-
Kandji
- Miami
Infosec
A Python based RAT 🐀 (Remote Access Trojan) for getting reverse shell 🖥️
Collection of steganography tools - helps with CTF challenges
🧠 Laws, Theories, Principles and Patterns for developers and technologists.
DaProfiler is an OSINT tool allowing you to collect certain information about yourself in order to rectify by rgpd requests the traces you may have left on the net. DaProfiler is indeed able to rec…
An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any misuse of this toolkit !
The Web Application Hacker's Handbook - Extra Content
Awesome Forensics Resources. Almost 300 open source forensics tools, and 600 blog posts about forensics.
A curated list of awesome warez and piracy links
Creates dictionaries based on Wikipedia titles
Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authenticat…
My collection of various security tools created mostly in Python and Bash. For CTFs and Bug Bounty.
A collection of scripts to extend Burp Suite
Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in turn leak it via an HTTP request.
🤙 Security Trivia that rare people know.
Ghidra is a software reverse engineering (SRE) framework
SIDH Library is a fast and portable software library that implements state-of-the-art supersingular isogeny cryptographic schemes. The chosen parameters aim to provide security against attackers ru…
FrodoKEM: Learning with Errors Key Encapsulation. FrodoKEM is a family of key-encapsulation mechanisms that are designed to be conservative yet practical post-quantum constructions whose security d…
Software of the NIST Post-Quantum submission NewHope
Slides from my talk at ISC 2018 in Beijing 2018
Docs and resources on CPU Speculative Execution bugs
The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as g…
Semi-automatic OSINT framework and package manager