Lists (1)
Sort Name ascending (A-Z)
Stars
- All languages
- Arduino
- Assembly
- C
- C#
- C++
- CSS
- Dart
- Dockerfile
- Eagle
- Elixir
- Game Maker Language
- Go
- Groovy
- HTML
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- MATLAB
- Makefile
- Markdown
- Nim
- Nix
- Objective-C
- PHP
- PowerShell
- Python
- QML
- Ruby
- Rust
- SCSS
- Shell
- SmPL
- Smali
- Stylus
- Swift
- SystemVerilog
- TypeScript
- Vala
- Verilog
- Vue
- XSLT
- YARA
- Zig
Modular visual interface for GDB in Python
Universal Radio Hacker: Investigate Wireless Protocols Like A Boss
OSS-Fuzz - continuous fuzzing for open source software.
一款长亭自研的完善的安全评估工具,支持常见 web 安全问题扫描和自定义 poc | 使用之前务必先阅读文档
Simple animated GIF screen recorder with an easy to use interface
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
Xiaomi Mobile Phone Kernel OpenSource
Leaked Mirai Source Code for Research/IoC Development Purposes
A collection of android security related resources
A suite of WiFi/Bluetooth offensive and defensive tools for the ESP32
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
📱 objection - runtime mobile exploration
A repository for learning various heap exploitation techniques.
List of Awesome Red Teaming Resources
📡 PoC auto collect from GitHub.
Everything about Web Application Firewalls (WAFs) from Security Standpoint! 🔥
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
All about bug bounty (bypasses, payloads, and etc)
A list of interesting payloads, tips and tricks for bug bounty hunters.
A collection of links related to Linux kernel security and exploitation
Serial utility for flashing, provisioning, and interacting with Espressif SoCs
An open source, embedded, high performance g-code-parser and CNC milling controller written in optimized C that will run on a straight Arduino
Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Scanning APK file for URIs, endpoints & secrets.
A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Develo…
This repo contains samples that demonstrate the API used in Windows classic desktop applications.