Lists (19)
Sort Name ascending (A-Z)
Stars
Covers Top 10 OWASP Mobile Vulnerabilities
Updated lists of IP addresses/whitelists of good bots and crawlers. Includes GoogleBot, BingBot, DuckDuckBot, etc.
A Python script that generates regional IP addresses per CIDR notation.. You import such IP addresses as whitelists into bypassing tools for full access of internet.
Collections Config sing-box, clash, clash.meta, Rules Firewall, Whitelist DNS, Blocklist Domains.
Clusters and elements to attach to MISP events or attributes (like threat actors)
"Essential Kali Linux commands for ethical hackers and penetration testers."
Extending & consolidating hosts files from a variety of sources, specifically for Sophos XG.
Postman collection to work with Sophos Central APIs
Advanced RAT written in C#, fully controllable through Control-Panel, Discord with dedicated GUI builder to make preparation easier.
the transparent ransomware claim tracker 🥷🏼🧅🖥️
A javascript library and tools for huami watchfaces
chm-dev / watchfaceEditor
Forked from v1ack/watchfaceEditorfork of Watchface editor with desktop and experimental Amazfit GTS support
Complete bundle with simple workflow for editing Amazfit GTS watchfaces.
pack/unpack .bin for amazfit verge lite/gtr/gts
smlinux / armbian-tanix-tx6
Forked from armbian/buildArmbian Linux build framework on stable Linux kernel
CVE-2024-36401 (GeoServer Remote Code Execution)
Delve into a comprehensive checklist, your ultimate companion for Android app penetration testing. Identify vulnerabilities in network, data, storage, and permissions effortlessly. Boost security s…
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, detections…
Robyn is a Super Fast Async Python Web Framework with a Rust runtime.
Xiaomi watchfaces editor for various watch, band models by Xiaomi
ClamAV - Documentation is here: https://docs.clamav.net
John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs
A proof of concept exploit for a wordpress 5.6 media library vulnerability