Lists (29)
Sort Name ascending (A-Z)
BB
Cloud Security
Cryptography
DFIR
FlipperZero
Fuzzing
Hardware Hacking
Interesting tools - Privacy
Interesting tools, projects, PoCS or research related to privacy #privacy #toolsLearning Materials
ML/AI
Mobile Hacking
Net tools
Pi Projects
RE
RedTeam
Reports & Advisories
Roadwarrior
Root/Jailbreak Tools
SDR
Smart Home
Static Analysis
to-audit
ToDo
Tools
Web Hacking
Web testing tools
Wireless, Bluetooth, etc.
Xdev
ZigBee
Stars
- All languages
- Arduino
- Assembly
- AutoIt
- Batchfile
- Boo
- C
- C#
- C++
- CSS
- Clojure
- CodeQL
- Crystal
- Dart
- Dockerfile
- Eagle
- Emacs Lisp
- F#
- Go
- Groovy
- HTML
- Haskell
- IDL
- Inno Setup
- Isabelle
- Java
- JavaScript
- Jinja
- Julia
- Jupyter Notebook
- Kotlin
- LLVM
- Lua
- MATLAB
- Makefile
- Markdown
- Max
- NSIS
- Nim
- OCaml
- Objective-C
- Objective-C++
- PHP
- PLpgSQL
- Pascal
- Perl
- PowerShell
- Python
- QML
- Rich Text Format
- Ruby
- Rust
- Scala
- Shell
- Smali
- Solidity
- Standard ML
- Svelte
- Swift
- Tcl
- TeX
- Text
- TypeScript
- VBA
- VHDL
- Vim Script
- Visual Basic
- Visual Basic .NET
- Vue
- WebAssembly
- XSLT
- YARA
🎓 Path to a free self-taught education in Computer Science!
Community guide to using YubiKey for GnuPG and SSH - protect secrets with hardware crypto.
A list of public penetration test reports published by several consulting firms and academic security groups.
8 Lessons, Kick-start Your Cybersecurity Learning.
Automate the creation of a lab environment complete with security tooling and logging best practices
Windows System Call Tables (NT/2000/XP/2003/Vista/7/8/10/11)
RootMyTV is a user-friendly exploit for rooting/jailbreaking LG webOS smart TVs.
🔐CNCF Security Technical Advisory Group -- secure access, policy control, privacy, auditing, explainability and more!
HTTPLeaks - All possible ways, a website can leak HTTP requests
All CPU and MCU documentation in one place
ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the current state of the target AD environment.
CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA tokens.
Track the GPS location of the user's smartphone or PC and capture a picture of the target, along with IP and device information.
Tracking interesting Linux (and UNIX) malware. Send PRs
*DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM
Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI
A Nmap XSL implementation with Bootstrap.
All releases of the security research group (a.k.a. hackers) The Hacker's Choice
This tool downloads, installs, and configures a shiny new copy of Chromium.
Content hijacking proof-of-concept using Flash, PDF and Silverlight
Android application fuzzing framework with fuzzers and crash monitor.
Chrome address spoofing vulnerability proof-of-concept for HTTPS. (Original by David Leo.)
A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office365 users.
A guide + python notebook that helps to collect, analyse and visualise requests sent by a mobile device while using some app.
A static-code-analysis tool for performing security-focused code reviews. It enables an auditor to swiftly map the attack-surface of a large application, with an emphasis on identifying development…