Stars
An opinionated list of awesome Python frameworks, libraries, software and resources.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.
An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
A book-in-progress about the Linux kernel and its insides.
An advanced Twitter scraping & OSINT tool written in Python that doesn't use Twitter's API, allowing you to scrape a user's followers, following, Tweets and more while evading most API limitations.
MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.
Scapy: the Python-based interactive packet manipulation program & library.
📝 A text file containing 479k English words for all your dictionary/word-based projects e.g: auto-completion / autosuggestion
An open access book on scientific visualization using python and matplotlib
an awesome list of honeypot resources
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
Customisable coding font with alternates, ligatures and contextual positioning. Crazy crisp at 12px/9pt. http://larsenwork.com/monoid/
An advanced memory forensics framework
All-in-one AI automation platform (workflows, agents, cases, tables) for security, IT, and infra teams.
Binary analysis and management framework
DRAKVUF Sandbox - automated hypervisor-level malware analysis system
A flexible, easy to use, automation framework allowing users to integrate their capabilities and devices to cut through the repetitive, tedious tasks slowing them down. #nsacyber
Digital Forensics artifact repository
Builds malware analysis Windows VMs so that you don't have to.
source for Open States scrapers
Utilize a Raspberry Pi and a Nuand BladeRF to generate your own portable local cell network
Static deobfuscator for Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.
Produces visualizations of network data in Blender.
Convert the calendar with astronomical events (from seasky.org) to iCal