭ 33 (+560%)
Ssh AuditorThe best way to scan for weak ssh passwords on your network
Stars: ✭ 516 (+10220%)
LSCDetectionData Sets and Models for Evaluation of Lexical Semantic Change Detection
Stars: ✭ 17 (+240%)
T CnnImageNet 2015 Object Detection from Video (VID)
Stars: ✭ 360 (+7100%)
eewidsEasily Expandable Wireless Intrusion Detection System
Stars: ✭ 25 (+400%)
urlbruteDirectory/Subdomain scanner developed in GoLang.
Stars: ✭ 37 (+640%)
TaipanWeb application vulnerability scanner
Stars: ✭ 359 (+7080%)
Brute-Force-Password-CrackerA brute force attacker with packages for development in Python 3, Kotlin, C#, Go, Vala, and C++.
Stars: ✭ 29 (+480%)
Security ToolsCollection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (+10080%)
image-ndd-lshNear-duplicate image detection using Locality Sensitive Hashing
Stars: ✭ 42 (+740%)
Red BaronAutomate creating resilient, disposable, secure and agile infrastructure for Red Teams.
Stars: ✭ 662 (+13140%)
etiketaiEtiketai is an online tool designed to label images, useful for training AI models
Stars: ✭ 63 (+1160%)
KatanaA Python Tool For google Hacking
Stars: ✭ 355 (+7000%)
ScanrDetect x86 shellcode in files and traffic.
Stars: ✭ 16 (+220%)
FoveaboxFoveaBox: Beyond Anchor-based Object Detector
Stars: ✭ 353 (+6960%)
detect-gpuClassifies GPUs based on their 3D rendering benchmark score allowing the developer to provide sensible default settings for graphically intensive applications.
Stars: ✭ 749 (+14880%)
Rapidscan🆕 The Multi-Tool Web Vulnerability Scanner.
Stars: ✭ 775 (+15400%)
SstSingle Shot Tracker
Stars: ✭ 350 (+6900%)
instabruteInstagram Brute Forcer
Stars: ✭ 135 (+2600%)
Stowaway👻Stowaway -- Multi-hop Proxy Tool for pentesters
Stars: ✭ 500 (+9900%)
Log4j-CVE-DetectDetections for CVE-2021-44228 inside of nested binaries
Stars: ✭ 33 (+560%)
SuperSecure, Unified, Powerful and Extensible Rust Android Analyzer
Stars: ✭ 340 (+6700%)
RC-exploiterNOT SUPORTED ANYMORE -- try resource_files repository (mosquito)
Stars: ✭ 50 (+900%)
ETWProcessMon2ETWProcessMon2 is for Monitoring Process/Thread/Memory/Imageloads/TCPIP via ETW + Detection for Remote-Thread-Injection & Payload Detection by VirtualMemAlloc Events (in-memory) etc.
Stars: ✭ 55 (+1000%)
MicrosoftWontFixListA list of vulnerabilities or design flaws that Microsoft does not intend to fix. Since the number is growing, I decided to make a list. This list covers only vulnerabilities that came up in July 2021 (and SpoolSample ;-))
Stars: ✭ 854 (+16980%)
OpenVAS-DockerA Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)
Stars: ✭ 16 (+220%)
Syzkallersyzkaller is an unsupervised coverage-guided kernel fuzzer
Stars: ✭ 3,841 (+76720%)
ThugPython low-interaction honeyclient
Stars: ✭ 818 (+16260%)
PompemFind exploit tool
Stars: ✭ 786 (+15620%)
InterlaceEasily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.
Stars: ✭ 760 (+15100%)