Lists (6)
Sort Name ascending (A-Z)
Stars
- All languages
- ASP
- Assembly
- AutoIt
- Batchfile
- Boo
- C
- C#
- C++
- CSS
- Clojure
- DIGITAL Command Language
- Dockerfile
- F#
- FreeMarker
- Go
- HCL
- HTML
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- LLVM
- Logos
- Makefile
- Nim
- PHP
- Pascal
- PowerShell
- Python
- R
- Ruby
- Rust
- SCSS
- Shell
- Svelte
- Tcl
- TeX
- TypeScript
- VBA
- VBScript
- Verilog
- Visual Basic
- Vue
- XSLT
- YARA
An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any misuse of this toolkit !
渗透测试有关的POC、EXP、脚本、提权、小工具等---About penetration-testing python-script poc getshell csrf xss cms php-getshell domainmod-xss csrf-webshell cobub-razor cve rce sql sql-poc poc-exp bypass oa-getshell cve…
Collection of China illegal cases about web crawler 本项目用来整理所有中国大陆爬虫开发者涉诉与违规相关的新闻、资料与法律法规。致力于帮助在中国大陆工作的爬虫行业从业者了解我国相关法律,避免触碰数据合规红线。 [AD]企业租显卡算力部署AI请选Novagrid
爬取secwiki和xuanwu.github.io/sec.today,分析安全信息站点、安全趋势、提取安全工作者账号(twitter,weixin,github等)
DeskApp Admin is a free to use Bootstrap 4 admin template.
学习安全运营的记录 | The knowledge base of security operation
碎遮SZhe_Scan Web漏洞扫描器,基于python Flask框架,对输入的域名/IP进行全面的信息搜集,漏洞扫描,可自主添加POC
These are my checklists which I use during my hunting.
share experience towards for information management, brainstorming and so on.
该系列资源是Python疫情大数据分析,涉及网络爬虫、可视化分析、GIS地图、情感分析、舆情分析、主题挖掘、威胁情报溯源、知识图谱、预测预警及AI和NLP应用等。推荐大家结合作者CSDN博客阅读,武汉必胜、湖北必胜、中国必胜!
Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020
Pull some Malware samples here for other security researchers/malware analyst's to analyze and play with.
Web-based reverse shell generator
🧮 An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessment
SilverFir: Investment Report 🌲 Инвестиционный отчёт в гугл доках, куда можно добавить любой актив и скачивать цену автоматически
A generated corpus, seed, and target for a fuzz job
Collate and collect binary related materials, including papers, tools, etc. Now,there are the following categories: 1、Fuzzing
Proactive malware campaign discovery system
Advanced Persistent Threats are highly skilled cyber hacker groups. These different groups have many ways of performing attacks. By using Webscraping, MITRE ATTACK Framework and Machine learning, w…
Topic clusters and 5W analysis on CVE (MITRE) data