pyc2bytecodeA Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Stars: ✭ 70 (-60.23%)
WinappdbgWinAppDbg Debugger
Stars: ✭ 338 (+92.05%)
PentestingMisc. Public Reports of Penetration Testing and Security Audits.
Stars: ✭ 24 (-86.36%)
FameFAME Automates Malware Evaluation
Stars: ✭ 663 (+276.7%)
AntidebuggingA collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Stars: ✭ 161 (-8.52%)
Cs7038 Malware AnalysisCourse Repository for University of Cincinnati Malware Analysis Class (CS[567]038)
Stars: ✭ 378 (+114.77%)
Anti-DebuggingA collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Stars: ✭ 297 (+68.75%)
fame modulesCommunity modules for FAME
Stars: ✭ 55 (-68.75%)
MaliceVirusTotal Wanna Be - Now with 100% more Hipster
Stars: ✭ 1,253 (+611.93%)
Malware FeedBringing you the best of the worst files on the Internet.
Stars: ✭ 69 (-60.8%)
MalcomMalcom - Malware Communications Analyzer
Stars: ✭ 988 (+461.36%)
Infosec referenceAn Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Stars: ✭ 4,162 (+2264.77%)
NIST-to-TechAn open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (-65.34%)
phisherpriceAll In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.
Stars: ✭ 38 (-78.41%)
SuperLibraryInformation Security Library
Stars: ✭ 60 (-65.91%)
APAC-MeetupsA community contributed consolidated list of InfoSec meetups in the Asia Pacific region.
Stars: ✭ 52 (-70.45%)
M4ngl3m3Common password pattern generator using strings list
Stars: ✭ 103 (-41.48%)
BinsnitchDetect silent (unwanted) changes to files on your system
Stars: ✭ 144 (-18.18%)
sx🖖 Fast, modern, easy-to-use network scanner
Stars: ✭ 1,267 (+619.89%)
cheatsheetThese are some of the commands which I use frequently during Malware Analysis and DFIR.
Stars: ✭ 23 (-86.93%)
Leakfa.comA simple way to know if you are on the list of major security breaches like "HIBP", but it is specific for Iran.
Stars: ✭ 106 (-39.77%)
fuzzmostall manner of wordlists
Stars: ✭ 23 (-86.93%)
AutoIt-ObfuscatorAutoIt Obfuscator lets you protect AutoIt script source code against analysis, reverse engineering & decompilation using advanced obfuscation techniques and polymorphic encryption.
Stars: ✭ 31 (-82.39%)
TIGMINTTIGMINT: OSINT (Open Source Intelligence) GUI software framework
Stars: ✭ 195 (+10.8%)
hacktheboxNotes Taken for HTB Machines & InfoSec Community.
Stars: ✭ 286 (+62.5%)
rejigTurn your VPS into an attack box
Stars: ✭ 33 (-81.25%)
aparoidStatic and dynamic Android application security analysis
Stars: ✭ 62 (-64.77%)
tutorialsAdditional Resources For Securing The Stack Tutorials
Stars: ✭ 36 (-79.55%)
Ob3vil1onAnother archive cracker created in python | cracking [zip/7z/rar] by bruteforcing [ NOT MAINTAINED ]
Stars: ✭ 17 (-90.34%)
awesome-api-securityA collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the community.
Stars: ✭ 2,079 (+1081.25%)
Kernel-dll-injectorKernel-Mode Driver that loads a dll into every new created process that loads kernel32.dll module
Stars: ✭ 256 (+45.45%)
ssh brute forceCrack SSH Password using Dictionary and Brute Force Method
Stars: ✭ 51 (-71.02%)
qvm-create-windows-qubeSpin up new Windows qubes quickly, effortlessly and securely on Qubes OS
Stars: ✭ 267 (+51.7%)
Malware-ZooHashes of infamous malware
Stars: ✭ 18 (-89.77%)
evtx-hunterevtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.
Stars: ✭ 122 (-30.68%)
tugareconPentest: Subdomains enumeration tool for penetration testers.
Stars: ✭ 142 (-19.32%)
IsthislegitDashboard to collect, analyze, and respond to reported phishing emails.
Stars: ✭ 251 (+42.61%)
emeraldImport DynamoRIO drcov code coverage data into Ghidra
Stars: ✭ 30 (-82.95%)
Guanciale🥓 Grab info needed by Carbonara from executables and disassemblers databases
Stars: ✭ 14 (-92.05%)
flydnsRelated subdomains finder
Stars: ✭ 29 (-83.52%)
github-watchmanMonitoring GitHub for sensitive data shared publicly
Stars: ✭ 60 (-65.91%)
CredsleakerCredsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in turn leak it via an HTTP request.
Stars: ✭ 247 (+40.34%)
KeydecoderKeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.
Stars: ✭ 236 (+34.09%)
ssdcssdeep cluster analysis for malware files
Stars: ✭ 24 (-86.36%)
KubestrikerA Blazing fast Security Auditing tool for Kubernetes
Stars: ✭ 213 (+21.02%)
CameradarCameradar hacks its way into RTSP videosurveillance cameras
Stars: ✭ 2,775 (+1476.7%)
introspectorA schema and set of tools for using SQL to query cloud infrastructure.
Stars: ✭ 61 (-65.34%)
FSEC-VMBackend logic implementation for Vulnerability Management System
Stars: ✭ 19 (-89.2%)
AutosqliAn automatic SQL Injection tool which takes advantage of ~DorkNet~ Googler, Ddgr, WhatWaf and sqlmap.
Stars: ✭ 222 (+26.14%)
Sec Admin分布式资产安全扫描核心管理系统(弱口令扫描,漏洞扫描)
Stars: ✭ 222 (+26.14%)
RoninRonin is a Ruby platform for vulnerability research and exploit development. Ronin allows for the rapid development and distribution of code, Exploits or Payloads, Scanners, etc, via Repositories.
Stars: ✭ 220 (+25%)