node-beagle-bootA node.js USB bootloader server for BeagleBone for booting it into mass storage mode
Stars: ✭ 17 (+21.43%)
idsaThis is the main repository of International Data Spaces Association on GitHub, where you can find general overview and required information on IDS Open Source Landscape.
Stars: ✭ 22 (+57.14%)
akblControl the lights of Alienware computers under GNU/Linux systems.
Stars: ✭ 99 (+607.14%)
DAO-MaxMSP-PdCollection of Max/MSP and Pd externals developed from the explanations in the book "Designing Audio Objects for Max/MSP and Pd" by Eric Lyon.
Stars: ✭ 35 (+150%)
pyc2bytecodeA Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Stars: ✭ 70 (+400%)
azaleamain board for the GreatFET project, also known as GreatFET One
Stars: ✭ 52 (+271.43%)
STM32 XPDSTM32 eXtensible Peripheral Drivers
Stars: ✭ 38 (+171.43%)
Zeek-Network-Security-MonitorA Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
Stars: ✭ 38 (+171.43%)
security-guidanceSecurity guidance from the MOJ Digital & Technology Cybersecurity team
Stars: ✭ 14 (+0%)
Behold3r👻Behold3r -- 收集指定网站的子域名,并可监控指定网站的子域名更新情况,发送变更报告至指定邮箱
Stars: ✭ 29 (+107.14%)
trjExecute any command in other's computer using a trojan horse coded and compiled in C. Just for educational purpose.
Stars: ✭ 21 (+50%)
dorothyDorothy is a tool to test security monitoring and detection for Okta environments
Stars: ✭ 85 (+507.14%)
ImpulsiveDLLHijackC# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.
Stars: ✭ 258 (+1742.86%)
AwesomeMoroccanHackersAn Awesome List of Moroccan Cyber Security Researchers, Pentesters, Bug Hunters.
Stars: ✭ 69 (+392.86%)
8821au-20210708Linux Driver for USB WiFi Adapters that are based on the RTL8811AU and RTL8821AU Chipsets - v5.12.5.2
Stars: ✭ 40 (+185.71%)
Cyber-SecurityThis repository is used to store answers when resolving ctf challanges, how i came to that answer and the line of thought used to reach it.
Stars: ✭ 42 (+200%)
FPGA-USB-DeviceFPGA-based USB-device controller to implement USB-CDC, USB-HID, etc.
Stars: ✭ 29 (+107.14%)
targetsA collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bulk operations.
Stars: ✭ 85 (+507.14%)
VISAInstrument基于NI-VISA/VISA32(Virtual Instrument Software Architecture)的仪器编程(C#),支持RS232、USB、GPIB及LAN通信接口的收发控制
Stars: ✭ 132 (+842.86%)
dizzy-legacyNetwork and USB protocol fuzzing toolkit.
Stars: ✭ 35 (+150%)
Kali-Linux-Tools-InterfaceGraphical Web interface developed to facilitate the use of security information tools.
Stars: ✭ 169 (+1107.14%)
nrf52-keyboardA BLE & 2.4G Keyboard Firmware using nrf52810/52811/52832
Stars: ✭ 101 (+621.43%)
CTF-Write-UP澳門網絡安全暨奪旗競賽協會(Macau Cyber Security and Capture The Flag Association)MOCSCTF/MOCTF
Stars: ✭ 27 (+92.86%)
YAFRAYAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Stars: ✭ 22 (+57.14%)
pyrfidhidPython library to control Chinese USB HID 125Khz RFID Reader/Writer
Stars: ✭ 104 (+642.86%)
ws-ldn-12ARM / STM32F7 DIY synth workshop
Stars: ✭ 62 (+342.86%)
usbmonList and monitor USB devices connected to Linux host. Also as Collectd plugin.
Stars: ✭ 28 (+100%)
tesla-usb-driveTesla DashCam & Music USB drive maker tool
Stars: ✭ 17 (+21.43%)
MiniNT5-Toolssmall Windows 10 (based on Windows PE) with customised tools
Stars: ✭ 34 (+142.86%)
SerialProxy🖱️⌨️ Arduino Input Proxying for PC (.NET Core)
Stars: ✭ 39 (+178.57%)
EvilUSBQuick utility to craft executables for pentesting and managing reverse shells
Stars: ✭ 33 (+135.71%)
getting-startedList of ideas for getting started with TimVideos projects
Stars: ✭ 50 (+257.14%)
domfindA Python DNS crawler to find identical domain names under different TLDs.
Stars: ✭ 22 (+57.14%)
usblockoutUSBLockout monitors your user session and triggers Grsecurity Deny New USB feature.
Stars: ✭ 52 (+271.43%)
phomberPhomber is infomation grathering tool that reverse search phone numbers and get their details, written in python3.
Stars: ✭ 59 (+321.43%)
RecoverPy🙈 Interactively find and recover deleted or 👉 overwritten 👈 files from your terminal
Stars: ✭ 189 (+1250%)
attckr⚔️MITRE ATT&CK Machinations in R
Stars: ✭ 22 (+57.14%)
wifi-deautherA fully automatic wifi deauther coded in Python
Stars: ✭ 25 (+78.57%)
usb stackTiny and portable USB device/host stack for embedded system with USB IP
Stars: ✭ 175 (+1150%)
CyberICS.github.ioNews and publication on cybersecurity in industry
Stars: ✭ 29 (+107.14%)
CTF-WriteupsRepository of my CTF writeups
Stars: ✭ 25 (+78.57%)
PUBG USB这是 某宝 卖大几千的压枪源码,不做任何数据读取以及侵入,这里采用外数据采集(IMG), 至今可以使用,无视任何更新(新武器,以及新武器的压枪规则,需要自己调试,在data_config下);
Stars: ✭ 44 (+214.29%)
WebspoiltThis script will you help to find the information about the website and to help in penetrating testing
Stars: ✭ 34 (+142.86%)
connectorsOpenCTI connectors
Stars: ✭ 135 (+864.29%)
aeacus🔐 Vulnerability remediation scoring system
Stars: ✭ 52 (+271.43%)
android-usb-scriptAn Android app that allows you to script USB gadgets (work-in-progress).
Stars: ✭ 15 (+7.14%)
rstthreatsAggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked using our intelligence platform for you. Threat Intelligence, Threat feed, Open source feed.
Stars: ✭ 17 (+21.43%)
cyberopsCisco Press CCNA Cyber Ops Books and Video Courses supplemental information and additional study materials.
Stars: ✭ 18 (+28.57%)
mkosxinstallusbLinux shell script that creates USB flash drive booting OS X installer
Stars: ✭ 34 (+142.86%)
usbMinimalist portable USB device stack for SAMD21, LPC1800, LPC4300, Xmega
Stars: ✭ 90 (+542.86%)
ReversePowerShellFunctions that can be used to gain Reverse Shells with PowerShell
Stars: ✭ 48 (+242.86%)
ccid-utilsA USB smartcard driver including GSM SIM and EMV credit/debit card development platforms
Stars: ✭ 37 (+164.29%)
WiFi-ProjectPre-connection attacks, gaining access & post-connection attacks on WEP, WPA & WPA2. 🛰✔️
Stars: ✭ 22 (+57.14%)
SherlockThis script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
Stars: ✭ 36 (+157.14%)