Lists (6)
Sort Name ascending (A-Z)
Stars
- All languages
- AGS Script
- AIDL
- ANTLR
- Assembly
- C
- C#
- C++
- CMake
- CSS
- Cap'n Proto
- Clojure
- Common Lisp
- Cuda
- Cython
- Dart
- Dockerfile
- Elixir
- F*
- FreeBASIC
- Go
- HTML
- Haskell
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- Lua
- Makefile
- Markdown
- Max
- Objective-C
- PHP
- Perl
- PostScript
- PowerShell
- Python
- QML
- R
- Rich Text Format
- Roff
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Swift
- SystemVerilog
- Tcl
- TeX
- TypeScript
- Vala
- Verilog
- Vim Script
- Vue
- XSLT
- YARA
- ZIL
Defeating Google's audio reCaptcha with 85% accuracy.
Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term operations.
Pronterface, Pronsole, and Printcore - Pure Python 3d printing host software
Striker is an offensive information and vulnerability scanner.
Extract credentials from lsass remotely
A very simple way to find out which SSL ciphersuites are supported by a target.
A tool for checking the security hardening options of the Linux kernel
The most complete open-source tool for Twitter intelligence analysis
A modern, web-based photo management server. Run it on your home server and it will let you find the right photo from your collection on any device. Smart filtering is made possible by object recog…
🦜 Simple and powerful voice changer for Linux, written with Python & GTK
A curated list of resources related to Industrial Control System (ICS) security.
Sniffs sensitive data from interface or pcap
❄️ PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highlight important communication and file extraction
💉 Stuff which works in Chrome and maybe Acrobat and Foxit.
Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA. The tool can attack over FireWire, Thunderbolt, ExpressCard, PC Card and any other PCI/PCIe interfaces.
Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key Exchange, Authentication methods along with example challenge…
Convert Apple NeuralHash model for CSAM Detection to ONNX.
📱 Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from Android devices.
A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Roleplay as the NSA by making creepy graphs of your friends
A Framework for Encrypted Machine Learning in TensorFlow
A flexible, easy to use, automation framework allowing users to integrate their capabilities and devices to cut through the repetitive, tedious tasks slowing them down. #nsacyber
DRAKVUF Sandbox - automated hypervisor-level malware analysis system
Intel Engine & Graphics Firmware Analysis Tool