Stars
Tips and Tutorials for Bug Bounty and also Penetration Tests.
A list of Free Software network services and web applications which can be hosted on your own servers
Guidance for mitigation web shells. #nsacyber
Impacket is a collection of Python classes for working with network protocols.
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.
Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android
List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
Digital forensic acquisition tool for Windows based incident response.
Command line utility for inserting a dylib load command into a Mach-O binary
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
Attack and defend active directory using modern post exploitation adversary tradecraft activity
A library that enables dynamically rebinding symbols in Mach-O binaries running on iOS.
An on-path blackbox network traffic security testing tool
A post-exploitation powershell tool for extracting juicy info from memory.
Whitebox AES implementation in C++. Chow, Karroumi.
Generate sandboxes for C/C++ libraries automatically
signed-loaders documents Windows executables that can be used for side-loading DLLs.
Class materials for a distributed systems lecture series
A collection of LLDB aliases/regexes and Python scripts to aid in your debugging sessions
My Chrome and Safari exploit code + write-up repo
An updated collection of resources targeting browser-exploitation.
Convert an APK to an Android Studio Project using multiple open-source decompilers