Stars
Deriving RSA public keys from message-signature pairs
This app runs various webview tests to explore the attack surface and exploit techniques
Chrome extension for automating CSPT discovery
Tools to perform differential fault analysis attacks (DFA).
Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android
A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.
β‘·β πππππ ππΈβ β’Ύ is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework)
Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loading of a library from memory into a host process.
A cheat sheet that contains advanced queries for SQL Injection of all types.
Mastering Ethereum, by Andreas M. Antonopoulos, Gavin Wood
Tool for helping in the exploitation of path traversal vulnerabilities in Java web applications
Checklist of the most important security countermeasures when designing, testing, and releasing your API
A curated list of awesome browser security learning material.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
PHPGGC is a library of PHP unserialize() payloads along with a tool to generate them, from command line or programmatically.
Converting the BSides Perth 2018 badge into a CO2, temp, and humidity monitor
A tool for exploring each layer in a docker image
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, seβ¦
A linux-based assembly REPL for x86, amd64, armv7, and armv8
All kinds of infosec learning related stuff.
Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.
A compilation of writeups from past CTFs covering various topics and categories available in CTFs.all levels of skill accounted for
β‘ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes β‘
Python implementations of cryptographic attacks and utilities.