NailgunNailgun attack on ARM devices.
Stars: ✭ 114 (-30.49%)
InnersourcepatternsProven approaches that can guide you through applying open source best practices within your organization
Stars: ✭ 473 (+188.41%)
Hacker ezinesA collection of electronic hacker magazines carefully curated over the years from multiple sources
Stars: ✭ 72 (-56.1%)
Zip Slip VulnerabilityZip Slip Vulnerability (Arbitrary file write through archive extraction)
Stars: ✭ 433 (+164.02%)
Awesome VulnerableA curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.
Stars: ✭ 133 (-18.9%)
Cb MultiosDARPA Challenges Sets for Linux, Windows, and macOS
Stars: ✭ 415 (+153.05%)
ResourcesA Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-62.2%)
Advisory DbSecurity advisory database for Rust crates published through crates.io
Stars: ✭ 396 (+141.46%)
Awesome SolidityA curated list of awesome Solidity resources
Stars: ✭ 111 (-32.32%)
OpencveCVE Alerting Platform
Stars: ✭ 384 (+134.15%)
JaelesThe Swiss Army knife for automated Web Application Testing
Stars: ✭ 1,073 (+554.27%)
GrypeA vulnerability scanner for container images and filesystems
Stars: ✭ 362 (+120.73%)
VulncostFind security vulnerabilities in open source npm packages while you code
Stars: ✭ 146 (-10.98%)
WssatWEB SERVICE SECURITY ASSESSMENT TOOL
Stars: ✭ 360 (+119.51%)
ReconftwreconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Stars: ✭ 974 (+493.9%)
VulnerabilitydbSnyk's public vulnerability database
Stars: ✭ 345 (+110.37%)
Oscp Prepmy oscp prep collection
Stars: ✭ 105 (-35.98%)
Title CssA CSS organization methodology
Stars: ✭ 37 (-77.44%)
HorusecHorusec is an open source tool that improves identification of vulnerabilities in your project with just one command.
Stars: ✭ 311 (+89.63%)
SnykSnyk CLI scans and monitors your projects for security vulnerabilities.
Stars: ✭ 3,643 (+2121.34%)
S2eS2E: A platform for multi-path program analysis with selective symbolic execution.
Stars: ✭ 102 (-37.8%)
GuideAiming to be a fully transparent company. All information about source{d} and what it's like to work here.
Stars: ✭ 268 (+63.41%)
DesigncourseCourse materials for "Research Design in Political Science"
Stars: ✭ 12 (-92.68%)
Kube HunterHunt for security weaknesses in Kubernetes clusters
Stars: ✭ 3,399 (+1972.56%)
VulnixVulnerability (CVE) scanner for Nix/NixOS.
Stars: ✭ 161 (-1.83%)
WriteupsThis repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Stars: ✭ 61 (-62.8%)
Hacker Roadmap📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+4626.83%)
ConPanConPan: Analyze your Docker container in peace
Stars: ✭ 45 (-72.56%)
Cvebase.comcvebase is a community-driven vulnerability data platform to discover the world's top security researchers and their latest disclosed vulnerabilities & PoCs
Stars: ✭ 88 (-46.34%)
qctf-school-2018QCTF School 2018. Developed with ♥ by Hackerdom team
Stars: ✭ 13 (-92.07%)
Rapidscan🆕 The Multi-Tool Web Vulnerability Scanner.
Stars: ✭ 775 (+372.56%)
vulnerabilitiesList of every possible vulnerabilities in computer security.
Stars: ✭ 14 (-91.46%)
Cve Searchcve-search - a tool to perform local searches for known vulnerabilities
Stars: ✭ 1,765 (+976.22%)
penetration testing🎩 [penetration testing Book], Kali Magic, Cryptography, Hash Crack, Botnet, Rootkit, Malware, Spyware, Python, Go, C|EH.
Stars: ✭ 57 (-65.24%)
BinexpLinux Binary Exploitation
Stars: ✭ 742 (+352.44%)
documentation🍰 Architectural design methodology for Frontend projects
Stars: ✭ 359 (+118.9%)
adageData and code related to the paper "ADAGE-Based Integration of Publicly Available Pseudomonas aeruginosa..." Jie Tan, et al · mSystems · 2016
Stars: ✭ 61 (-62.8%)
OsvvmOSVVM Utility Library: AlertLogPkg, CoveragePkg, RandomPkg, ScoreboardGenericPkg, MemoryPkg, TbUtilPkg, TranscriptPkg, ...
Stars: ✭ 140 (-14.63%)
master-thesisВыпускная квалификационная работа (ВКР) магистра в LaTeX, оформленная в соответствии с нормоконтролем Севастопольского государственного университета в 2017 г.
Stars: ✭ 84 (-48.78%)
RailsgoatA vulnerable version of Rails that follows the OWASP Top 10
Stars: ✭ 699 (+326.22%)
iSecureOSAn iOS Security assessment app for jailbroken iOS Devices.
Stars: ✭ 111 (-32.32%)
ThoronThoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (-46.95%)
iskanKubernetes Native, Runtime Container Image Scanning
Stars: ✭ 35 (-78.66%)
Exploit WriteupsA collection where my current and future writeups for exploits/CTF will go
Stars: ✭ 676 (+312.2%)
ructfe-2019RuCTFE 2019. Developed with ♥ by HackerDom team
Stars: ✭ 24 (-85.37%)
PakuriPenetration test Achieve Knowledge Unite Rapid Interface
Stars: ✭ 125 (-23.78%)
Kernelpopkernel privilege escalation enumeration and exploitation framework
Stars: ✭ 628 (+282.93%)
Laravel Security CheckerAdded Laravel functionality to Enlightn Security Checker. Adds a command to check for, and optionally emails you, vulnerabilities when they affect you.
Stars: ✭ 163 (-0.61%)
0days In The WildRepository for information about 0-days exploited in-the-wild.
Stars: ✭ 149 (-9.15%)
VwgenVulnerable Web applications Generator
Stars: ✭ 75 (-54.27%)
PayloadsallthethingsA list of useful payloads and bypass for Web Application Security and Pentest/CTF
Stars: ✭ 32,909 (+19966.46%)