Stars
Scans Software Bill of Materials (SBOMs) for security vulnerabilities
A PoC that the USB port is an attack surface for a Mazda car's infotainment system and how Mazda hacks are made
Pre-Built Vulnerable Environments Based on Docker-Compose
快速搭建各种漏洞环境(Various vulnerability environment)
Free Security and Hacking eBooks
Decrypted content of odd.tar.xz.gpg, swift.tar.xz.gpg and windows.tar.xz.gpg
APT & CyberCriminal Campaign Collection
Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers
Advanced Sysmon ATT&CK configuration focusing on Detecting the Most Techniques per Data source in MITRE ATT&CK, Provide Visibility into Forensic Artifact Events for UEBA, Detect Exploitation events…
Machine Learning、Deep Learning、PostgreSQL、Distributed System、Node.Js、Golang
BinNavi is a binary analysis IDE that allows to inspect, navigate, edit and annotate control flow graphs and call graphs of disassembled code.
Threat Analysis, Reconnaissance, and Data Intelligence System
Docker Container for Scumblr (github.com/netflix/scumblr)
A very simple way to find out which SSL ciphersuites are supported by a target.
SQLi-Hunter is a simple HTTP / HTTPS proxy server and a SQLMAP API wrapper that makes digging SQLi easy.