Microservices Book"Microservices Architecture for eCommerce" is an Open Source Book on Microservices and Headless eCommerce. Feel invited to contribute! Read online or download a PDF
Stars: ✭ 337 (-10.85%)
MalwareDatabaseMalware samples for analysis, researchers, anti-virus and system protection testing.(1300+ Malware-samples!)
Stars: ✭ 21 (-94.44%)
MispMISP (core software) - Open Source Threat Intelligence and Sharing Platform
Stars: ✭ 3,485 (+821.96%)
MalwareHashDBMalware hashes for open source projects.
Stars: ✭ 31 (-91.8%)
StoqAn open source framework for enterprise level automated analysis.
Stars: ✭ 352 (-6.88%)
multiphysicsInteractive Multiphysics Simulation for Everyone
Stars: ✭ 41 (-89.15%)
Ctf Writeups PublicWriteups for infosec Capture the Flag events by team Galaxians
Stars: ✭ 331 (-12.43%)
Threat-Intel-Slack-BotInteractive Threat Intelligence Bot that leverages serverless framework, AWS/GCP, and Slack
Stars: ✭ 26 (-93.12%)
ZelosA comprehensive binary emulation and instrumentation platform.
Stars: ✭ 298 (-21.16%)
flare-emuNo description or website provided.
Stars: ✭ 561 (+48.41%)
SimplifyAndroid virtual machine and deobfuscator
Stars: ✭ 3,865 (+922.49%)
visual-curriculuma better way to visualize your university credits and disciplines
Stars: ✭ 27 (-92.86%)
H2csmugglerHTTP Request Smuggling over HTTP/2 Cleartext (h2c)
Stars: ✭ 292 (-22.75%)
RHEOS.jlRHEOS - Open Source Rheology data analysis software
Stars: ✭ 23 (-93.92%)
BxssbXSS is a utility which can be used by bug hunters and organizations to identify Blind Cross-Site Scripting.
Stars: ✭ 331 (-12.43%)
manager-automationAutomating management tasks to help managers focus on more strategic wins.
Stars: ✭ 31 (-91.8%)
IdentywafBlind WAF identification tool
Stars: ✭ 291 (-23.02%)
soda-ios-sdkNo description or website provided.
Stars: ✭ 43 (-88.62%)
Malware JailSandbox for semi-automatic Javascript malware analysis, deobfuscation and payload extraction. Written for Node.js
Stars: ✭ 349 (-7.67%)
myCUinfo-APIAn API for the myCUinfo system at CU Boulder
Stars: ✭ 21 (-94.44%)
jitmJITM is an automated tool to bypass the JIT Hooking protection on a .NET sample.
Stars: ✭ 27 (-92.86%)
Icewater16,432 Free Yara rules created by
Stars: ✭ 324 (-14.29%)
mazMalware Analysis Zoo
Stars: ✭ 25 (-93.39%)
Traitor⬆️ ☠️ Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, polkit, docker socket
Stars: ✭ 3,473 (+818.78%)
SecuritymanageframworkSecurity Manage Framwork is a security management platform for enterprise intranet, which includes asset management, vulnerability management, account management, knowledge base management, security scanning automation function modules, and can be used for internal security management. This platform is designed to help Party A with fewer security personnel, complicated business lines, difficult periodic inspection and low automation to better achieve internal safety management.
Stars: ✭ 378 (+0%)
rair-coreRAIR: RAdare In Rust
Stars: ✭ 63 (-83.33%)
DrltraceDrltrace is a library calls tracer for Windows and Linux applications.
Stars: ✭ 282 (-25.4%)
aquatoneA Tool for Domain Flyovers
Stars: ✭ 43 (-88.62%)
Scikit RfRF and Microwave Engineering Scikit
Stars: ✭ 321 (-15.08%)
sucheduleA friendly schedule building interface for Sabancı University students.
Stars: ✭ 38 (-89.95%)
Malware ResearchCode written as part of our various malware investigations
Stars: ✭ 281 (-25.66%)
dorothyDorothy is a tool to test security monitoring and detection for Okta environments
Stars: ✭ 85 (-77.51%)
PhishapiComprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!
Stars: ✭ 272 (-28.04%)
Cyber-SecurityThis repository is used to store answers when resolving ctf challanges, how i came to that answer and the line of thought used to reach it.
Stars: ✭ 42 (-88.89%)
linkedinscraperLinkedinScraper is an another information gathering tool written in python. You can scrape employees of companies on Linkedin.com and then create these employee names, titles and emails.
Stars: ✭ 22 (-94.18%)
GetaltnameExtract subdomains from SSL certificates in HTTPS sites.
Stars: ✭ 320 (-15.34%)
maldetectDebian packaging of Linux Malware Detect (https://github.com/rfxn/linux-malware-detect)
Stars: ✭ 48 (-87.3%)
Application Security Engineer Interview QuestionsSome of the questions which i was asked when i was giving interviews for Application/Product Security roles. I am sure this is not an exhaustive list but i felt these questions were important to be asked and some were challenging to answer
Stars: ✭ 267 (-29.37%)
GefGEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging features for exploit developers & reverse engineers ☢
Stars: ✭ 4,197 (+1010.32%)
company-engineering-blogsA collection of companies' engineering blogs, to help you improve your software engineering skill and learn how their software work. 📖🛠
Stars: ✭ 108 (-71.43%)
GonnacryA Linux Ransomware
Stars: ✭ 341 (-9.79%)
Xeokit SdkOpen source JavaScript SDK for viewing high-detail, full-precision 3D BIM and AEC models in the Web browser.
Stars: ✭ 316 (-16.4%)
MegplusAutomated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED]
Stars: ✭ 268 (-29.1%)
BootsyDesigned to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (port and service spoofing) for network deception, this tool allows you to detect an attacker on the network quickly by weeding out general noisy alerts with only those that matter.
Stars: ✭ 33 (-91.27%)
ctf-writeupsWriteups of CTF challenges
Stars: ✭ 19 (-94.97%)
CloudbruteAwesome cloud enumerator
Stars: ✭ 268 (-29.1%)
rtfsigA tool to help malware analysts signature unique parts of RTF documents
Stars: ✭ 28 (-92.59%)
coranaCorana is a Dynamic Symbolic Execution Engine for ARM Cortex-M aiming to incrementally reconstruct the precise Control Flow Graph (CFG) of IoT malware under the presence of obfuscation techniques e.g., indirect jumps and opaque predicates
Stars: ✭ 19 (-94.97%)
ConfusedTool to check for dependency confusion vulnerabilities in multiple package management systems
Stars: ✭ 314 (-16.93%)
OptimeshMesh optimization, mesh smoothing.
Stars: ✭ 261 (-30.95%)
championscurriculumA training curriculum for teaching information security "champions" within small organisations and helping them conduct a basic assessment. (Work in progress)
Stars: ✭ 18 (-95.24%)
targetsA collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bulk operations.
Stars: ✭ 85 (-77.51%)
My TalksList of my talks and workshops: security engineering, applied cryptography, secure software development
Stars: ✭ 261 (-30.95%)
python-icap-yaraAn ICAP Server with yara scanner for URL and content.
Stars: ✭ 50 (-86.77%)
NinjaCalcAn embedded engineering calculator toolbox for doing calculations in a breeze.
Stars: ✭ 14 (-96.3%)