Lists (8)
Sort Name ascending (A-Z)
Starred repositories
Depix is a PoC for a technique to recover plaintext from pixelized screenshots.
A terminal ASCII media player. View images, gifs, videos, webcam, YouTube, etc.. directly in the terminal as ASCII art.
SigPloit: Telecom Signaling Exploitation Framework - SS7, GTP, Diameter & SIP
OXO is a security scanning orchestrator for the modern age.
Limbo is a work-in-progress, in-process OLTP database management system, compatible with SQLite.
C2 infrastructure that allows Red Teamers to execute system commands on compromised hosts through Microsoft Teams.
JADX-gui scripting plugin for dynamic decompiler manipulation
[Official] Android reverse engineering tool focused on dynamic instrumentation automation leveraging Frida. It disassembles dex, analyzes it statically, generates hooks, discovers reflected methods…
Scan for React performance issues and eliminate slow renders in your app
A list of Capture The Flag (CTF) frameworks, libraries, resources and software for started/experienced CTF players 🚩
An extremely fast Python linter and code formatter, written in Rust.
Android App Security Checklist
Low-Level Programming Roadmap and Resources
A curated list of resources for learning about application security
🧵 CLI tool for directly patching container images!
A service that analyzes docker images and scans for vulnerabilities
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
Run macOS VM in a Docker! Run near native OSX-KVM in Docker! X11 Forwarding! CI/CD for OS X Security Research! Docker mac Containers.
Open Source Vulnerability Management Platform
DevSecOps, ASPM, Vulnerability Management. All on one platform.
This repository contains some resources for ethical hackers penetration tester 😊 This may contain some files, tools, books, and links that need to be used for good purposes only. Do not do any ille…
AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses
List of the links to the docs for different services, which explain using of advanced search operators
Obtain GraphQL API schema even if the introspection is disabled
A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server.