phodal |
开源电子书:大前端修炼之道 |
https://github.com/phodal/fe |
https://github.com/ThoughtWorksInc |
待我代码编成,娶你为妻可好 |
Shenzhen, China |
@ThoughtWorksInc |
303 |
0 |
2000 |
14300 |
15 |
TypeScript,JavaScript,HTML |
0 |
0 |
MorvanZhou |
Python 机器学习教程 |
https://github.com/MorvanZhou/tutorials/blob/master/README.md?hmsr=toutiao.io&utm_medium=toutiao.io&utm_source=toutiao.io |
https://morvanzhou.github.io/ |
Deep Learning Research & Development in Tencent |
None |
None |
17 |
0 |
28 |
11600 |
0 |
Python,Jupyter |
0 |
0 |
fchollet |
[书籍] Deep Learning with Python |
https://github.com/fchollet/deep-learning-with-python-notebooks |
https://twitter.com/fchollet |
|
Mountain View |
None |
8 |
0 |
120 |
8200 |
0 |
Python |
0 |
0 |
donnemartin |
The System Design Primer : https://github.com/donnemartin/system-design-primer |
https://github.com/donnemartin/system-design-primer |
https://github.com/facebook |
Engineering Manager @facebook. twitter.com/donne_martin |
Washington, D.C. |
@facebook |
27 |
0 |
1000 |
7200 |
3 |
Python |
63400 |
9600 |
offensive-security |
exploit-database-papers - Exploit Databases Papers: |
https://github.com/offensive-security/exploit-database-papers |
https://www.offensive-security.com |
|
None |
Offensive Security |
28 |
0 |
0 |
6500 |
3 |
Python,C,Shell |
4300 |
1200 |
amitshekhariitbhu |
Android-Debug-Database : A library for debugging android databases and shared preferences - Make Debugging Great : |
https://github.com/amitshekhariitbhu/Android-Debug-Database |
https://github.com/MindorksOpenSource |
IIT , Co-Founder at MindOrks & AfterAcademy , Learner & Teacher at MindOrks & AfterAcademy , Open Source Contributor , #MakeEveryoneCode , Teaching Developers |
New Delhi, India |
@MindorksOpenSource |
37 |
0 |
41 |
4500 |
2 |
Java |
0 |
0 |
evilcos |
XSSOR XSS测试与利用在线工具 |
https://github.com/evilcos/xssor2 |
https://evilcos.me |
//:ALERT(/HACKING SYMBOL/)//余弦 |
None |
xeyeteam |
10 |
0 |
150 |
4000 |
13 |
JavaScript |
0 |
0 |
KrauseFx |
只需问一问,轻松获得 iOS 用户的 Apple ID 密码: |
https://github.com/KrauseFx/steal.password |
https://github.com/fastlane |
Professional iOS Code Signing Issue Resolver - Developer of @fastlane at @google |
https://whereisfelix.today |
Unemployed |
119 |
0 |
1100 |
3700 |
10 |
Swift,JavaScript,Ruby,HTML |
0 |
0 |
evilsocket |
SG1 - 数据加密、提取和转换的工具: |
https://github.com/evilsocket/sg1 |
https://www.evilsocket.net |
Hacker , I dont respectfully, I disagree. https://www.patreon.com/evilsocket |
Italy |
Zimperium |
115 |
0 |
15 |
3700 |
0 |
Go,Python,JavaScript |
0 |
0 |
junegunn |
fzf - UNIX 命令行版本的模糊命令、文件、进程搜索工具: |
https://github.com/junegunn/fzf |
https://paypal.me/junegunn |
|
None |
None |
131 |
0 |
819 |
3700 |
0 |
Go,Clojure,Ruby,Vim |
0 |
0 |
asLody |
VirtualApp:Android 双开沙箱 |
https://github.com/asLody/VirtualApp/blob/master/CHINESE.md |
None |
Just a boy |
China |
None |
19 |
0 |
377 |
3600 |
9 |
Java,C++ |
5700 |
1800 |
trustedsec |
trevorc2 - 伪装合法的网站用于隐藏 C/S 通信的后门: |
https://github.com/trustedsec/trevorc2 |
https://www.trustedsec.com |
Headquartered in Cleveland, Ohio, TrustedSec is an Information Security Consulting company, made up of researchers, hackers, advisors to help our customers. |
Cleveland, Ohio |
TrustedSec |
24 |
0 |
2 |
3100 |
8 |
Python |
4400 |
1400 |
vhf |
Free Programming Books : |
https://github.com/vhf/free-programming-books/blob/master/free-programming-books.md |
https://github.com/eXascaleInfolab |
@eXascaleInfolab → @recursecenter → @scigility → @livingdocsIO → @zazuko |
Switzerland |
@zazuko |
118 |
0 |
711 |
3000 |
66 |
Go,Python,JavaScript,HTML |
0 |
0 |
xoreaxeaxeax |
Breaking the x86 ISA,这篇 Paper 中作者利用 Page Fault 分析和处理器 Fuzzing 的方法枚举 x86 的指令集并发现可能存在的软硬件漏洞: |
https://github.com/xoreaxeaxeax/sandsifter/blob/master/references/domas_breaking_the_x86_isa_wp.pdf |
None |
|
None |
None |
9 |
0 |
0 |
2900 |
0 |
Python,C,Assembly |
0 |
0 |
x0rz |
Google 的 Certificate Transparency 计划可以帮助用户实时监控证书可信任性。有研究员基于它开发了一个监控日志服务 - CertStream,再配合写个简单的脚本,就可以监控可疑域名的证书信息变动提醒了: https://blog.0day.rocks/catching-phishing-using-certstream-97177f0d499a https://medium.com/cali-dog-security/introducing-certstream-3fc13bb98067 |
https://github.com/x0rz/phishing_catcher/blob/master/catch_phishing.py |
https://0day.rocks |
hacking things |
France |
None |
6 |
0 |
19 |
2600 |
0 |
Python,C,Perl |
3500 |
2100 |
ring04h |
猪猪侠历次分享总结 |
https://github.com/ring04h/papers |
http://weibo.com/ringzero |
|
China |
None |
41 |
0 |
844 |
2400 |
50 |
Python |
941 |
514 |
0xAX |
Ive just fully rewrited eight part of the #linux #kernel initialization process about scheduler initialization - |
https://github.com/0xAX/linux-insides/blob/master/Initialization/linux-initialization-8.md |
https://github.com/travelping |
Elixir developer at @travelping. |
None |
@travelping |
66 |
0 |
226 |
2300 |
7 |
Python,Go,C,Erlang,C++ |
0 |
0 |
hak5darren |
Mac OSX - Unauthenticated Sudo access for all users (USB Rubber Ducky) @ hak5darren @ mubix |
https://github.com/hak5darren/USB-Rubber-Ducky/wiki/Payload---OSX-Sudo-for-all-users-without-password |
https://hak5.org |
Darren Kitchen is the founder of Hak5, the award winning Internet television show inspiring hackers and enthusiasts since 2005. |
San Francisco, CA |
Hak5 LLC |
6 |
0 |
2 |
2300 |
4 |
Python,C,Shell,HTML |
3100 |
1000 |
mubix |
Linux 后渗透测试常用命令列表: |
https://github.com/mubix/post-exploitation/wiki/Linux-Post-Exploitation-Command-List |
https://malicious.link/ |
Certified Checkbox Unchecker |
Internets |
@NoVAHA |
160 |
0 |
124 |
2100 |
421 |
Python,C,HTML,Ruby,C++ |
1100 |
283 |
zhengmin1989 |
一步一步学ROP |
https://github.com/zhengmin1989/ROP_STEP_BY_STEP |
None |
Android/iOS Senior Security Engineer @ Alibaba, CUHK PhD, a member of Blue-lotus and Insight-labs, worked in FireEye , Baidu and Tencent. |
None |
None |
22 |
0 |
39 |
2000 |
6 |
Objective-C,HTML,Makefile |
0 |
0 |
DanMcInerney |
net-creds - 一款从网络嗅探或从 Pcap 文件提取敏感数据的工具: |
https://github.com/DanMcInerney/net-creds |
None |
I like automating security stuff so I dont have to work. Coalfire Sr. Pentester. |
None |
@danhmcinerney |
82 |
0 |
236 |
1900 |
23 |
Python,Ruby,PowerShell |
0 |
0 |
thedaviddias |
Web 前端工程师资料整理: |
https://github.com/thedaviddias/Resources-Front-End-Beginner |
https://github.com/influitive |
👨🏽💻 Software Engineer with a Front-End & UX / UI passion 🤲 Open-source lover ❤️ code, meditation 🕵️♂️ human solver problems |
Toronto, Canada |
@influitive |
23 |
0 |
496 |
1900 |
247 |
JavaScript,Ruby,HTML |
0 |
0 |
spacehuhn |
The USB Wi-Fi Ducky: inject keystrokes remotely with @ arduino and @ ESP8266https://github.com/spacehuhn/wifi_ducky |
https://github.com/spacehuhn/wifi_ducky |
https://spacehuhn.com |
Support me on patreon.com/spacehuhn |
Germany |
None |
18 |
0 |
260 |
1800 |
12 |
C,C++,Arduino |
0 |
0 |
0xd4d |
dnspy - .NET 调试与汇编编辑器: |
https://github.com/0xd4d/dnSpy |
None |
|
None |
None |
15 |
0 |
34 |
1700 |
0 |
C# |
0 |
0 |
LiveOverflow |
WebKit JS exploit used for iOS 9.3.3 jailbreak / Nintendo Switch(CVE-2016-4657/Demo): https://www.youtube.com/watch?v=xkdPjbaLngE , PoC: |
https://github.com/LiveOverflow/lo_nintendoswitch/blob/master/poc1.html |
https://www.youtube.com/LiveOverflowCTF |
wannabe hacker... |
None |
None |
10 |
0 |
3 |
1700 |
0 |
Python,C,HTML,C++ |
324 |
98 |
lijiejie |
.DS_Store文件泄漏利用脚本 |
https://github.com/lijiejie/ds_store_exp |
http://www.lijiejie.com |
Just for fun |
None |
None |
13 |
0 |
2 |
1700 |
7 |
Python |
1400 |
639 |
hasherezade |
PE-sieve - 用于在进程模块中扫描 Inline Hooks 的工具: |
https://github.com/hasherezade/pe-sieve |
http://hasherezade.net |
|
Poland |
None |
48 |
0 |
30 |
1600 |
9 |
Python,C,Assembly,C++ |
746 |
129 |
ujjwalkarn |
Machine Learning & Deep Learning Tutorials |
https://github.com/ujjwalkarn/Machine-Learning-Tutorials |
https://github.com/facebook |
machine learning @ facebook |
None |
@facebook |
82 |
0 |
274 |
1600 |
224 |
Python,R |
0 |
0 |
gentilkiwi |
Windows Credential Manager 是怎么保存密码的: |
https://github.com/gentilkiwi/mimikatz/wiki/howto-~-credential-manager-saved-credentials |
http://blog.gentilkiwi.com |
|
France |
None |
11 |
0 |
18 |
1500 |
24 |
C |
7800 |
1800 |
hfiref0x |
Fodhelper.exe UAC bypass added to the UACMe project. |
https://github.com/hfiref0x/UACMEThanks |
None |
|
None |
None |
23 |
0 |
24 |
1500 |
15 |
C |
0 |
0 |
misterch0c |
GithubLeakAlert: find credential associated with an host |
https://github.com/misterch0c/GithubLeakAlert |
https://github.com/misterch0c |
Im a hacker not a slacker ~ twitter:@misterch0c |
None |
None |
65 |
0 |
811 |
1500 |
89 |
Python,ASP |
3500 |
206 |
orangetw |
TSH - 一个开源的 Linux 后门: |
https://github.com/orangetw/tsh |
http://blog.orange.tw |
|
Taiwan |
None |
37 |
0 |
506 |
1500 |
61 |
Python,C,PHP |
0 |
0 |
1N3 |
Goohak - 自动化针对目标域名进行 Google Hacking 的工具: |
https://github.com/1N3/Goohak |
https://github.com/xer0dayz |
Founder of @XeroSecurity. Creator of Sn1per. Hacking since 93. 20+ yrs. IT exp. Sr. Penetration Tester. OSCE/OSCP/CISSP @xer0dayz @XeroSecurity @CrowdShield |
None |
XeroSecurity |
19 |
0 |
671 |
1400 |
35 |
Python,C,Shell,BitBake |
0 |
0 |
Screetsec |
MicroSploit: The Office Exploitation Toolkit! |
https://github.com/Screetsec/Microsploit |
http://dracos-linux.org |
Developer dracOs linux and Penetration Testing Tools , Join our community at https://t.me/bashidorg |
INDONESIA |
Dracos Linux ( Penetration OS from Indonesia ) |
14 |
0 |
148 |
1400 |
5 |
Python,Shell,Java,C++ |
0 |
0 |
DrKLO |
The source code of Telegram for iOS and Android is open and free. Enjoy! https://github.com/DrKLO/Telegram |
https://github.com/DrKLO/Telegram |
None |
|
None |
None |
2 |
0 |
1 |
1200 |
0 |
Java |
11800 |
4600 |
Neo23x0 |
CVE-2017-11882 漏洞利用的 Sysmon 检测规则: |
https://github.com/Neo23x0/sigma/blob/master/rules/windows/sysmon/sysmon_exploit_cve_2017_11882.yml |
https://github.com/NextronSystems |
#DFIR #Python #YARA #Golang #SIEM #SOC #Sigma #Malware |
None |
@NextronSystems |
79 |
0 |
101 |
1200 |
15 |
Python,Batchfile,Java |
0 |
0 |
dexteryy |
Spellbook of Modern Web Dev,JavaScript Web 开发宝典(书): |
https://github.com/dexteryy/spellbook-of-modern-webdev |
https://twitter.com/dexteryy |
JS Hacker, Archmage of GUI, Web App Dev, Virtual World Builder, Fictional World Enthusiast, SF/F Nerd, Hardcore PC Gamer, Anime/Comic Otaku |
Beijing, China |
ByteDance |
72 |
0 |
641 |
1200 |
108 |
JavaScript |
0 |
0 |
smealum |
releasing udsploit, an exploit giving arm11 kernel code exec on 3DS firmware 11.3 with @ ylws8 |
https://github.com/smealum/udsploit |
http://smealum.net |
|
None |
None |
37 |
0 |
15 |
1200 |
2 |
C |
0 |
0 |
taviso |
Surprise, I ported Windows Defender to Linux. ? |
https://github.com/taviso/loadlibrary |
None |
|
None |
None |
10 |
0 |
12 |
1200 |
1 |
C |
0 |
0 |
CHYbeta |
cmsPoc-A CMS Exploit Framework |
https://github.com/CHYbeta/cmsPoc/wiki/Scripts |
https://chybeta.github.io |
https://xz.aliyun.com/u/2551 |
China |
XMU |
43 |
0 |
1400 |
1100 |
89 |
Python,HTML |
2200 |
634 |
cure53 |
DOMPurify 0.8.9 is out, with further hardening against the Safari DOMParser XSS |
https://github.com/cure53/DOMPurify/releases/tag/0.8.9 |
https://cure53.de |
And there is fire where we walk. |
Berlin |
Fine penetration tests for fine websites |
16 |
0 |
30 |
1100 |
0 |
JavaScript,HTML |
0 |
0 |
mandatoryprogrammer |
俄罗斯 DNS 服务器出现问题,泄露了一份所有注册在俄罗斯顶级域名下的域名列表: |
https://github.com/mandatoryprogrammer/RussiaDNSLeak |
https://thehackerblog.com/ |
><script src=https://y.vg></script> |
><script src=https://y.vg></script> |
><script src=https://y.vg></script> |
41 |
0 |
97 |
1100 |
18 |
Python,JavaScript,Dockerfile |
1400 |
208 |
neonichu |
trollface: AirDrop trollfaces to everyone. |
https://github.com/neonichu/trolldrop |
https://github.com/apple |
Et tu, sabes? |
San Francisco, USA |
@apple |
372 |
0 |
4700 |
1100 |
288 |
C,Ruby,Objective-C,C++ |
0 |
0 |
yenchenlin |
Awesome Adversarial Machine Learning - 机器学习对抗相关的资料整理: |
https://github.com/yenchenlin/awesome-adversarial-machine-learning |
http://yclin.me |
PhD student at MIT CSAIL |
Cambridge, MA |
MIT CSAIL |
91 |
0 |
315 |
1100 |
71 |
Python,Emacs,Shell,Ruby,Jupyter |
0 |
0 |
jgamblin |
jgamblin/nmaptable: Transform NMap Scans to an D3.js HTML Table |
https://github.com/jgamblin/nmaptable/ |
https://www.jerrygamblin.com |
Researcher. Builder. Hacker. Traveler. Cedere Nescio. |
United States |
None |
65 |
0 |
0 |
1000 |
2 |
C,Shell |
0 |
0 |
jinfagang |
weibo_terminater: 微博终结者爬虫 |
https://github.com/jinfagang/weibo_terminater |
http://jinfagang.github.io |
I am the best! |
Sanfancisco |
Google |
123 |
0 |
882 |
1000 |
67 |
Python,C++ |
0 |
0 |
mossmann |
Updating #HackRF Firmware https://github.com/mossmann/hackrf/wiki/Updating-Firmware and install Spectrum Analyzer GUI for hackrf_sweep on Windows... |
https://github.com/mossmann/hackrf/wiki/Updating-Firmware |
http://greatscottgadgets.com/ |
|
None |
Great Scott Gadgets |
21 |
0 |
5 |
973 |
0 |
Python,Eagle,C,C++,KiCad |
2700 |
797 |
denysdovhan |
wtfjs - JavaScript 的一些有趣的小技巧(Tricks)总结: |
https://github.com/denysdovhan/wtfjs |
https://github.com/wix |
R&D Engineer at @wix, Speaker, Open Source addict, JS & Shell scripting fanboy, Founder of @chernivtsijs and @LambdaBooks |
Kyiv, Ukraine |
@wix |
89 |
0 |
767 |
967 |
89 |
Shell,JavaScript |
0 |
0 |
mattifestation |
PSSysmonTools - PowerShell 编写的 Sysmon 工具: |
https://github.com/mattifestation/PSSysmonTools |
http://www.exploit-monday.com/ |
|
None |
None |
23 |
0 |
9 |
953 |
1 |
PowerShell |
553 |
146 |
FuzzySecurity |
Stage-RemoteDll - 用 PowerShell 实现 NtCreateThreadEx/ QueueUserAPC/ SetThreadContext/ SetWindowsHookEx DLL 注入技术: |
https://github.com/FuzzySecurity/PowerShell-Suite/blob/master/Stage-RemoteDll.ps1 |
http://www.fuzzysecurity.com/ |
|
None |
None |
13 |
0 |
0 |
952 |
0 |
C,PowerShell |
0 |
0 |
SwiftOnSecurity |
Watching @markrussinovich at #RSAC2017 talk about Sysmon?Get my Sysmon config file for a jump-start at deployment! |
https://github.com/SwiftOnSecurity/sysmon-config |
None |
|
None |
None |
6 |
0 |
82 |
952 |
14 |
PowerShell |
0 |
0 |
NullArray |
MIDA-Multitool: 脚本集合(系统枚举,漏洞验证,权限提升) |
https://github.com/NullArray/MIDA-Multitool |
https://github.com/GreySec-Official |
Cyber security enthusiast. Freedom advocate. I believe in sharing knowledge, tools, and value open source software development. |
None |
@GreySec-Official |
34 |
0 |
204 |
933 |
164 |
Python,Shell |
0 |
0 |
D4Vinci |
Dr0p1t-Framework: A framework create dropper that bypass most AVs |
https://github.com/D4Vinci/Dr0p1t-Framework |
https://github.com/Seekurity |
A hacker, high&low-level coder and a lot of things between. An extremely curious creature loves to learn. Break things or make things that break things. |
Egypt |
@Seekurity and @iSecur1ty |
32 |
0 |
367 |
927 |
82 |
Python |
0 |
0 |
n1nj4sec |
Puppy RAT a Python cross platform RAT |
https://github.com/n1nj4sec/pupy |
None |
|
France |
None |
8 |
0 |
129 |
915 |
14 |
Python |
4600 |
1200 |
enaqx |
Awesome Penetration Testing : A collection of awesome penetration testing resources : |
https://github.com/enaqx/awesome-pentest/blob/master/README.md |
http://enaqx.github.io/ |
Full Stack Developer |
None |
None |
44 |
0 |
0 |
910 |
0 |
JavaScript |
0 |
0 |
Ridter |
Pentest: 一些实用的渗透脚本和代码 |
https://github.com/Ridter/Pentest |
https://evi1cg.me |
|
None |
None |
104 |
0 |
405 |
909 |
20 |
Python,C#,C |
1800 |
358 |
swisskyrepo |
Wordpresscan: WPScan rewritten in Python + some WPSeku ideas |
https://github.com/swisskyrepo/Wordpresscan |
https://twitter.com/pentest_swissky |
Pentester & Bug Hunter |
None |
None |
7 |
0 |
5 |
895 |
12 |
Python,Shell |
0 |
0 |
ajinabraham |
Xenotix-Python-Keylogger : Xenotix Python Keylogger for Windows : |
https://github.com/ajinabraham/Xenotix-Python-Keylogger/blob/master/xenotix_python_logger.py |
https://github.com/OpenSecurityIN |
Security Research & Engineering https://opensecurity.in https://ajinabraham.com |
Montreal, Canada |
@OpenSecurityIN |
125 |
0 |
50 |
893 |
13 |
Python,HTML,CSS |
0 |
0 |
devttys0 |
Botox is a great tool from @devttyS0 which uses Keystone to statically-inject SIGSTOP to entry point of ELF file! |
https://github.com/devttys0/botox |
None |
|
None |
None |
25 |
0 |
0 |
884 |
0 |
Python,C,Shell |
658 |
223 |
xianhu |
LearnPython: 以撸代码的形式学习Python |
https://github.com/xianhu/LearnPython |
https://zhuanlan.zhihu.com/pythoner |
data miner |
None |
None |
6 |
0 |
18 |
880 |
1 |
Python,Jupyter |
0 |
0 |
jivoi |
网络安全中机器学习大合集 |
https://github.com/jivoi/awesome-ml-for-cybersecurity/blob/master/README_ch.md |
https://jivoi.github.io |
😈 Totally not a hacker |
Somewhere Out in Space |
None |
45 |
0 |
3200 |
878 |
164 |
Python,Shell |
2800 |
834 |
k4m4 |
A curated list of Terminal frameworks, plugins and resources for CLI lovers : |
https://github.com/k4m4/terminals-are-sexy |
https://nikolaskama.me/ |
Student by day 👔. (Aspiring) Hacker by night ⚡️. |
Athens, Greece |
None |
60 |
0 |
1100 |
874 |
43 |
Python,Shell,JavaScript,CSS |
0 |
0 |
cirosantilli |
x86-assembly-cheat - x86 汇编语言实现的多个用户态和系统级的组件源码收集,包括 ELF、linking、interrupt 等等: https://github.com/cirosantilli/x86-bare-metal-examples |
https://github.com/cirosantilli/x86-bare-metal-examples |
https://www.cirosantilli.com |
2018新疆改造中心,1989六四事件,1999法轮功 ,2019 996.ICU, 2018包子露宪,2015 710律师劫,2015巴拿马文件 邓家贵,2017低端人口,2008西藏骚乱<script>alert(1)</script> |
2018新疆改造中心,1989六四事件,1999法轮功 ,2019 996.ICU, 2018包子露宪,2015 710律师劫,2015巴拿马文件 邓家贵,2017低端人口,2008西藏骚乱<script>alert(1)</script> |
2018新疆改造中心,1989六四事件,1999法轮功 ,2019 996.ICU, 2018包子露宪,2015 710律师劫,2015巴拿马文件 邓家贵,2017低端人口,2008西藏骚乱<script>alert(1)</script> |
423 |
0 |
830 |
871 |
1 |
Python,Makefile,C,Assembly |
0 |
0 |
Xyntax |
FileSensor: 基于爬虫的动态敏感文件探测工具 |
https://github.com/Xyntax/FileSensor |
https://www.cdxy.me |
Web developer, security researcher and data analyst. |
Hangzhou,China |
Alibaba Cloud |
49 |
0 |
293 |
866 |
85 |
Python,HTML,PowerShell |
1100 |
561 |
pirate |
List of Sites affected by Cloudflares #Cloudbleed HTTPS Traffic Leak |
https://github.com/pirate/sites-using-cloudflare |
https://github.com/Monadical-SAS |
Python ⑊ JS ⑊ Mac ⑊ web archiving ⑊ mesh networking ⑊ security ⑊ bicycles twitter.com/thesquashSH |
Montréal, Canada |
@Monadical-SAS |
78 |
0 |
1000 |
843 |
646 |
Python,JavaScript |
0 |
0 |
jas502n |
St2-048 Remote Code Execution Vulnerability 测试 POC |
https://github.com/jas502n/st2-048 |
None |
1.misc 2.crypto 3. web 4. reverse 5. android 6. pwn 7. elf |
None |
None |
138 |
0 |
125 |
842 |
113 |
Python,C,Shell,PHP |
299 |
109 |
vanhoefm |
路由器 KRACK(CVE-2017-13082)测试脚本,检查路由器(AP)是否受 KRACK 攻击影响: |
https://github.com/vanhoefm/krackattacks-test-ap-ft |
http://www.mathyvanhoef.com |
|
None |
None |
50 |
0 |
10 |
827 |
1 |
Python,Shell,C,HTML |
2700 |
680 |
botherder |
I updated by targeted threats tracker, with latest reports and indicators of compromise |
https://github.com/botherder/targetedthreats |
http://twitter.com/botherder |
|
None |
Amnesty International |
42 |
0 |
12 |
809 |
0 |
Python,Go,JavaScript |
0 |
0 |
brannondorsey |
PassGAN - 利用深度学习方法猜测密码: |
https://github.com/brannondorsey/PassGAN |
https://github.com/runwayml |
Artist , Programmer , Researcher |
Philadelphia, PA |
@runwayml |
231 |
0 |
1700 |
804 |
102 |
Python,C,TypeScript,JavaScript |
0 |
0 |
wangyu- |
udp2raw-tunnel - 将 UDP 流量放入其他协议隧道中传输的工具: |
https://github.com/wangyu-/udp2raw-tunnel |
https://twitter.com/wangyu0 |
For questions about software usage, plz dont email me, post an issue instead, thx. |
Suzhou |
USTCsz |
58 |
0 |
131 |
799 |
58 |
Python,C++ |
0 |
0 |
ChrisTruncer |
WMIOps - 通过网络使用 WMI 来实现各种渗透测试目的的工具: |
https://github.com/ChrisTruncer/WMIOps |
https://github.com/FortyNorthSecurity |
A red teamer and tool developer |
None |
@FortyNorthSecurity |
22 |
0 |
22 |
793 |
8 |
Python,Shell,Ruby |
378 |
119 |
marcan |
takeover.sh : Wipe and reinstall a running Linux system via SSH, without rebooting : |
https://github.com/marcan/takeover.sh |
https://marcan.st |
If it aint broke, Ill fix it! |
Shibuya, Tokyo, Japan |
None |
53 |
0 |
6 |
793 |
0 |
Python,C,Shell |
0 |
0 |
EdOverflow |
Bug Bounty Cheat Sheet |
https://github.com/EdOverflow/bugbounty-cheatsheet |
https://edoverflow.com/ |
Web developer & security researcher. |
::1 |
None |
38 |
0 |
168 |
790 |
20 |
Shell,HTML |
1600 |
497 |
ethicalhack3r |
Added some updates to the WordPress Plugin Security Testing Cheat Sheet - |
https://github.com/ethicalhack3r/wordpress_plugin_security_testing_cheat_sheet |
https://dewhurstsecurity.com |
|
UK-FR-ES |
Dewhurst Security |
18 |
0 |
105 |
788 |
9 |
Shell,PHP,Ruby |
3100 |
913 |
WangYihang |
Web Exploit-Framework |
https://github.com/WangYihang/Exploit-Framework |
None |
If you can read assembly language then everything is open source. |
Harbin China |
Harbin Institute of Technology |
103 |
0 |
1100 |
784 |
71 |
Python,Go,Ruby,Rust |
0 |
0 |
CHEF-KOCH |
Android Vulnerabilities Overview - 研究员 CHEF-KOCH 整理的 Android 已知漏洞的情况总结: |
https://github.com/CHEF-KOCH/Android-Vulnerabilities-Overview |
https://github.com/microsoft |
Highly interested in PC games, demoscene and security-related topics. I worked for @microsoft and @NVIDIA over 15 years. - Since 2018 for NTT Security - |
Lausanne (づ。◕‿◕。)づ |
CKs Technology News |
103 |
0 |
2800 |
778 |
60 |
Python,C,Batchfile,JavaScript |
0 |
0 |
Mr-Un1k0d3r |
DKMC - 将 Payload 放到图片中实现免杀效果的工具: |
https://github.com/Mr-Un1k0d3r/DKMC |
https://github.com/MrUn1k0d3r |
Mostly Red Team tools for penetration testing. I think that Ron Jemery is a good ambassador for anything regarding penetration. Twitter - @MrUn1k0d3r |
None |
RingZer0 Team |
18 |
0 |
8 |
777 |
0 |
Python,Visual,PowerShell |
0 |
0 |
feicong |
Android&iOS&macOS安全工程师技能表 |
https://github.com/feicong/sec_skills |
https://zhuanlan.zhihu.com/android-sec |
《Android软件安全权威指南》已上市: https://item.jd.com/12522178.html http://product.dangdang.com/26485897.html 微信公众号:feicong_sec |
None |
None |
15 |
0 |
2400 |
776 |
82 |
Python,Objective-C,Shell |
343 |
77 |
asciimoo |
wuzz : Interactive cli tool for HTTP inspection : https://github.com/asciimoo/wuzz |
https://github.com/asciimoo/wuzz |
None |
|
Budapest, Hungary |
None |
65 |
0 |
161 |
764 |
84 |
Python,Go |
0 |
0 |
boy-hack |
gwhatweb: CMS识别 python gevent实现 |
https://github.com/boy-hack/gwhatweb |
https://www.hacking8.com/ |
Hacking tools just for fun ~ |
china |
None |
28 |
0 |
113 |
749 |
17 |
Python,JavaScript |
211 |
69 |
m4ll0k |
Spaghetti - Web 应用安全扫描器: |
https://github.com/m4ll0k/Spaghetti |
https://twitter.com/m4ll0k2 |
104,97,99,107,101,114,97,110,100&&112,114,111,103,114,97,109,109,101,114 |
127.0.0.1, Italy - Morocco |
localhost |
14 |
0 |
13 |
743 |
20 |
Python,Shell |
0 |
0 |
stanzhai |
程序员路上用到的各种优秀资料、神器及框架 |
https://github.com/stanzhai/be-a-professional-programmer |
https://stanzhai.site |
Like programming, focus on BigData |
Beijing, China |
Haizhi Holding Inc. |
79 |
0 |
1500 |
734 |
98 |
C#,Objective-C,JavaScript,HTML,Scala |
0 |
0 |
aozhimin |
第三届 MOSEC 移动安全技术峰会PPT下载: |
https://github.com/aozhimin/MOSEC-2017 |
https://twitter.com/aozhimin0811 |
📲 iOS Developer,🐍 Python Developer, 🔨 Reverse Engineer |
Shanghai, China |
None |
86 |
0 |
394 |
710 |
84 |
CSS |
1600 |
274 |
sunnyelf |
Cheetah:一款基于字典的webshell密码爆破工具 |
https://github.com/sunnyelf/cheetah/blob/master/README_zh.md |
https://github.com/Qihoo360 |
Information security researcher, CTF enthusiast. |
Beijing, China |
@Qihoo360 |
105 |
0 |
893 |
710 |
98 |
Python |
0 |
0 |
jpillora |
chisel : A fast TCP tunnel over HTTP : https://github.com/jpillora/chisel |
https://github.com/jpillora/chisel |
https://keybase.io/jpillora |
|
Sydney, Australia |
None |
241 |
0 |
1300 |
702 |
45 |
Go,JavaScript |
0 |
0 |
tyranid |
James Forshaw 在 ZeroNights 2017 会议关于滥用 Access Tokens Bypass UAC 的演讲: |
https://github.com/tyranid/ZeroNights2017/releases/tag/v1.0 |
None |
|
None |
None |
32 |
0 |
0 |
700 |
2 |
C#,Python,C |
0 |
0 |
zerosum0x0 |
koadic - 基于 JScript 实现的 Windows Rootkit,适用于 Windows 全版本: |
https://github.com/zerosum0x0/koadic |
https://zerosum0x0.blogspot.com |
|
USSA |
None |
83 |
0 |
23 |
696 |
2 |
Python,C#,C,C++ |
1300 |
362 |
vulnersCom |
nmap-vulners - 调用 Vulners.com API 抓取漏洞信息的 NSE 脚本: |
https://github.com/vulnersCom/nmap-vulners |
https://vulners.com |
New generation vulnerability intelligence database |
None |
Vulners |
15 |
0 |
6 |
687 |
0 |
Python,Lua,Java |
0 |
0 |
AlessandroZ |
BeRoot - Windows 本地提权工具,寻找本地机器配置上的疏漏实现提权: |
https://github.com/AlessandroZ/BeRoot |
None |
|
None |
None |
12 |
0 |
13 |
681 |
9 |
Python |
0 |
0 |
guillaume-chevalier |
LSTM-Human-Activity-Recognition: 基于 LSTM 的人类活动行为识别 |
https://github.com/guillaume-chevalier/LSTM-Human-Activity-Recognition |
https://github.com/Neuraxio |
e^(πi) + 1 = 0 |
Canada |
@Neuraxio |
78 |
0 |
508 |
681 |
132 |
Python,Jupyter |
0 |
0 |
nixawk |
Python poc for CVE-2017-5689 Intel AMT - |
https://github.com/nixawk/labs/blob/master/CVE-2017-5689/CVE-2017-5689.py |
None |
/kernel/ |
None |
None |
20 |
0 |
391 |
666 |
101 |
Python,Shell |
0 |
0 |
objective-see |
LuLu - objective-see 开源的一个 macOS 防火墙软件: |
https://github.com/objective-see/LuLu |
https://www.objective-see.com |
|
United States |
Objective-See |
11 |
0 |
0 |
644 |
0 |
Objective-C |
2900 |
142 |
Cryptogenic |
PS4-4.05-Kernel-Exploit - PS4 4.05 namedobj 内核完整的越狱 Exploit: https://github.com/Cryptogenic/PS4-4.05-Kernel-Exploit |
https://github.com/Cryptogenic/Exploit-Writeups/blob/master/PS4/%22NamedObj%22%204.05%20Kernel%20Exploit%20Writeup.md |
https://twitter.com/SpecterDev |
PHP/C++ developer with an interest in user-land and web exploitation. |
None |
None |
28 |
0 |
38 |
642 |
5 |
Go,C,JavaScript |
0 |
0 |
saelo |
用于重命名 iOS kernelcache function stubs 的 IDA Python 脚本: |
https://github.com/saelo/ida_scripts/blob/master/kernelcache.py |
http://twitter.com/5aelo |
|
Karlsruhe, Germany |
None |
31 |
0 |
207 |
638 |
4 |
Python,C,JavaScript |
646 |
113 |
3xp10it |
waf自动爆破(绕过)工具 |
https://github.com/3xp10it/bypass_waf |
http://3xp10it.cc |
|
None |
None |
143 |
0 |
278 |
637 |
391 |
Python,PHP |
543 |
210 |
Cyb3rWard0g |
The ThreatHunter Playbook - 专注威胁检测一个 GitHub 项目: |
https://github.com/Cyb3rWard0g/ThreatHunter-Playbook |
https://github.com/Cyb3rWard0g |
@Cyb3rWard0g |
None |
None |
10 |
0 |
19 |
636 |
2 |
Jupyter,PowerShell |
1400 |
336 |
lord |
slate: Beautiful static documentation for your API 项目文档编写助手 |
https://github.com/lord/slate |
https://lord.io |
Text input and editing for Fuchsia |
San Francisco |
Google |
93 |
0 |
291 |
635 |
58 |
JavaScript,Ruby,CSS,Rust |
27000 |
16700 |
xairy |
Linux 内核 UFO/非UFO 路径切换内存破坏漏洞的 PoC(CVE-2017-1000112): |
https://github.com/xairy/kernel-exploits/tree/master/CVE-2017-1000112 |
https://andreyknvl.com/ |
|
None |
None |
33 |
0 |
0 |
630 |
14 |
Python,C |
2300 |
552 |
mumuy |
browser: 获取当前浏览器信息 |
https://github.com/mumuy/browser |
https://passer-by.com |
Im just a passer-by |
Xiamen,China |
passer-by.com |
22 |
0 |
31 |
625 |
23 |
JavaScript |
1700 |
421 |
pwntester |
Struts2 S2-046 PoC |
https://github.com/pwntester/S2-046-PoC |
http://www.pwntester.com |
|
Madrid |
None |
70 |
0 |
5 |
624 |
16 |
C#,Java |
578 |
121 |
peter-iakovlev |
The source code of Telegram for iOS and Android is open and free. Enjoy! https://github.com/DrKLO/Telegram |
https://github.com/peter-iakovlev/Telegram |
None |
|
None |
None |
20 |
0 |
3 |
620 |
0 |
Objective-C,Swift,C |
2700 |
773 |
DhavalKapil |
libdheap - 动态注入到其他进程,检测 glibc 堆内存破坏问题的动态库: |
https://github.com/DhavalKapil/libdheap |
https://github.com/sdslabs |
Software Security Enthusiast & Software Developer; Past: GSoC 15 & 16, @sdslabs, @amzn, IIT Roorkee |
Atlanta, GA |
Georgia Tech |
43 |
0 |
255 |
619 |
95 |
Lua,C,Shell,JavaScript |
2400 |
266 |
travisgoodspeed |
借助 IDA Pro 逆向 MD380 固件: |
https://github.com/travisgoodspeed/md380tools/wiki/IDAPro |
None |
|
None |
None |
31 |
0 |
36 |
606 |
24 |
Python,C,C++ |
0 |
0 |
HackerFantastic |
GNS-3 Mac OS-X local root LPE in “ubridge” #0day - https://github.com/HackerFantastic/Public/blob/master/exploits/gns3super-osx.sh @ gns3 |
https://github.com/HackerFantastic/Public/blob/master/exploits/gns3super-osx.sh |
https://github.com/hackerhouse-opensource |
You can find my research and tools at Hacker House. |
127.0.0.1 |
Hacker House @hackerhouse-opensource |
12 |
0 |
21 |
601 |
159 |
C,TypeScript,Python,C++,Perl,Dockerfile |
0 |
0 |
lcatro |
如何使用Fuzzing挖掘ImageMagick的漏洞,作者同时公开了这个 Fuzzer 的代码: |
https://github.com/lcatro/Fuzzing-ImageMagick |
https://github.com/lcatro/my-blog |
Binary ,WEB vulnerability and Fuzzing Research .. |
China |
WeBank ,Tencent |
51 |
0 |
171 |
596 |
20 |
Python,PHP,Mask,C++ |
391 |
101 |
lrlna |
Garbage collection in V8, an illustrated guide: |
https://github.com/lrlna/sketchin/blob/master/guides/garbage-collection-in-v8.md |
https://github.com/mongodb |
|
Berlin, Germany |
@mongodb |
96 |
0 |
396 |
595 |
37 |
JavaScript |
0 |
0 |
kailashahirwar |
机器学习与深度学习工程师的必备手册: https://medium.com/@kailashahirwar/essential-cheat-sheets-for-machine-learning-and-deep-learning-researchers-efb6a8ebd2e5 Github: |
https://github.com/kailashahirwar/cheatsheets-ai |
https://github.com/MateLabs |
Co-founder at @MateLabs , Democratising Machine Learning and Deep Learning. |
Bangalore India |
@MateLabs |
10 |
0 |
229 |
577 |
18 |
Python |
12200 |
2900 |
netxfly |
x-crack: 常见服务的弱口令扫描器 |
https://github.com/netxfly/x-crack |
http://sec.lu |
|
China |
xsec |
21 |
0 |
2900 |
577 |
75 |
Go,Python |
346 |
150 |
coffeehb |
struts2_check: 识别目标网站是否采用Struts2框架 |
https://github.com/coffeehb/struts2_check |
None |
爱生活,爱安全。 |
None |
None |
183 |
0 |
168 |
571 |
73 |
Python,Objective-C |
982 |
623 |
Siguza |
昨天推送了研究员 v0rtex 公开的 iOS 11.2 IOSurfaceRootUserClient Port UAF 漏洞的完整 Exploit 代码( https://github.com/Siguza/v0rtex/blob/master/v0rtex.m ),今天他又写了一篇 Blog 谈这个漏洞: |
https://github.com/Siguza/v0rtex/blob/master/v0rtex.m |
https://siguza.net |
|
Switzerland |
None |
39 |
0 |
35 |
559 |
0 |
C,Objective-C |
0 |
0 |
ResolveWang |
weibospider: 新浪微博爬虫(分布式) |
https://github.com/ResolveWang/weibospider |
https://rookiefly.cn |
infra |
ChengDu |
SiChuan University |
169 |
0 |
1700 |
558 |
118 |
Python,C,Shell,Java |
0 |
0 |
Chan9390 |
Awesome-MitM - GitHub 上一些不错的网络中间人攻击框架收集: |
https://github.com/Chan9390/Awesome-MitM |
https://github.com/Hack-with-Github |
On my path to attain nirvana in security ! |
None |
@Hack-with-Github |
150 |
0 |
3700 |
553 |
206 |
Python,Go,HTML,CSS |
0 |
0 |
Cn33liz |
StarFighters- 基于 JavaScript 和 VBScript 的 Empire 攻击框架的进程 Launcher,无需启动 PowerShell.exe: |
https://github.com/Cn33liz/StarFighters#a-javascript-and-vbscript-based-empire-launcher---by-cn33liz-2017 |
https://twitter.com/Cneelis |
|
Groningen, the Netherlands |
None |
31 |
0 |
4 |
553 |
2 |
C#,Visual,JavaScript,C++ |
1100 |
293 |
dxa4481 |
XSSJacking : Abusing Self-XSS and Clickjacking to trigger XSS : |
https://github.com/dxa4481/XSSJacking |
https://security.love |
Full stack hacker |
USA |
None |
83 |
0 |
22 |
550 |
4 |
Python,HTML,JavaScript |
3600 |
444 |
vanhauser-thc |
hydra - 密码暴力破解工具: |
https://github.com/vanhauser-thc/thc-hydra |
https://www.mh-sec.de/ |
Security researcher since 1994 https://www.thc.org/ https://twitter.com/hackerschoice |
Berlin |
The Hackers Choice , mh-sec , me , myself |
20 |
0 |
27 |
548 |
13 |
Batchfile,C,HTML,C++ |
0 |
0 |
codingo |
VHostScan: HTTP Virtual Host Scanner |
https://github.com/codingo/VHostScan |
https://twitter.com/codingo_ |
Penetration tester from Australia. Current maintainer of NoSQLMap, VHostScan, Reconnoitre. Co-contributor to subfinder. |
Brisbane, Australia |
None |
137 |
0 |
1000 |
544 |
239 |
Python,Go |
0 |
0 |
macmade |
dyld_cache_extract - 从 macOS/iOS dyld_shared_cache 中提取动态库的工具: |
https://github.com/macmade/dyld_cache_extract |
http://www.xs-labs.com/ |
Lead Developer at imazing.com |
Switzerland |
XS-Labs |
178 |
0 |
89 |
527 |
52 |
Swift,Objective-C,Makefile,C |
596 |
112 |
EgeBalci |
Amber - 一种新的 PE 壳 - 反射式 PE 壳: https://pentest.blog/introducing-new-packing-method-first-reflective-pe-packer/ |
https://github.com/EgeBalci/Amber |
https://pentest.blog |
Cyber Security Researcher |
İstanbul, Turkey |
INVICTUS/PRODAFT |
80 |
0 |
953 |
526 |
115 |
Go,Ruby,Assembly,C++ |
0 |
0 |
tandasat |
.NET Native Code hook 技术及相应的工具: |
https://github.com/tandasat/DotNetHooking |
http://standa-note.blogspot.ca/ |
Engineer @standa_t |
Vancouver, Canada |
None |
56 |
0 |
16 |
524 |
3 |
C#,C++ |
0 |
0 |
maldevel |
canisrufus - 基于 Python 的 Windows 隐藏后门,使用 Github 作为命令和控制服务器: |
https://github.com/maldevel |
https://github.com/twelvesec |
code, pentests, redteaming, research |
Greece |
@twelvesec |
46 |
0 |
1100 |
522 |
1 |
Python,Shell |
340 |
122 |
bit4woo |
reCAPTCHA: 自动识别图形验证码的burp插件 |
https://github.com/bit4woo/reCAPTCHA |
http://code2sec.com/ |
Creating with coding,Learning by doing,Learning by sharing! |
shenzhen |
None |
111 |
0 |
755 |
521 |
122 |
Python,C#,Ruby,Java |
0 |
0 |
nneonneo |
Generate two PDFs with different contents but identical SHA1 hashes : |
https://github.com/nneonneo/sha1collider/blob/master/collide.py |
https://robertxiao.ca |
HCI researcher, CTF player. |
Vancouver, BC, Canada |
University of British Columbia |
81 |
0 |
23 |
510 |
1 |
Python |
752 |
440 |
averagesecurityguy |
Bypassing AntiVirus with Golang : https://averagesecurityguy.github.io/2017/01/06/bypassing-av-with-golang/ , Github : |
https://github.com/averagesecurityguy/scripts/blob/master/stealth.go |
http://averagesecurityguy.info |
|
None |
None |
43 |
0 |
9 |
509 |
3 |
Python,Go,C,Shell |
0 |
0 |
toolswatch |
blackhat-arsenal-tools - BlackHat 会议军火库涉及到的工具: |
https://github.com/toolswatch/blackhat-arsenal-tools |
https://vfeed.io |
Promoting security tools , Black Hat Arsenal Manager & Review Board Committee Chairman , Founder of @vfeed_io , Anti-conformist |
cloud |
vFeed IO |
7 |
0 |
15 |
506 |
4 |
Python |
0 |
0 |
jaybosamiya |
security-notes - jaybosamiya的安全学习笔记: |
https://github.com/jaybosamiya/security-notes |
https://www.jaybosamiya.com/ |
🦊 Software security researcher. PhD student at CMU. BTech (CSE) from IIT Roorkee. Open source dev. CTFer (PPP). Former president and editor of Geek Gazette. |
Pittsburgh, PA |
None |
58 |
0 |
599 |
501 |
148 |
Python,C,C++ |
0 |
0 |
fdiskyou |
kcshell:Simple #Python interactive assembly / #disassembly shell for various architecturesAuthor: @fdiskyou |
https://github.com/fdiskyou/kcshell |
http://deniable.org |
Shut Up and Hack. |
London, UK |
None |
60 |
0 |
146 |
500 |
30 |
Python,C,Shell,C++ |
0 |
0 |
0xbug |
Biu-framework 企业内网基础服务安全扫描框架 |
https://github.com/0xbug/Biu-framework/blob/master/README_zh.md |
None |
Biu~ |
404 |
None |
15 |
0 |
560 |
497 |
34 |
Python,Vue |
0 |
0 |
kgretzky |
obfusion - x86 汇编代码混淆工具: https://github.com/kgretzky/obfusion 作者还为此写了 3 篇 Blog: https://breakdev.org/x86-shellcode-obfuscation-part-1/ https://breakdev.org/x86-shellcode-obfuscation-part-2/ |
https://github.com/kgretzky/obfusion |
https://breakdev.org |
I do reverse engineering and C/C++ dev. A bit of blogging and mainly everything related to information security. |
None |
None |
11 |
0 |
56 |
494 |
0 |
Go,Python,C++ |
2300 |
370 |
vit9696 |
Lilu is a new MacOS kernel extension & framework to support patching kext, library & process. #CapstoneInside |
https://github.com/vit9696/Lilu |
None |
|
None |
None |
7 |
0 |
0 |
477 |
0 |
C,C++ |
0 |
0 |
brianwrf |
NagaScan: 一个简单的分布式WEB扫描器的设计与实践 |
https://github.com/brianwrf/NagaScan |
http://avfisher.win/ |
Security Researcher |
None |
None |
229 |
0 |
319 |
476 |
8 |
Python,Shell,Batchfile,Perl |
407 |
219 |
0x27 |
Leaked Linux.Mirai Source Code for Research/IoC Development Purposes |
https://github.com/0x27/linux.mirai |
http://0x27.me/ |
|
EIP |
None |
77 |
0 |
3000 |
475 |
34 |
Python,Go,C |
397 |
220 |
danielbohannon |
PowerShell Obfuscator |
https://github.com/danielbohannon/Invoke-Obfuscation |
http://danielbohannon.com |
Principal Applied Security Researcher (prev IR Consultant) |
Washington, D.C. |
Mandiant |
7 |
0 |
0 |
472 |
5 |
PowerShell |
0 |
0 |
Manisso |
Fsociety - 一款渗透测试框架: |
https://github.com/Manisso/fsociety |
https://github.com/Manisso |
One day youll leave this world behind So live a life you will remember |
Algiers, Algeria |
@Manisso |
26 |
0 |
0 |
470 |
1 |
Python |
0 |
0 |
tanjiti |
Python 编写的 IP/TCP/UDP数据包分析及解析 |
https://github.com/tanjiti/packet_analysis |
http://tanjiti.com/ |
#Network Security Monitor #threat intelligence #waf #ids #iOS App Security #Android App Security #game security |
shanghai |
baidu |
16 |
0 |
4 |
470 |
166 |
Python,PHP,HTML,Perl |
0 |
0 |
BrambleXu |
pydata-notebook: 利用Python进行数据分析 第二版 (2017) 中文翻译笔记 |
https://github.com/BrambleXu/pydata-notebook |
https://medium.com/@bramblexu |
An NLPer interested in Relation Extraction and Knowledge Graph Twitter: BrambleXu |
Tokyo |
None |
24 |
0 |
258 |
465 |
52 |
Jupyter |
2900 |
1100 |
Billy-Ellis |
Great work @ bellis1000 A collection of vulnerable ARM binaries for practicing exploit development |
https://github.com/Billy-Ellis/Exploit-Challenges |
https://zygosec.com |
iOS/ARM, Reverse Engineering, Exploit Development |
UK |
ZygoSec |
20 |
0 |
10 |
458 |
32 |
Logos,C,Objective-C,CSS |
618 |
133 |
joxeankoret |
Mal Tindex - 为二进制可执行文件建立索引的工具,基于 IDA,主要用于归类搜索恶意软件。这个工具来源于 Joxean Koret 在 EuskalHack 2017 会议的演讲《Call Graph Agnostic Malware Indexing 》: Github: https://github.com/joxeankoret/maltindex slides: |
https://github.com/joxeankoret/maltindex |
http://www.joxeankoret.com |
|
Basque Country |
None |
30 |
0 |
87 |
458 |
2 |
Python |
1300 |
207 |
kholia |
如何在 QEMU/KVM 虚拟机环境中安装 OS X El Capitan 和 macOS Sierra: |
https://github.com/kholia/OSX-KVM |
https://twitter.com/DhiruKholia |
|
None |
None |
75 |
0 |
2200 |
456 |
573 |
Python,Go,C,Shell,C++ |
0 |
0 |
williballenthin |
python-idb - 用于解析与分析 IDA 数据库文件(.idb)的纯 Python 工具: |
https://github.com/williballenthin/python-idb |
https://github.com/fireeye |
/usr/bin/nethack |
None |
@fireeye |
62 |
0 |
206 |
451 |
47 |
Python,Rust |
0 |
0 |
zodiacon |
KernelExplorer - 研究员 Pavel Yosifovich 开源的用于分析 Windows 内核的工具集,包括 MemMapView、ProcList、JobView 等多个子工具: |
https://github.com/zodiacon/KernelExplorer |
http://scorpiosoftware.net |
|
None |
None |
50 |
0 |
99 |
448 |
8 |
C#,C |
0 |
0 |
phunterlau |
写给白帽子的数据科学手册 |
https://github.com/phunterlau/data_science_for_whitehat |
None |
|
North Korea |
None |
35 |
0 |
526 |
445 |
3 |
TeX,Python,Shell,OpenEdge |
232 |
65 |
Lucifer1993 |
AngelSword: 漏洞检测框架 |
https://github.com/Lucifer1993/AngelSword |
None |
安全圈职业炮灰 |
None |
None |
25 |
0 |
315 |
444 |
25 |
Python,Ruby |
897 |
403 |
wtsxDev |
Malware-Analysis - 恶意软件分析工具和资源列表: |
https://github.com/wtsxDev/Malware-Analysis |
http://www.kalitut.com |
Penetration Testing |
None |
None |
18 |
0 |
2 |
444 |
0 |
Python,JavaScript |
3800 |
460 |
amaneureka |
AtomOS : A new hobby OS from “scratch” in C# (Monolithic Kernel based x86) : https://github.com/amaneureka/AtomOS |
https://github.com/amaneureka/AtomOS |
https://github.com/reactos |
Programmer , Hacker , GSoC16 @reactos , I ❤ Programming , Follow me on Twitter @amaneureka |
India |
AP |
16 |
0 |
27 |
442 |
3 |
C#,Python,C,JavaScript,C++ |
0 |
0 |
dweinstein |
awesome-frida - 由 Frida 提供的项目、库以及工具的列表: |
https://github.com/dweinstein/awesome-frida |
https://gitlab.com/dweinstein |
Im focused on applied security research, mainly on mobile platforms. |
@insitusec |
NowSecure |
265 |
0 |
2300 |
435 |
1200 |
Python,JavaScript,Java,Rust |
0 |
0 |
hugsy |
New #BinaryNinja plugin to decompile binary/functions using @ RetDec : https://github.com/hugsy/binja-retdec |
https://github.com/hugsy/binja-retdec |
https://twitter.com/_hugsy_ |
Yet another blah cat |
https://blahcat.github.io |
None |
29 |
0 |
559 |
435 |
87 |
Python,C,JavaScript |
0 |
0 |
MarioVilas |
WinAppDbg v1.6 is out! |
https://github.com/MarioVilas/winappdbg/releases/tag/winappdbg_v1.6 |
http://breakingcode.wordpress.com/ |
|
Madrid, Spain |
None |
27 |
0 |
1700 |
429 |
581 |
Python,C |
557 |
313 |
We5ter |
Awesome-Platforms |
https://github.com/We5ter/Awesome-Platforms |
https://lightrains.org |
You are being watched. Anywhere. Anytime. |
Chengdu,China |
None |
11 |
0 |
1200 |
426 |
108 |
Python,CSS |
0 |
0 |
Bo0oM |
Chrome 62 版本修复的 UXSS with MHTML(CVE-2017-5124)漏洞的分析和 PoC,分析部分是俄语: https://bo0om.ru/chrome-and-safari-uxss |
https://github.com/Bo0oM/CVE-2017-5124/ |
https://github.com/ONsec-Lab |
https://twitter.com/i_bo0om |
None |
@ONsec-Lab @wallarm |
18 |
0 |
241 |
421 |
13 |
Python,HTML,PHP |
0 |
0 |
qazbnm456 |
Web安全资料和资源列表 |
https://github.com/qazbnm456/awesome-web-security#introductions-xss |
https://github.com/qazbnm456 |
See my posts :) https://medium.com/@qazbnm456 |
Taiwan |
None |
96 |
0 |
1100 |
419 |
20 |
Python,JavaScript |
0 |
0 |
unamer |
VMware Escape Exploit before VMware WorkStation 12.5.5 |
https://github.com/unamer/vmware_escape |
https://nonick.me/ |
<script>alert(Hello world)</script> |
C:\Windows\ |
None |
39 |
0 |
27 |
418 |
4 |
Python,C,CSS,C++ |
0 |
0 |
Ekultek |
whatwaf - 检测并绕过 Web 应用程序防火墙及防护系统: https://t.co/HnELtLJYaD |
https://github.com/Ekultek/WhatWaf |
None |
U3VjY2VzcyBpcyBpbiB0aGUgZXllIG9mIHRoZSBiZWhvbGRlci4= |
None |
None |
87 |
0 |
121 |
414 |
11 |
Python |
0 |
0 |
pfalcon |
ScratchABit (1.7) : Easily retargetable and hackable interactive disassembler with IDAPython-compatible plugin API : |
https://github.com/pfalcon/ScratchABit |
None |
|
None |
None |
156 |
0 |
1200 |
410 |
123 |
Python,C,Makefile,C++ |
0 |
0 |
secmobi |
The Underground Economy of AppleID : |
https://github.com/secmobi/slides/blob/master/2017.UndergroundEconomyAppleID_BSidesSF.pdf |
None |
|
None |
None |
11 |
0 |
1300 |
400 |
97 |
|
0 |
0 |
ChALkeR |
收集 NPM 弱密码的多种方式介绍: |
https://github.com/ChALkeR/notes/blob/master/Gathering-weak-npm-credentials.md |
https://twitter.com/skovorodan |
|
Moscow |
None |
141 |
0 |
234 |
398 |
29 |
JavaScript |
0 |
0 |
Arno0x |
DNSExfiltrator - 通过 DNS 请求进行数据传输: |
https://github.com/Arno0x/DNSExfiltrator |
None |
|
None |
None |
32 |
0 |
22 |
391 |
0 |
Python,JavaScript,PowerShell,C++,HTML |
314 |
98 |
tiimgreen |
github-cheat-sheet : A list of cool features of Git and GitHub : |
https://github.com/tiimgreen/github-cheat-sheet |
None |
|
London |
None |
41 |
0 |
339 |
387 |
31 |
Python,JavaScript,Ruby,CSS |
28200 |
4300 |
ptresearch |
Positive Research 昨天公开了一篇关于 Intel ME 引擎的研究 Paper:《Inside Intel Management Engine》: |
https://github.com/ptresearch/IntelME-JTAG/blob/master/Inside_Intel_Management_Engine.pdf |
None |
|
None |
Positive Research Team |
13 |
0 |
1 |
385 |
0 |
Python |
470 |
143 |
hatRiot |
除了内核中的利用,Token Privileges 可以在攻击服务时被滥用实现本地提权: |
https://github.com/hatRiot/token-priv/blob/master/abusing_token_eop_1.0.txt |
http://hatriot.github.io |
|
Seattle |
FusionX |
22 |
0 |
42 |
382 |
1 |
Python,C++ |
916 |
293 |
az0ne |
AZSpider: 高性能分布式爬虫,基于Flask 数据库采用MongoDB 分布式采用Redis |
https://github.com/az0ne/AZSpider/blob/master/AZSpider_.rar |
http://az0ne.lofter.com |
|
China |
ANTIY |
321 |
0 |
967 |
379 |
32 |
Python,JavaScript,Lua,HTML,Go,PowerShell |
377 |
171 |
CaledoniaProject |
WordPress Plugin Security Testing Cheat Sheet 插件代码审计列表 |
https://github.com/CaledoniaProject/wordpress_plugin_security_testing_cheat_sheet |
None |
|
BeiJing, China |
Security Architect |
1300 |
0 |
205 |
378 |
109 |
Java,Python,C++,Perl,C#,CSS |
192 |
72 |
CoolerVoid |
Web security tool to make fuzzing at HTTP, Beta |
https://github.com/CoolerVoid/0d1n/ |
http://funguscodes.blogspot.com.br/ |
Just another computer programmer, twitter: @Cooler_freenode |
brazil - sao paulo |
None |
67 |
0 |
177 |
378 |
101 |
C,C++ |
0 |
0 |
rasta-mouse |
New tool: |
https://github.com/rasta-mouse/Sherlock |
https://github.com/ZeroPointSecurity |
|
None |
@ZeroPointSecurity |
20 |
0 |
58 |
377 |
7 |
C#,PowerShell |
0 |
0 |
tengzhangchao |
网站物理路径搜索工具 |
https://github.com/tengzhangchao/SearchWebPath |
https://thief.one |
Information Security Engineer |
china |
None |
62 |
0 |
437 |
377 |
36 |
Python,Go,Java |
0 |
0 |
fate0 |
pastebot: 监控 pastebin 的敏感内容并发微博的 bot |
https://github.com/fate0/pastebot |
http://www.fatezero.org |
time waits for no one |
China |
None |
15 |
0 |
4 |
376 |
5 |
Python,C,PHP,HTML |
0 |
0 |
rshipp |
恶意软件分析大合集 |
https://github.com/rshipp/awesome-malware-analysis/blob/master/%E6%81%B6%E6%84%8F%E8%BD%AF%E4%BB%B6%E5%88%86%E6%9E%90%E5%A4%A7%E5%90%88%E9%9B%86.md |
https://rshipp.com |
Software engineer, infosec hobbyist. |
None |
None |
107 |
0 |
1500 |
376 |
12 |
Python |
0 |
0 |
0x09AL |
raven - Linkedin 信息收集工具: |
https://github.com/0x09AL/raven |
https://twitter.com/0x09AL |
|
None |
None |
94 |
0 |
114 |
372 |
19 |
Go,Python,Ruby,C++ |
0 |
0 |
Idnan |
bash-guide : A guide to learn bash : |
https://github.com/Idnan/bash-guide |
http://adnanahmed.info/ |
I write code, read code, talk about code, and other stuff that developers do with code. |
Dubai, United Arab Emirates |
tajawal |
31 |
0 |
621 |
370 |
32 |
Shell,JavaScript,HTML |
0 |
0 |
xorrior |
远程调用 Mimikatz 的 PowerShell 脚本 : |
https://github.com/xorrior/RandomPS-Scripts/blob/master/Invoke-RemoteMimikatz.ps1 |
https://www.xorrior.com |
PowerShell, C#, Obj-C, macOS Security, Red Team Operator |
None |
SpecterOps |
53 |
0 |
93 |
369 |
9 |
C#,Objective-C,PowerShell,C++ |
0 |
0 |
angryziber |
ipscan: Angry IP Scanner |
https://github.com/angryziber/ipscan |
http://photos.azib.net |
|
Estonia |
Codeborne |
23 |
0 |
13 |
366 |
0 |
Kotlin,Java |
274 |
49 |
secrary |
makin - 用于探测恶意样本反调试技术的工具: |
https://github.com/secrary/makin |
https://secrary.com |
@_qaz_qaz |
https://keybase.io/khasaia |
None |
17 |
0 |
197 |
363 |
21 |
Python,C,C++ |
0 |
0 |
humphd |
An absolute beginners guide to Machine Learning and Image Classification with Neural Networks : |
https://github.com/humphd/have-fun-with-machine-learning |
http://twitter.com/humphd |
CS prof in the Centre for Development of Open Technology (CDOT) at Seneca College. Developer with Mozilla. |
Canada |
None |
165 |
0 |
100 |
361 |
1 |
Python,JavaScript,Dockerfile,HTML |
0 |
0 |
mjg59 |
I modified Intels sample AMT code to tell you whether AMT is provisioned on Linux systems: |
https://github.com/mjg59/mei-amt-check |
https://github.com/google |
|
Oakland |
@google |
74 |
0 |
2 |
359 |
0 |
Python,C |
642 |
255 |
beefproject |
BeEF now supports persistent hooking in IE 11 using an invisible HTMLFile ActiveX object |
beefproject/beef#1364 |
http://beefproject.com |
|
None |
None |
1 |
0 |
1 |
358 |
0 |
JavaScript |
4300 |
1000 |
secmob |
蝴蝶效应与程序错误 - 一个渣洞的利用之旅(CVE-2016-9651),介绍了 Gong Guang 如何利用 V8 对象私有属性的逻辑漏洞(利用对象赋值)->越界读(unescape)->越界写(堆风水)->任意地址读写(改写 JITted Code Buffer)->任意代码执行的过程,整个过程非常巧妙: |
https://github.com/secmob/pwnfest2016 |
https://github.com/OldFresher |
twitter @OldFresher |
None |
None |
9 |
0 |
4 |
355 |
3 |
HTML,C++ |
152 |
78 |
certsocietegenerale |
恶意软件分析平台 FAME,来自 VirusTotal VB2017 会议的公开的一个分析系统: https://www.virusbulletin.com/uploads/pdf/magazine/2017/201710-FAME.pdf https://certsocietegenerale.github.io/fame/ |
https://github.com/certsocietegenerale/fame |
https://cert.societegenerale.com/en/contact.html |
|
None |
Société Générale |
10 |
0 |
3 |
354 |
0 |
Python,C#,JavaScript |
1100 |
342 |
LoRexxar |
Cobra-W: 白盒源代码审计工具-白帽子版 |
https://github.com/LoRexxar/Cobra-W |
http://lorexxar.cn |
Vidar-Team/Knownsec 404-Team hacker or developer? who care |
None |
None |
44 |
0 |
277 |
352 |
18 |
Python |
0 |
0 |
cldrn |
macphish - 生成 Office for Mac 宏 Payload 的工具: |
https://github.com/cldrn/macphish |
https://github.com/nmap |
Network security specialist , Open Source contributor , @nmap NSE developer , OWASP IoT Goat Project Leader , Chapter leader of @owasp_riviera |
Mexico city |
Websec |
39 |
0 |
44 |
352 |
37 |
Python,Lua,Batchfile,HTML |
0 |
0 |
DamonMohammadbagher |
NativePayload_DNS - 通过 DNS 流量传输后门载荷以绕过反病毒软件的 C# 代码示例: |
https://github.com/DamonMohammadbagher/NativePayload_DNS |
https://www.linkedin.com/in/damon-mohammadbagher-2b154484 |
Security Researcher 🇮🇷 https://twitter.com/_Damon_M_ |
None |
None |
18 |
0 |
43 |
351 |
0 |
C#,Shell |
0 |
0 |
ecthros |
uncaptcha - 对抗 Google 音频验证码的工具,介绍中称有 85% 的正确率: |
https://github.com/ecthros/uncaptcha |
None |
University of Maryland |
None |
None |
27 |
0 |
86 |
349 |
113 |
Python |
0 |
0 |
GoSSIP-SJTU |
孤挺花(Armariris): 基于LLVM的支持多平台多语言的混淆器 |
https://github.com/GoSSIP-SJTU/Armariris |
https://loccs.sjtu.edu.cn/wiki/doku.php?id=gossipwiki |
Group of Software Security In Progress (GoSSIP) 小组,来自上海交通大学密码与计算机安全实验室(LoCCS)的活跃的学术安全团队 |
Shanghai, China |
Shanghai Jiao Tong University |
9 |
0 |
0 |
344 |
0 |
TeX,C,Assembly,C++ |
491 |
130 |
BlackHole1 |
Fastener: Web版在线Webshell管理工具 |
https://github.com/BlackHole1/Fastener |
https://github.com/alo7 |
Security oriented front-end developers |
ShangHai |
@alo7 |
77 |
0 |
294 |
338 |
53 |
Go,PHP,Java,JavaScript |
0 |
0 |
cr0hn |
“Docker security analysis tools” #docker #security #devops #devsecops |
https://github.com/cr0hn/dockerscan?utm_content=buffer1bf02&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer |
https://es.linkedin.com/in/garciagarciadaniel |
Security researcher, pentester, source code analyst & secure development, DevSecOps, Python developer and OWASP Madrid Chapter leader |
Madrid |
None |
95 |
0 |
30 |
336 |
9 |
Python,JavaScript |
829 |
137 |
lionsoul2014 |
ip2region: 准确率99.9%的IP地址定位库 |
https://github.com/lionsoul2014/ip2region |
http://yuanyu.ai |
Technology Enthusiasm Geek, Full Stack Developer. Web system architecture, NLP, Machine learning |
shenzhen, China |
@原语智能 |
5 |
0 |
90 |
336 |
6 |
C,Java |
6400 |
1100 |
cyrus-and |
mysql-unsha1 : Authenticate against a MySQL server without knowing the cleartext password : |
https://github.com/cyrus-and/mysql-unsha1 |
https://cardaci.xyz |
uid=0(root) gid=0(root) groups=0(root) |
Pisa / Tuscany / Italy |
None |
31 |
0 |
163 |
335 |
7 |
Python,C,HTML,JavaScript,PHP |
0 |
0 |
4w4k3 |
A Reverse Engineering Tool for py2exe applications. |
https://github.com/4w4k3/rePy2exe |
https://twitter.com/4w4k3Official |
Security Enthusiast, Python Coder, Lover of freedom. |
None |
None |
12 |
0 |
3 |
334 |
0 |
Python,C++ |
435 |
246 |
nihilus |
IDA 的 GUID/UUID Finder 插件: |
https://github.com/nihilus/GUID-Finder |
http://www.unixrus.se |
|
Sweden |
None |
432 |
0 |
17 |
331 |
22 |
Python,C,C++ |
173 |
47 |
derhuerst |
Tunnel TCP Through WebSockets (CLI Tool) |
https://github.com/derhuerst/tcp-over-websockets#tcp-over-websockets |
https://github.com/Bahn-X |
Making urban infrastructure more accessible & machine-readable using JavaScript. http://pronoun.is/he https://patreon.com/derhuerst |
Berlin |
@Bahn-X |
439 |
0 |
3900 |
330 |
128 |
TypeScript,JavaScript |
0 |
0 |
mbeaudru |
Modern JavaScript Cheatsheet: |
https://github.com/mbeaudru/modern-js-cheatsheet |
https://twitter.com/mbeaudru |
Javascript ecosystem, React and functionnal programming enthusiast |
None |
None |
32 |
0 |
341 |
329 |
9 |
JavaScript,HTML |
0 |
0 |
opsnull |
和我一步步部署 kubernetes 集群 |
https://github.com/opsnull/follow-me-install-kubernetes-cluster |
https://blog.opsnull.com |
Yet another hacker! |
Beijing |
4paradigm |
60 |
0 |
892 |
325 |
152 |
Go,Shell,Emacs,C++ |
0 |
0 |
mdsecactivebreach |
RDPInception: A proof of concept for the RDP Inception Attack |
https://github.com/mdsecactivebreach/RDPInception |
https://github.com/mdsecresearch |
MDSecs ActiveBreach Team |
Ring 0 |
@mdsecresearch |
17 |
0 |
3 |
320 |
0 |
Python,C#,Visual,Batchfile |
754 |
161 |
cryptolok |
GhostInTheNet - 使 Linux 变成网络中的幽灵主机,以防御 MITM/DOS/Scan 等攻击探测方式: |
https://github.com/cryptolok/GhostInTheNet |
https://twitter.com/cryptolok |
trainer, hacker, OSCP, researcher, engineer, cypherpunk : #crypto #stegano #stealth #opsec #comsec #datasec #infosec #osint #pentest #redteam #unix #hardware |
Paris, France |
None |
20 |
0 |
0 |
319 |
0 |
Python,Shell |
285 |
84 |
hannob |
PHP Crashers |
https://github.com/hannob/php-crashers |
https://hboeck.de/ |
|
Berlin |
None |
79 |
0 |
2 |
318 |
2 |
Python,Shell,PHP |
1400 |
150 |
jobertabma |
ground-control: 调试 SSRF / BLIND XSS / XXE 漏洞的脚本收集: |
https://github.com/jobertabma/ground-control |
None |
|
San Francisco / Groningen |
HackerOne |
12 |
0 |
2 |
318 |
0 |
Shell,Ruby,JavaScript |
337 |
77 |
Tuhinshubhra |
RED_HAWK - 基于PHP编写的集信息收集、SQL漏洞扫描与爬虫于一体的渗透测试工具: |
https://github.com/Tuhinshubhra/RED_HAWK |
https://twitter.com/r3dhax0r |
I code and hack for fun! |
... |
None |
13 |
0 |
2 |
316 |
0 |
Python,PHP,JavaScript,CSS |
0 |
0 |
re4lity |
subTee gists code backups |
https://github.com/re4lity/subTee-gits-backups |
https://github.com/PolarisLab |
@PolarisLab & MottoIN |
ShangHai |
PolarisLab |
710 |
0 |
2700 |
312 |
101 |
C#,PowerShell,C++ |
0 |
0 |
LordNoteworthy |
al-khaser - 恶意软件常用的虚拟机、模拟器、调试器、沙箱探测技术收集: |
https://github.com/LordNoteworthy/al-khaser |
https://twitter.com/LordNoteworthy |
Khwi Rassek. |
Morocco |
None |
7 |
0 |
378 |
310 |
53 |
C,CSS,C++ |
0 |
0 |
tinysec |
JSRT - 研究员 tinysec 开源的一个 JavaScript 运行时,利用 JSRT 可实现 JS 代码的执行以及与 Windows Native 代码的交互: |
https://github.com/tinysec/jsrt |
https://blog.tinysec.net |
Windows Kernel Researcher |
moon |
you can guess |
8 |
0 |
4 |
310 |
0 |
C,JavaScript,Assembly |
0 |
0 |
api0cradle |
Bypass AppLocker 的 30 种方法: |
https://github.com/api0cradle/UltimateAppLockerByPassList |
https://oddvar.moe |
|
None |
None |
65 |
0 |
60 |
309 |
8 |
PowerShell,C++,XSLT |
0 |
0 |
ufrisk |
PCILeech 2.0 released! - Mount Live RAM and Target File System over PCIe DMA! Makes pwning super easy ? |
https://github.com/ufrisk/pcileech |
None |
IT-Security Minion , DMA Hacker , @UlfFrisk |
Sweden |
None |
15 |
0 |
68 |
307 |
15 |
Python,C,Verilog |
0 |
0 |
JnuSimba |
Linux 二进制安全学习笔记 |
https://github.com/JnuSimba/LinuxSecNotes |
http://blog.csdn.net/jnu_simba |
Security engineer and developer |
ShenZhen, China |
Tencent |
12 |
0 |
74 |
303 |
54 |
C,C++ |
396 |
174 |
countercept |
doublepulsar-c2-traffic-decryptor: 网络层检测DOUBLEPULSAR攻击 |
https://github.com/countercept/doublepulsar-c2-traffic-decryptor |
https://github.com/countercept |
|
UK, New York, South Africa, Singapore |
@countercept |
18 |
0 |
0 |
296 |
0 |
Python,C,Shell |
922 |
321 |
worawit |
Eternalchampion SMB 漏洞(MS17-010)的多个 PoC: |
https://github.com/worawit/MS17-010 |
None |
|
Thailand |
None |
3 |
0 |
6 |
295 |
0 |
Python,Go,C |
1100 |
629 |
CalebFenton |
利用 dex-oracle 工具处理 Android 恶意软件的反混淆问题: https://rednaga.io/2017/10/28/hacking-with-dex-oracle-for-android-malware-deobfuscation/ |
https://github.com/CalebFenton/dex-oracle |
https://github.com/Sentinel-One |
I break stuff to make it better. |
Union City, CA |
@Sentinel-One |
27 |
0 |
115 |
294 |
26 |
YARA,Ruby,Java,Smali |
0 |
0 |
mazen160 |
struts-pwn_CVE-2017-9805: S2-052 漏洞利用脚本: |
https://github.com/mazen160/struts-pwn_CVE-2017-9805 |
https://mazinahmed.net |
Information Security Specialist / Penetration Tester |
None |
None |
15 |
0 |
0 |
294 |
0 |
Python,Shell |
341 |
119 |
foospidy |
fuzz payload |
https://github.com/foospidy/payloads/ |
http://pxmx.io |
Human |
Internet |
None |
75 |
0 |
321 |
292 |
50 |
Python,Shell |
0 |
0 |
Te-k |
I have uploaded the source code and binaries of #FinSpy dumped by @ fleximinx on github : |
https://github.com/Te-k/flexidie |
https://www.randhome.io |
|
None |
None |
60 |
0 |
135 |
288 |
104 |
Python,YARA,C |
785 |
769 |
0x4D31 |
Deception-as-Detection - 基于欺骗的检测技术: |
https://github.com/0x4D31/deception-as-detection |
https://github.com/salesforce |
Lead Threat Detection Engineer @salesforce |
Sydney, Australia |
None |
19 |
0 |
1100 |
285 |
77 |
Python,Go |
0 |
0 |
vitalysim |
Awesome-Hacking-Resources : |
https://github.com/vitalysim/Awesome-Hacking-Resources |
None |
|
None |
None |
13 |
0 |
59 |
280 |
8 |
Go,JavaScript,HTML |
8100 |
1100 |
wireghoul |
graudit - Bash 实现的源代码安全漏洞扫描器,可自定义漏洞的判断规则: |
https://github.com/wireghoul/graudit |
http://www.justanotherhacker.com |
www.justanotherhacker.com |
Melbourne, Australia |
None |
45 |
0 |
92 |
280 |
41 |
C,Shell,Perl |
559 |
134 |
FanhuaandLuomu |
geetest_break: 极验验证码破解-源码+手册 |
https://github.com/FanhuaandLuomu/geetest_break |
https://github.com/soochow |
My research interest is Machine Learning, Deep Learning and NLP. |
suzhou |
@soochow University;@iqiyi |
103 |
0 |
201 |
276 |
20 |
Python |
0 |
0 |
tintinweb |
scapy-ssl_tls - 基于 scapy 的 SSL / TLS 层交互式数据包操作工具: |
https://github.com/tintinweb/scapy-ssl_tls |
http://www.oststrom.com |
breaks your things ❤ |
None |
None |
55 |
0 |
83 |
274 |
22 |
Python,HTML,JavaScript |
0 |
0 |
iBearcat |
S2-055 反序列化漏洞Exploit CVE-2017-7525 |
https://github.com/iBearcat/S2-055 |
https://twitter.com/d9g3gg |
Email: d9g3gg@gmail.com |
China |
Liberal profession |
48 |
0 |
2500 |
272 |
274 |
C,PHP,Java |
0 |
0 |
nladuo |
淘宝文胸商品评论内容爬取与简单分析 |
https://github.com/nladuo/taobao_bra_crawler |
http://nladuo.github.io |
A full-stack programer. Also a CS Ph.D candidate in Information Retrieval and Natural Language Processing. |
BeiJing,China |
ICT, UCAS. |
47 |
0 |
285 |
270 |
41 |
C,Jupyter,Python,C++,Go,Java |
0 |
0 |
aalhour |
awesome-compilers : A curated list of awesome resources on Compilers, Interpreters and Runtimes : |
https://github.com/aalhour/awesome-compilers |
https://github.com/trustyou |
Software Author. Data Juggler. (Martial) Artist. A well-versed tinkerer in many digital crafts, currently hyped distributed systems and big data processing! |
Munich, Germany |
@trustyou |
157 |
0 |
1300 |
264 |
173 |
C#,Python,Shell,Assembly |
0 |
0 |
graniet |
Inspector : Privilege Escalation unix helper (Forensics, Kernel exploit list, process) : |
https://github.com/graniet/Inspector |
https://twitter.com/graniet75 |
French security researcher, PoC terminator, coder of various tools,PHP Tokenizer, OSINT lover, creator of Operative Framework |
\xFF\xFF\xFF\xFF |
myAwakening |
23 |
0 |
143 |
259 |
9 |
Go,Python,CSS |
0 |
0 |
maurosoria |
Web path scanner |
https://github.com/maurosoria/dirsearch |
None |
|
Argentina |
None |
1 |
0 |
161 |
255 |
24 |
Python |
2300 |
629 |
rxwx |
CVE-2017-11882 漏洞利用脚本,无需使用 WebDAV: |
https://github.com/rxwx/CVE-2017-11882/blob/master/packager_exec_CVE-2017-11882.py |
https://twitter.com/buffaloverflow |
|
UK |
NCC Group |
19 |
0 |
1 |
255 |
0 |
Python,C# |
0 |
0 |
ScottyBauer |
研究员 ScottyBauer 在其 GitHub Repo Android_Kernel_CVE_POCs 中新添加了几个远程 WiFi 漏洞的 PoC: |
https://github.com/ScottyBauer/Android_Kernel_CVE_POCs/tree/master/wifi |
https://plzdonthack.me |
|
Indiana |
Qualcomm |
15 |
0 |
8 |
254 |
8 |
TeX,C |
594 |
201 |
brandonprry |
wicked_cool_shellscripts_2e: PART DEUX!!! Full shell scripts for the 2nd edition of Wicked Cool Shell Scripts - |
https://github.com/brandonprry/wicked_cool_shell_scripts_2e |
https://volatileminds.net |
Working so hard to make it easier |
Austin, TX |
None |
39 |
0 |
0 |
254 |
0 |
C#,Shell,HTML |
234 |
145 |
huntergregal |
MimiPenguin - Dumping cleartext credentials from memory on Linux hosts |
https://github.com/huntergregal/mimipenguin |
http://huntergregal.com |
Security Researcher |
None |
None |
41 |
0 |
173 |
254 |
40 |
Python,C,Shell,PowerShell |
2400 |
480 |
Z-0ne |
SCADA-Rules: 工控网络通信协议中基于Snort构建报警规则 |
https://github.com/Z-0ne/SCADA-Rules |
http://plcscan.org/ |
专注于工控安全攻防技术研究 & ICS/SCADA Security, SCADA/PLC Scanning and Census & BeaconLab |
China |
BeaconLab |
6 |
0 |
584 |
253 |
261 |
Python,Lua |
39 |
21 |
hlldz |
|
https://github.com/hlldz/Invoke-Phant0m. |
https://artofpwn.com |
Pwner, Red Teamer |
İstanbul, Türkiye |
None |
5 |
0 |
186 |
249 |
23 |
Python,PowerShell,C++ |
0 |
0 |
koalaman |
shellcheck, a static analysis tool for shell scripts https://github.com/koalaman/shellcheck // \o/ |
https://github.com/koalaman/shellcheck |
https://www.vidarholen.net |
|
None |
None |
10 |
0 |
9 |
248 |
2 |
Shell,Haskell,JavaScript,CSS |
14600 |
736 |
bhdresh |
CVE-2017-0199Python script to #exploit Microsoft RTF #RCE Author: @ bhdresh #meterpreter |
https://github.com/bhdresh/CVE-2017-0199 |
None |
This is a personal repository. Tools/opinions/comments are my own and not of my employer. |
None |
Personal repository |
11 |
0 |
10 |
247 |
1 |
Python,C#,CSS |
572 |
267 |
DrizzleRisk |
drizzleDumper: 一款基于内存搜索的Android脱壳工具 |
https://github.com/DrizzleRisk/drizzleDumper |
None |
|
Beijing |
None |
79 |
0 |
24 |
246 |
2 |
Python,Makefile,C++ |
1400 |
368 |
blacktop |
docker-cuckoo: Cuckoo Sandbox Dockerfile |
https://github.com/blacktop/docker-cuckoo |
https://github.com/maliceio |
|
Nowheresville |
@maliceio |
89 |
0 |
167 |
240 |
18 |
Go,Python,Shell,Bro |
0 |
0 |
johngrib |
VimGameCodeBreak - VIM 编译器里也能玩游戏: |
https://github.com/johngrib/vim-game-code-break |
https://github.com/Artifriends-inc |
기계인간 John Grib, 이종립 |
Seoul, South Korea |
@Artifriends-inc |
85 |
0 |
68 |
240 |
9 |
JavaScript,Vim |
1400 |
37 |
r0oth3x49 |
Xpath Automated SQL Injection |
https://github.com/r0oth3x49/Xpath |
https://r0oth3x49.herokuapp.com |
Python & Info Sec lover. |
Pakistan |
None |
9 |
0 |
0 |
238 |
0 |
Python |
0 |
0 |
adtac |
autovpn : Automatically connect to a VPN in a country of your choice : |
https://github.com/adtac/autovpn |
https://adtac.in/ |
|
None |
None |
31 |
0 |
18 |
234 |
0 |
Go,Zig |
0 |
0 |
b-mueller |
Android 应用安全检查清单: |
https://github.com/b-mueller/android_app_security_checklist/blob/master/README.md |
https://github.com/ConsenSys |
Coder, researcher, security dude. |
Chiang Mai, Thailand |
@ConsenSys |
73 |
0 |
169 |
233 |
29 |
Python,JavaScript,HTML |
0 |
0 |
cherryljr |
PanDownload: 网盘下载器,支持百度云不限速度 |
https://github.com/cherryljr/PanDownload |
None |
人生は、先の見えない航海です |
Japan; China |
None |
7 |
0 |
4 |
233 |
3 |
Java |
0 |
0 |
jseidl |
Babadook — PowerShell 编写的一个无连接弹性后门: |
https://github.com/jseidl/Babadook |
http://wroot.org |
|
Rio de Janeiro - Brazil |
None |
30 |
0 |
12 |
232 |
17 |
Python,Shell,Java,PowerShell |
463 |
230 |
zcgonvh |
MS16-032: MS16-032(CVE-2016-0099)提权工具 |
https://github.com/zcgonvh/MS16-032 |
http://www.zcgonvh.com |
Window and .net |
None |
None |
8 |
0 |
0 |
232 |
1 |
C#,C,Ruby,C++ |
88 |
45 |
anshumanbh |
git-all-secrets - 通过利用多个开源 git 搜索工具来捕获所有 git 仓库中的敏感数据的工具: |
https://github.com/anshumanbh/git-all-secrets |
None |
Automatically secure all the things! |
None |
None |
72 |
0 |
192 |
231 |
119 |
Go,Python,Shell,HCL |
602 |
115 |
tatsuyah |
Udacity 学习平台上的一个自动驾驶课程 Demo:利用机器学习和计算机视觉技术检测车辆: |
https://github.com/tatsuyah/vehicle-detection |
https://github.com/OryLab |
R&D Director at @OryLab Inc. Software Engineer/Machine Learning Engineer. Style matters. |
Tokyo, Japan |
@OryLab |
29 |
0 |
523 |
231 |
160 |
Python,Jupyter |
0 |
0 |
gh0stkey |
DoraBox: 多拉盒教学培训靶场 |
https://github.com/gh0stkey/DoraBox |
https://gh0st.cn |
天行健,君子以自强不息;地势坤,君子以厚德载物。 |
China |
米斯特安全团队 |
13 |
0 |
103 |
229 |
13 |
Python,PHP,HTML |
358 |
98 |
superkojiman |
pwnbox : Docker container with tools for binary reverse engineering and exploitation : |
https://github.com/superkojiman/pwnbox |
https://www.techorganic.com |
Stand back! Im going to try hacking! 👨💻 |
None |
None |
33 |
0 |
11 |
227 |
7 |
Python,Go,Shell |
430 |
101 |
maK- |
parameth - GET / POST 参数暴力破解工具: |
https://github.com/maK-/parameth |
http://www.securit.ie |
Funky skunky code junky |
Dublin, Ireland |
Securit Consulting |
42 |
0 |
59 |
225 |
47 |
Python,C |
0 |
0 |
Shellntel |
luckystrike - 恶意 Office 宏文档样本生成工具,PowerShell 代码编写: |
https://github.com/Shellntel/luckystrike |
None |
|
None |
None |
7 |
0 |
2 |
224 |
0 |
Python,C,JavaScript,PowerShell,CSS |
379 |
147 |
cw1997 |
NATBypass: 一款lcx在golang下的实现 |
https://github.com/cw1997/NATBypass |
http://www.changwei.me |
热爱编程,热爱学习,喜欢交结朋友,对新生事物有着强烈的好奇心和求知欲。 |
台北市大安区基隆路4段43号 |
台湾科技大学 |
59 |
0 |
357 |
224 |
73 |
Python,Go,JavaScript,PHP,Verilog |
0 |
0 |
lennartkoopmann |
Nzyme - 采集 802.11 管理数据帧,实现基于日志的 WiFi IDS: |
https://github.com/lennartkoopmann/nzyme |
https://github.com/Graylog2 |
Started @Graylog2, doing this and that. |
Houston, TX / Hamburg, GER |
Graylog, Inc |
3 |
0 |
83 |
223 |
27 |
Ruby,Java |
440 |
77 |
pandazheng |
Threat-Intelligence-Analyst: 威胁情报,恶意样本分析,开源Malware代码收集 |
https://github.com/pandazheng/Threat-Intelligence-Analyst |
http://pandazheng.blog.163.com |
Malware Analyst |
china |
pandazhengzheng |
934 |
0 |
1900 |
223 |
299 |
Objective-C |
502 |
195 |
yeyintminthuhtut |
Awesome-Red-Teaming - 一份红队渗透测试资源列表: |
https://github.com/yeyintminthuhtut/Awesome-Red-Teaming |
http://pentest.space |
Twitter @yeyint_mth |
Singapore |
None |
287 |
0 |
477 |
223 |
19 |
Shell |
0 |
0 |
vesche |
scanless - 调用在线扫描网站进行端口扫描的工具: |
https://github.com/vesche/scanless |
https://um.wtf |
please dont turn down my music |
USA |
Swimlane |
35 |
0 |
689 |
219 |
93 |
Python,C,Shell |
0 |
0 |
RUB-SysSec |
之前推送过一片 USENIX 的 Paper《Syntia - 利用蒙特卡洛树搜索技术实现混淆代码的自动化反混淆,自动化合成原始代码语意》,最近作者在德国 CCC 会议作了一次关于这个的演讲: https://events.ccc.de/congress/2017/Fahrplan/system/event_attachments/attachments/000/003/362/original/slides.pdf https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-blazytko.pdf |
https://github.com/RUB-SysSec/syntia |
https://syssec.rub.de |
|
Bochum, Germany |
Ruhr-University Bochum |
18 |
0 |
11 |
217 |
0 |
Python,C,C++ |
358 |
98 |
hzqst |
用于Windows 7+的Intel VT-X / EPT进程监控工具(如Process Monitor) |
https://github.com/hzqst/Syscall-Monitor |
None |
|
China |
None |
17 |
0 |
13 |
217 |
2 |
C,C++,POV-Ray |
0 |
0 |
meitar |
Awesome Lockpicking - 与开锁、锁具安全性有关的资料整理: |
https://github.com/meitar/awesome-lockpicking |
https://web.archive.org/web/20190206200948/https://maymay.net/blog/2019/02/06/why-i-am-publicly-disassociating-myself-from-the-recurse-center/ |
⚑ Ⓐnti-capitalist Free Software developer, pro white genocide, abolish all prisons, 0xACAB ⚑ |
https://cyberbusking.org/ |
Code signing GPG key: C42F 2F04 C42D 489E 23DD 71CE 07EF AA28 AB94 BC85 |
193 |
0 |
45 |
215 |
0 |
Go,Shell,PHP,JavaScript,HTML |
0 |
0 |
0xdea |
frida-scripts: A collection of Frida.re scripts reverse Apps |
https://github.com/0xdea/frida-scripts/ |
https://0xdeadbeef.info/ |
You cant argue with a root shell. |
Italy |
None |
11 |
0 |
81 |
214 |
0 |
Python,C,JavaScript,Assembly,PowerShell |
506 |
84 |
zer0yu |
ZEROScan: 借鉴了msf的漏洞利用框架 |
https://github.com/zer0yu/ZEROScan |
http://zeroyu.xyz/ |
Every light needs a shadow. You just have to learn how to control it,use it when you need it. |
None |
None |
29 |
0 |
2100 |
214 |
1100 |
Python,C,CSS |
0 |
0 |
rocky |
python-uncompyle6: Python 反编译工具 |
https://github.com/rocky/python-uncompyle6 |
None |
|
NYC |
ConsenSys |
118 |
0 |
162 |
213 |
1 |
Python,Ruby,C,Shell,Emacs |
1200 |
142 |
xem |
Mini x86: x86 decompiler and emulator : |
https://github.com/xem/minix86 |
None |
|
None |
None |
145 |
0 |
284 |
213 |
65 |
Assembly,HTML,Makefile |
418 |
63 |
eteran |
edb-debugger - 一款跨平台的 x86/x86-64 调试器: |
https://github.com/eteran/edb-debugger |
https://codef00.com |
|
United States |
Digital Operatives |
38 |
0 |
431 |
211 |
58 |
C++ |
0 |
0 |
giMini |
mimiDbg - 从内存中检索密码的 PowerShell 脚本: |
https://github.com/giMini/mimiDbg |
None |
|
None |
None |
16 |
0 |
3 |
210 |
0 |
PowerShell |
677 |
185 |
s0lst1c3 |
Toolkit for performing targeted evil twin attacks against WPA2 by @ s0lst1c3 http://bit.ly/2pTxt4t #cybersecurity... |
https://github.com/s0lst1c3/eaphammer |
http://twitter.com/s0lst1c3 |
|
Denver, CO |
None |
87 |
0 |
72 |
209 |
62 |
Python,C,Makefile,PowerShell |
0 |
0 |
gen0cide |
gscript - 可脚本执行的恶意软件动态运行库: |
https://github.com/gen0cide/gscript |
https://github.com/uber |
#InfoSec, #RedTeam, Golang Dev, FOSS advocate, hacker. Chaotic Good. |
San Francisco, CA |
Security Engineering @uber |
138 |
0 |
44 |
208 |
32 |
Go,Java |
0 |
0 |
nethunteros |
Hunt domain names using DNSDumpster, WHOIS, Reverse WHOIS, (TODO: Shodan) |
https://github.com/nethunteros/punter |
None |
I make Nethunter for Kali Linux. This account is to test Nethunter as a ROM (for now). |
None |
None |
72 |
0 |
311 |
207 |
2 |
Go |
0 |
0 |
pelya |
android-keyboard-gadget - 将 Android 设备模拟为 USB 键盘、鼠标来操作电脑,目前支持 Nexus、Sony、小米等一些手机型号: |
https://github.com/pelya/android-keyboard-gadget |
https://libsdl-android.sf.net/ |
|
Kiev |
None |
62 |
0 |
47 |
207 |
0 |
C,Java |
559 |
204 |
artkond |
Invoke-Vnc : Powershell VNC injector : |
https://github.com/artkond/Invoke-Vnc |
None |
Penetration Tester https://twitter.com/artkond |
None |
None |
5 |
0 |
38 |
204 |
3 |
Python,C |
0 |
0 |
Proteas |
macOS 10.12.4 的内核及驱动中的类型树,来自 Proteas: |
https://github.com/Proteas/macos-class-tree |
None |
Geek |
China |
None |
35 |
0 |
194 |
203 |
61 |
C,Shell,C++ |
193 |
44 |
ustayready |
CredSniper - 基于 Python 实现的网络钓鱼框架,支持抓取 2FA Tokens: |
https://github.com/ustayready/CredSniper |
None |
divergent thinker/breaker and researcher of stuff |
None |
None |
39 |
0 |
7 |
203 |
7 |
Python,C#,HTML |
724 |
155 |
NytroRST |
NetRipper - 智能流量嗅探工具,最近新添加对 Chrome X64 SSL Hook 的支持: |
https://github.com/NytroRST/NetRipper/ |
None |
Interested in C/C++, ASM, Windows internals, reverse engineering, exploit and shellcode development |
Romania |
None |
7 |
0 |
0 |
202 |
0 |
HTML,PowerShell,C++ |
0 |
0 |
Raikia |
FirePhisha: full-fledged phishing framework to manage all phishing engagements |
https://github.com/Raikia/FirePhish |
https://twitter.com/raikiasec |
|
Dallas, TX |
Mandiant |
16 |
0 |
80 |
202 |
4 |
Python,Lua,PHP,PowerShell,Perl |
0 |
0 |
alexhude |
uEmu - 基于 Unicorn 实现的 IDA CPU 模拟器插件,之前还推送过一个类似的 idaemu: https://github.com/alexhude/uEmu |
https://github.com/alexhude/uEmu |
http://twitter.com/getorix |
Security Researcher ❖ Hardware Hacker ❖ Quality tools writer |
Melbourne, Australia |
None |
9 |
0 |
0 |
202 |
0 |
Python,C++ |
0 |
0 |
codyd51 |
AxleOS : a UNIX-like kernel + userspace : https://github.com/codyd51/axle |
https://github.com/codyd51/axle |
https://twitter.com/phillipten |
I do a lot of reverse engineering on iOS, both the platform itself and first/third party apps. I also like to play with things in C. |
Paris, France |
None |
80 |
0 |
391 |
202 |
30 |
Objective-C,HTML,Objective-C++ |
378 |
40 |
rmusser01 |
Information Security Reference That Doesnt Suck |
https://github.com/rmusser01/Infosec_Reference |
http://rmusser.net/docs |
Contact Me: email@domain.tld |
None |
None |
119 |
0 |
1700 |
202 |
30 |
Python,Lua,C |
2000 |
496 |
NullHypothesis |
exitmap : A fast and modular scanner for Tor exit relays : https://github.com/NullHypothesis/exitmap , More : |
https://github.com/NullHypothesis/exitmap |
https://nymity.ch |
I improve Internet privacy and security. |
None |
None |
49 |
0 |
14 |
200 |
0 |
Python,TeX,Shell,Go |
0 |
0 |
joaomatosf |
jexboss - Jboss 及 Java 反序列化漏洞利用工具: |
https://github.com/joaomatosf/jexboss |
http://twitter.com/joaomatosf |
Im just a fisherman. |
Brasil |
joaomatosf.com |
4 |
0 |
59 |
199 |
5 |
Python,C,PHP,Java |
1100 |
404 |
SilentGhostX |
HighTouch-WPS-Breaker#Bash script to extract the #WPS pin of many #vulnerable #routers and get the password |
https://github.com/SilentGhostX/HT-WPS-Breaker |
None |
|
None |
None |
1 |
0 |
1 |
198 |
0 |
Shell |
514 |
230 |
WeiChiaChang |
stacks-cli - 用于一键分析网站所用技术栈的命令行工具: |
https://github.com/WeiChiaChang/stacks-cli |
https://lihi.cc/VQ4ZS |
🎹 X 📖 X 🏐 X 🏝 X 🌎 X 💻 My YouTube Channel https://lihi.cc/VQ4ZS |
Tainan, Taiwan |
Planet Earth |
156 |
0 |
1300 |
198 |
92 |
JavaScript,Vue |
0 |
0 |
bkerler |
dump_avb_signature - 转储 Android Verified Boot 的签名 Hash : |
https://github.com/bkerler/dump_avb_signature |
https://twitter.com/viperbjk |
Reverse Engineer and Data/Crypto Analyst |
Germany |
RevSkills |
314 |
0 |
3 |
197 |
14 |
Python,C,C++ |
530 |
94 |
cs01 |
A modern, browser-based frontend to gdb (gnu debugger). |
https://github.com/cs01/gdbgui/ |
https://github.com/grassfedcode |
Engineer at Oculus/Facebook, creator of gdbgui and various tools, occasional blogger (https://medium.com/@grassfedcode) |
Sunnyvale, California |
facebook |
17 |
0 |
231 |
195 |
99 |
Python,JavaScript |
0 |
0 |
rastating |
WordPress Exploit Framework v1.4 : |
https://github.com/rastating/wordpress-exploit-framework/releases/tag/v1.4 |
https://github.com/DigitalInterruption |
|
United Kingdom |
@DigitalInterruption |
144 |
0 |
154 |
195 |
0 |
Python,JavaScript,Ruby,PHP |
0 |
0 |
sam-b |
windows_kernel_address_leaks - 从用户态泄露 Windows 内核地址的方法汇总: |
https://github.com/sam-b/windows_kernel_address_leaks |
https://twitter.com/_samdb_ |
|
UK |
None |
34 |
0 |
206 |
195 |
5 |
Python,Go,HTML,C++ |
0 |
0 |
wainshine |
Chinese-Names-Corpus: 中文人名语料库 |
https://github.com/wainshine/Chinese-Names-Corpus |
None |
一只产品汪! |
beijing |
None |
10 |
0 |
488 |
195 |
1100 |
|
0 |
0 |
RolfRolles |
SynesthesiaYS - Rolf Rolles 开源的一款 Shellcode 生成器: http://www.msreverseengineering.com/blog/2017/7/15/the-synesthesia-shellcode-generator-code-release-and-future-directions Github: |
https://github.com/RolfRolles/SynesthesiaYS |
None |
|
None |
None |
9 |
0 |
0 |
194 |
0 |
Python,Java,C++ |
207 |
48 |
emmericp |
ixy - 在用户态实现的 Linux 数据包处理驱动: |
https://github.com/emmericp/ixy |
https://github.com/croit |
PhD student at TUM, co-founder croit.io |
Munich, Germany |
@croit & Technical University of Munich |
35 |
0 |
307 |
193 |
55 |
Lua,C,C++ |
0 |
0 |
peewpw |
Invoke-PSImage - 在 PNG 图片中藏一个 PowerShell 脚本: |
https://github.com/peewpw/Invoke-PSImage |
https://twitter.com/peewpw |
|
Philadelphia, PA |
None |
7 |
0 |
8 |
190 |
0 |
Python,JavaScript,PowerShell,C++ |
1100 |
236 |
xiaoxiaoleo |
windows_pentest_tools: Windows 渗透测试工具集 |
https://github.com/xiaoxiaoleo/windows_pentest_tools |
http://www.cnblogs.com/xiaoxiaoleo/ |
Be careful when execute my shit script. 🙃 |
Zion |
None |
48 |
0 |
1100 |
189 |
354 |
C#,Python,Visual,PHP,JavaScript |
154 |
95 |
drivendata |
cookiecutter-data-science: 机器学习标准化模板生成工具 |
https://github.com/drivendata/cookiecutter-data-science |
http://www.drivendata.org |
|
None |
None |
10 |
0 |
5 |
188 |
1 |
Python,HTML,Jupyter |
2100 |
715 |
urbanadventurer |
urbanadventurer:渗透中的用户名生成工具 |
https://github.com/urbanadventurer/username-anarchy |
http://www.MorningStarSecurity.com |
|
Melbourne, Australia |
None |
8 |
0 |
17 |
188 |
8 |
Python,HTML,Ruby |
1700 |
445 |
ropnop |
破解 OpenNMS 系统中的密码 Hash: https://t.co/DBogVH5kHb Github: |
https://github.com/ropnop/opennms_hash_cracker |
None |
|
None |
None |
24 |
0 |
125 |
187 |
1 |
Go,Python,JavaScript |
206 |
43 |
moyix |
pdbparse - 用于解析 PDB 文件的 Python 库: |
https://github.com/moyix/pdbparse |
http://engineering.nyu.edu/people/brendan-dolan-gavitt |
Assistant Professor in CSE at NYU Tandon School of Engineering, focusing on security, program analysis, and reverse engineering. |
New York, NY |
None |
30 |
0 |
19 |
186 |
13 |
Python,C,Objective-C |
136 |
50 |
sorpaas |
Rux - A hobbyist microkernel written in Rust - |
https://github.com/sorpaas/rux |
https://that.world |
|
None |
None |
186 |
0 |
481 |
186 |
172 |
Julia,CSS,Rust |
0 |
0 |
thesp0nge |
owasp-orizon - Owasp Orizon 是一款源代码静态分析工具,用于发现 Java 应用中的安全问题: |
https://github.com/thesp0nge/owasp-orizon |
https://armoredcode.com |
|
Gessate, Milan, Italy |
codiceinsicuro.it |
108 |
0 |
229 |
186 |
89 |
Java,Ruby |
0 |
0 |
GrrrDog |
TLS-Redirection - TLS 重定向攻击介绍文档: |
https://github.com/GrrrDog/TLS-Redirection |
https://agrrrdog.blogspot.com/ |
|
None |
None |
20 |
0 |
219 |
185 |
36 |
Python,Java |
1200 |
289 |
meirwah |
应急响应大合集:用于安全事件响应的工具与资源列表 |
https://github.com/meirwah/awesome-incident-response/blob/master/README_ch.md |
https://www.demisto.com/ |
|
Tel Aviv |
Demisto |
49 |
0 |
64 |
184 |
4 |
Go,Java |
2700 |
674 |
SigPloiter |
SigPloit - 移动电信网络中针对 SS7, GTP, Diameter & SIP 协议的安全测试框架: |
https://github.com/SigPloiter/SigPloit |
None |
|
None |
None |
6 |
0 |
65 |
182 |
108 |
Python,Java,Perl |
528 |
224 |
shipcod3 |
mazda_getInfo - 攻击马自达汽车娱乐信息系统 USB 端口的 PoC: |
https://github.com/shipcod3/mazda_getInfo |
https://twitter.com/shipcod3 |
security researcher and appsec professional |
Philippines |
Bugcrowd Inc. |
63 |
0 |
16 |
181 |
201 |
C,Shell,Python,C++,HTML,Ruby |
116 |
44 |
5alt |
VulHint: VulHint是辅助代码审计的 sublime text 3 插件 |
https://github.com/5alt/VulHint |
None |
|
None |
None |
32 |
0 |
10 |
180 |
3 |
Python,JavaScript |
100 |
22 |
neoneggplant |
EggShell - 命令行版的 iOS/macOS 远程管理工具,支持获得系统信息、设备控制、用户交互、定位信息等等: |
https://github.com/neoneggplant/EggShell |
None |
Atlanta GA iOS/Web Developer I like to mess around with python, node, swift, and objective c |
Atlanta, GA |
None |
10 |
0 |
115 |
180 |
25 |
Logos,Objective-C,Shell,Swift |
1000 |
271 |
JusticeRage |
Manalyze: A static analyzer for PE executables |
https://github.com/JusticeRage/Manalyze |
None |
|
None |
None |
12 |
0 |
14 |
179 |
8 |
Python,YARA,Java |
0 |
0 |
Ne0nd0g |
merlin - 使用 HTTP 通信的跨平台后渗透测试工具,介绍: https://medium.com/@Ne0nd0g/introducing-merlin-645da3c635a GitHub: |
https://github.com/Ne0nd0g/merlin |
None |
|
None |
None |
19 |
0 |
11 |
179 |
6 |
Go,Python |
2100 |
259 |
roccomuso |
kickthemout : Kick devices off your network by performing an ARP Spoof attack with Node.js : |
https://github.com/roccomuso/kickthemout |
https://twitter.com/roccomuso |
Full Stack Developer - Linux, Iot, hacking, cryptos and Node.js enthusiast. Open Source addicted |
Rome |
None |
105 |
0 |
2900 |
179 |
125 |
TypeScript,JavaScript |
275 |
41 |
breenmachine |
之前推送过 RottenPotato - 从本地服务用户提权至 SYSTEM 的工具,有研究员将 RottenPotato 封装成了一个独立 DLL 模块 - RottenPotatoNG: |
https://github.com/breenmachine/RottenPotatoNG |
None |
|
United States |
None |
16 |
0 |
2 |
178 |
0 |
Python,C#,C++ |
359 |
226 |
yarrick |
iodine: Official git repo for iodine dns tunnel |
https://github.com/yarrick/iodine |
http://code.kryo.se |
|
Zürich, Switzerland |
None |
9 |
0 |
13 |
176 |
6 |
C,Shell |
0 |
0 |
Prodesire |
Python最佳实践指南 |
https://github.com/Prodesire/Python-Guide-CN |
https://github.com/aliyun |
Pythonista |
Hangzhou |
@aliyun |
17 |
0 |
379 |
175 |
53 |
Python,Batchfile,Makefile |
0 |
0 |
Sliim |
pentest-lab - 基于 OpenStack 的渗透测试实验环境: |
https://github.com/Sliim/pentest-lab |
None |
|
None |
None |
30 |
0 |
6000 |
174 |
110 |
Python,Emacs,Ruby |
0 |
0 |
ant4g0nist |
Susanoo - 一个 REST API 安全测试框架: |
https://github.com/ant4g0nist/Susanoo |
https://twitter.com/ant4g0nist |
Independent Security Researcher |
Den Haag, Netherlands |
None |
153 |
0 |
233 |
173 |
61 |
Python,C,JavaScript |
0 |
0 |
aguinet |
#wannacry in-memory private RSA key recovery for Windows XP : |
https://github.com/aguinet/wannakey |
https://twitter.com/adriengnt |
|
None |
None |
46 |
0 |
34 |
172 |
6 |
Python,C++ |
1000 |
154 |
eldraco |
domain_analyzer - 一个可以搜寻域名的各类信息并分析安全问题的工具: |
https://github.com/eldraco/domain_analyzer |
http://researchgate.net/profile/Sebastian_Garcia6 |
|
None |
CVUT University |
34 |
0 |
36 |
171 |
62 |
Python,JavaScript,C++ |
1500 |
187 |
govolution |
avet : AntiVirus Evasion Tool : https://github.com/govolution/avet , Details : |
https://github.com/govolution/avet |
https://danielsauder.com/ |
|
None |
None |
34 |
0 |
4 |
169 |
7 |
Python,C,Assembly,C++ |
890 |
265 |
jopohl |
urh : Universal Radio Hacker - a software for investigating unknown wireless protocols : |
https://github.com/jopohl/urh |
None |
Research Associate / PhD Student. Interests: Wireless Security, Infrastructure Automation (DevOps), Artificial Intelligence |
Stralsund, Germany |
University of Applied Sciences Stralsund |
2 |
0 |
4 |
169 |
0 |
Python |
4000 |
379 |
lifetyper |
FreeRouter_V2: 一个适用于OpenWRT的全平台xx路由方案 |
https://github.com/lifetyper/FreeRouter_V2 |
http://www.lifetyper.com |
Father-Husband-Son |
None |
None |
22 |
0 |
180 |
169 |
4 |
Python,KiCad,C,Shell,HTML |
0 |
0 |
stanislaw |
awesome-safety-critical : Resources about programming practices for writing safety-critical software : |
https://github.com/stanislaw/awesome-safety-critical |
https://stanislaw.github.io/ |
|
Berlin, Germany |
PTScientists GmbH |
114 |
0 |
1700 |
168 |
5 |
Objective-C,Makefile,C++ |
0 |
0 |
whid-injector |
WHID - WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids: |
https://github.com/whid-injector/WHID |
None |
An USB Rubberducky On Steroids |
None |
None |
17 |
0 |
1 |
167 |
0 |
C,TypeScript |
743 |
120 |
erevus-cn |
scan_webshell: 简单的webshell扫描 |
https://github.com/erevus-cn/scan_webshell |
None |
|
None |
None |
18 |
0 |
20 |
165 |
7 |
Python,Ruby |
466 |
258 |
davehull |
Kansa - 一个基于 Powershell 的事件响应框架: |
https://github.com/davehull/Kansa |
http://trustedsignal.blogspot.com/ |
|
I am from enternetz |
Various and sundry |
51 |
0 |
35 |
161 |
57 |
C#,Python,PowerShell |
0 |
0 |
edwardz246003 |
|
https://github.com/edwardz246003/IIS_exploit |
None |
|
None |
None |
9 |
0 |
4 |
161 |
4 |
Python,C++ |
539 |
220 |
rockyzhengwu |
FoolNLTK: 最准的开源中文分词 |
https://github.com/rockyzhengwu/FoolNLTK |
http://www.midday.me |
|
None |
None |
34 |
0 |
124 |
159 |
58 |
Python,Java |
1300 |
324 |
jonluca |
Anubis - 子域名枚举及信息收集工具: |
https://github.com/jonluca/Anubis |
https://github.com/google |
Taking time off to travel. previously @google, @apple, @ElevateSecurity. Ex-Managing Director at @scopeusc. |
San Francisco, CA |
None |
61 |
0 |
211 |
158 |
98 |
Python,Swift,Shell,JavaScript,Jupyter |
0 |
0 |
swwwolf |
wdbgark - WinDBG Anti-RootKit Extension: |
https://github.com/swwwolf/wdbgark |
https://sww-it.ru |
Virii Cthulhu, Malware Expert at Kaspersky Lab, R&D, anti-rootkit, Windows internals, debugging, articles, etc... |
Russian Federation |
swwwolf |
4 |
0 |
56 |
158 |
10 |
C++ |
0 |
0 |
OALabs |
BlobRunner - 在恶意软件分析过程中快速调试 ShellCode 的工具: |
https://github.com/OALabs/BlobRunner |
https://github.com/herrcore |
@herrcore @idiom |
None |
None |
7 |
0 |
0 |
157 |
0 |
Python,C,JavaScript |
128 |
37 |
cyberheartmi9 |
Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution Exploit: |
https://github.com/cyberheartmi9/CVE-2017-12617 |
https://intx0x80.blogspot.com/ |
security Researcher ,Pwner CTFer , @intx0x80 |
None |
None |
63 |
0 |
757 |
157 |
24 |
Python,HTML |
316 |
118 |
Arturus |
Kaggle网页流量时序预测比赛第一名方案 |
https://github.com/Arturus/kaggle-web-traffic |
http://suilin.me |
|
Moscow |
Yandex |
22 |
0 |
123 |
155 |
1 |
Java,HTML,Jupyter |
1000 |
457 |
MortenSchenk |
Windows 10 Creators 内存写漏洞的利用,来自 MortenSchenk 在 BlackHat 2017 会议演讲,PPT 和 相关代码: |
https://github.com/MortenSchenk/BHUSA2017 |
None |
|
None |
None |
14 |
0 |
0 |
154 |
0 |
HTML,Assembly,PowerShell,C++ |
163 |
56 |
p3nt4 |
Invoke-SocksProxy - 使用 PowerShell 建立 Socks5 代理服务器: |
https://github.com/p3nt4/Invoke-SocksProxy |
https://twitter.com/xP3nt4 |
|
localhost |
None |
25 |
0 |
259 |
153 |
28 |
C#,JavaScript,PowerShell |
0 |
0 |
emptymonkey |
revsh is a tool for establishing reverse shells with terminal support |
https://github.com/emptymonkey/revsh |
https://twitter.com/emptymonkey |
|
Water Curtain Cave |
None |
17 |
0 |
105 |
152 |
53 |
C |
0 |
0 |
jesusprubio |
bluebox-ng - 基于 Node.js 实现的 VoIP 渗透测试框架: |
https://github.com/jesusprubio/bluebox-ng |
https://github.com/IBMResearch |
|
A Coruña |
@IBMResearch |
37 |
0 |
2500 |
148 |
75 |
TypeScript,JavaScript,Rust |
0 |
0 |
michalmalik |
osx-re-101 : A collection of resources for OSX/iOS reverse engineering : |
https://github.com/michalmalik/osx-re-101 |
https://github.com/michalmalik |
@michalmalik |
Bratislava, Slovakia |
None |
22 |
0 |
10 |
148 |
0 |
|
0 |
0 |
w3h |
icsmaster: 整合工控安全相关资源(ICS/SCADA Security Resource) |
https://github.com/w3h/icsmaster |
http://icsmaster.org |
Focus On ICS/SCADA Network Security (专注于工控网络安全研究) |
None |
None |
20 |
0 |
175 |
148 |
15 |
Python,Lua,HTML,Shell |
0 |
0 |
h2hconference |
H2HC 2017 Slides/Materials/Presentations: |
https://github.com/h2hconference/2017 |
https://www.h2hc.com.br |
Hackers To Hackers Conference (H2HC) é uma conferência organizada por pessoas que trabalham ou que estão diretamente envolvidas com pesquisas e desenvolvimento |
Brazil |
H2HC |
17 |
0 |
0 |
147 |
0 |
Python,HTML |
48 |
9 |
Cryin |
JAVA安全编码与代码审计 |
https://github.com/Cryin/JavaID/blob/master/JAVA%E5%AE%89%E5%85%A8%E7%BC%96%E7%A0%81%E4%B8%8E%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1.md |
https://cryin.github.io/ |
Enjoy programming. Write some interesting programs! |
None |
None |
8 |
0 |
237 |
146 |
70 |
Python,PHP,C++ |
253 |
90 |
onethawt |
idaplugins-list - 一份 IDA Plugin列表: |
https://github.com/onethawt/idaplugins-list/blob/master/README.md |
http://one.thawt.io |
|
Kernel |
None |
58 |
0 |
14 |
144 |
0 |
Python,C#,C++ |
1500 |
296 |
AnthonyCalandra |
新版本 C++ 语言(C++ 17/14/11)的新特性整理: |
https://github.com/AnthonyCalandra/modern-cpp-features |
https://anthony-calandra.com |
University of Waterloo - Undergraduate CS |
Waterloo, Ontario, Canada |
None |
26 |
0 |
389 |
143 |
26 |
C,Java,C++ |
0 |
0 |
iSpring |
WebGlobe: 基于HTML5原生WebGL实现的轻量级Google Earth三维地图引擎 |
https://github.com/iSpring/WebGlobe |
None |
|
Beijing, China |
None |
15 |
0 |
541 |
143 |
35 |
TypeScript,Java,JavaScript |
0 |
0 |
tatanus |
SPF - 一款社会工程学钓鱼框架: |
https://github.com/tatanus/SPF |
http://www.hillbillystorytime.com |
|
Stanford, KY 40484 |
None |
14 |
0 |
81 |
143 |
21 |
Python,JavaScript,Perl |
335 |
102 |
adi0x90 |
AttifyOS - 针对 IoT 设备进行渗透测试的系统: |
https://github.com/adi0x90/attifyos |
https://github.com/attify |
|
San Francisco |
@attify - IoT and Mobile Security |
18 |
0 |
10 |
142 |
1 |
Python,Shell |
413 |
81 |
D35m0nd142 |
LFISuite - 本地文件包含漏洞的自动化扫描、攻击工具: |
https://github.com/D35m0nd142/LFISuite |
https://twitter.com/d35m0nd142 |
Grey Hat Hacker and programmer. I love computer security, with particular interest to web vulns. Creator of automatized hacking tools and scripts. |
None |
None |
5 |
0 |
0 |
141 |
0 |
Python,C++ |
663 |
209 |
corna |
Intel 第四代 CPU HasWell 新引入的 Intel Boot Guard 保护特性的防护机制与自身的安全性研究。Intel-Boot-Guard 用于确保 BIOS 启动过程中的安全性。来自研究员 Alex Matrosov,今年夏天他在 BlackHat 也演讲了一个相关的议题《Betraying the BIOS: Where the Guardians of the BIOS are Failing》: https://github.com/corna/me_cleaner/wiki/Intel-Boot-Guard https://medium.com/@matrosov/bypass-intel-boot-guard-cc05edfca3a9 |
https://github.com/corna/me_cleaner/wiki/Intel-Boot-Guard |
None |
|
Bergamo, Italy |
None |
25 |
0 |
14 |
141 |
1 |
Python,C++ |
0 |
0 |
jeremylong |
DependencyCheck: OWASP 一款检查Java依赖库缺陷的工具 |
https://github.com/jeremylong/DependencyCheck# |
None |
|
None |
None |
26 |
0 |
24 |
140 |
4 |
Groovy,Java,Scala,HTML,Clojure,Dockerfile |
0 |
0 |
tom0li |
安全list 收藏 |
https://github.com/tom0li/collection-document |
https://tom0li.github.io/ |
Security Research |
None |
None |
8 |
0 |
222 |
140 |
172 |
Python,HTML |
0 |
0 |
gitpitch |
Introducing GitPitch – Markdown Presentations for Devs on GitHub and GitLab : |
https://github.com/gitpitch/gitpitch |
https://gitpitch.com |
Founder and developer of gitpitch.com - modern slide decks for developers. |
None |
None |
31 |
0 |
4 |
139 |
0 |
Java,CSS |
4900 |
435 |
huntcve |
Android 内核 ASoC 驱动的安全性分析,来自趋势科技的 Seven Shen: |
https://github.com/huntcve/slides/blob/master/seven_shen_shakacon.pdf |
None |
深挖洞,广积粮,不称霸 |
China, Nanjing |
None |
15 |
0 |
2 |
139 |
3 |
Python,C,HTML,Java |
50 |
25 |
P1kachu |
talking-with-cars - 汽车 CAN 总线分析工具: |
https://github.com/P1kachu/talking-with-cars |
http://p1kachu.github.io |
I do low level programming, security and whatever looks fun to me. Currently working on cars. |
None |
None |
14 |
0 |
156 |
138 |
60 |
Python,C,Java,C++ |
276 |
96 |
aancw |
Belati: The Traditional Swiss Army Knife for OSINT |
https://github.com/aancw/Belati |
https://petruknisme.com |
Just a puppet lovers and Open Source Enthusiast. Interested in Research Development and Non-Profit Organization. Passionate with OSINT. |
Indonesia |
None |
245 |
0 |
1500 |
138 |
189 |
Python,Shell,HTML |
0 |
0 |
kshvmdn |
fsql : Search through your filesystem with SQL-esque queries : https://github.com/kshvmdn/fsql |
https://github.com/kshvmdn/fsql |
https://kshvmdn.com |
a friendly fellow |
Toronto, Canada |
None |
57 |
0 |
420 |
138 |
40 |
Go,Shell,JavaScript |
0 |
0 |
bartblaze |
Made a small tool to disable Intel AMT on Windows. Runs on both x86 and x64 Windows operating systems: |
https://github.com/bartblaze/Disable-Intel-AMT |
https://bartblaze.blogspot.com/ |
|
None |
None |
9 |
0 |
359 |
137 |
12 |
Python,PHP |
0 |
0 |
interference-security |
Damn Vulnerable Web Sockets - vulnerable web application which works on web sockets for client-server communication: |
https://github.com/interference-security/DVWS |
https://twitter.com/xploresec |
|
None |
None |
46 |
0 |
233 |
135 |
9 |
Python,C,PHP,JavaScript,Perl |
284 |
94 |
justinsteven |
Arb. code execution in Visual Studio @code (Workspace settings) - because winword macros shouldnt have all the fun. |
https://github.com/justinsteven/advisories/blob/master/2017_visual_studio_code_workspace_settings_code_execution.md |
https://ring0.lol |
|
Brisbane, Australia |
None |
12 |
0 |
6 |
135 |
0 |
C |
0 |
0 |
m4b |
bingrep - 专门搜索二进制文件的 Grep 工具: |
https://github.com/m4b/bingrep/ |
http://www.m4b.io |
|
None |
None |
63 |
0 |
85 |
134 |
13 |
Rust |
1200 |
58 |
6IX7ine |
certstreamcatcher - 通过观察证书透明度日志来捕获网络钓鱼的工具: |
https://github.com/6IX7ine/certstreamcatcher |
https://github.com/6IX7ine |
Brazilian player. Cyber Security research, Infosec, Writer, Hacker / Full Stack Developer 🌌 |
São Paulo, Brazil |
@6IX7ine |
145 |
0 |
189 |
132 |
191 |
Python,JavaScript |
0 |
0 |
torque59 |
Nosql-Exploitation-Framework - 基于 Python 编写的 NoSQL 扫描与利用框架: |
https://github.com/torque59/Nosql-Exploitation-Framework |
https://github.com/opensecurity |
Information Security Researcher , Ramblings @ https://francisalexander.in |
India |
@opensecurity |
64 |
0 |
233 |
130 |
50 |
Python,HTML,HCL |
0 |
0 |
yadutaf |
使用 Linux tracepoints, perf and eBPF 跟踪网络数据包的流程: https://blog.yadutaf.fr/2017/07/28/tracing-a-packet-journey-using-linux-tracepoints-perf-ebpf/ Github: |
https://github.com/yadutaf/tracepkt |
https://github.com/EasyMile |
I torture packets / containers. |
Toulouse, FR |
@EasyMile |
41 |
0 |
101 |
130 |
3 |
Python,Go,C,Shell |
402 |
33 |
Dor1s |
学习使用Clang Libfuzzer Fuzz C/Cpp代码 |
https://github.com/Dor1s/libfuzzer-workshop/tree/master/lessons |
https://github.com/google |
Information Security Engineer @ Google Chrome |
None |
@google |
19 |
0 |
34 |
129 |
54 |
C,Shell,C++,Hack |
0 |
0 |
nongiach |
Linux 内核 waitid 系统调用本地提权漏洞(CVE-2017-5123)Exploit: |
https://github.com/nongiach/CVE/tree/master/CVE-2017-5123 |
None |
@chaignc on twitter |
None |
None |
29 |
0 |
78 |
129 |
50 |
Python,C,Assembly |
509 |
71 |
szcf-weiya |
动态IP解决新浪的反爬虫机制 |
https://github.com/szcf-weiya/SinaSpider |
https://hohoweiya.xyz |
Ph.D (Pre-candidacy) in Statistics |
Hong Kong |
The Chinese University of Hong Kong |
63 |
0 |
179 |
129 |
74 |
Jupyter,Python,Julia,TeX,R,C++ |
0 |
0 |
ninjaprawn |
async_awake-fun - 在 Ian Beer 上周公开的 async_awake Exploit 的基础上写的一个更完善的 Exploit: |
https://github.com/ninjaprawn/async_awake-fun |
http://ninjaprawn.com |
18yo. - Security |
Australia |
None |
32 |
0 |
134 |
128 |
51 |
HTML,Shell,C,JavaScript,Objective-C |
0 |
0 |
sashs |
A little introduction into semantic search feature in ropper. https://scoding.de/semantic-search-in-ropper https://github.com/sashs/Ropper/tree/dev |
https://github.com/sashs/Ropper/tree/dev |
https://scoding.de |
|
None |
None |
6 |
0 |
78 |
127 |
6 |
Python,Ruby |
782 |
140 |
v-p-b |
A list tracking real-world exploits against anti-virus software: |
https://github.com/v-p-b/avpwn |
http://blog.silentsignal.eu |
|
None |
Silent Signal |
48 |
0 |
118 |
127 |
40 |
Python,Java,Ruby,PowerShell |
69 |
26 |
exp-db |
AI-Driven-WAF: Artificial intelligence-driven Web Firewall |
https://github.com/exp-db/AI-Driven-WAF |
http://www.evilclay.com |
Web Security Development & Research |
None |
None |
12 |
0 |
168 |
125 |
17 |
Python,PHP |
0 |
0 |
RamadhanAmizudin |
python-icap-yara: An ICAP Server with yara scanner for URL or content. |
https://github.com/RamadhanAmizudin/python-icap-yara |
http://blog.rz.my |
Daydreamer |
Malaysia |
None |
49 |
0 |
1500 |
124 |
263 |
Python,PHP,JavaScript |
0 |
0 |
konstruktoid |
Ubuntu Systemd 安全加固: |
https://github.com/konstruktoid/hardening |
https://www.linkedin.com/in/thosjo |
|
Sweden |
None |
40 |
0 |
0 |
124 |
3 |
Python,Shell |
375 |
71 |
nathanlopez |
Stitch - a cross platform python RAT |
https://github.com/nathanlopez/Stitch |
None |
|
None |
None |
2 |
0 |
12 |
124 |
0 |
Python |
1300 |
377 |
debasishm89 |
OpenXMolar is a Microsoft Open XML file format fuzzing framework, written in Python |
https://github.com/debasishm89/OpenXMolar/blob/master/README.md |
http://www.debasish.in/ |
Information Security Enthusiast. https://twitter.com/debasishm89 |
None |
None |
18 |
0 |
8 |
122 |
0 |
Python |
89 |
34 |
masatokinugawa |
浏览器 XSS Filter Bypass Cheat Sheet : |
https://github.com/masatokinugawa/filterbypass |
http:///////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////twitter.com/kinugawamasato |
|
None |
None |
6 |
0 |
0 |
122 |
0 |
Python,HTML,JavaScript,C++ |
616 |
120 |
MichielDerhaeg |
Build yourself a Linux : |
https://github.com/MichielDerhaeg/build-linux |
https://derhaeg.be |
|
Belgium |
None |
17 |
0 |
19 |
120 |
2 |
Go,Shell,Haskell |
4700 |
268 |
NickstaDB |
BaRMIe - Java RMI枚举和攻击工具: |
https://github.com/NickstaDB/BaRMIe |
https://www.cognitous.co.uk/ |
Security researcher, exploit developer, pentester, and founder of Cognitous Cyber Security. |
United Kingdom |
Cognitous Cyber Security |
16 |
0 |
14 |
118 |
3 |
Python,Shell,Java |
327 |
62 |
haccer |
subjack: Hostile Subdomain Takeover tool written in Go |
https://github.com/haccer/subjack |
https://github.com/Hacker0x01 |
|
Tampa, FL |
@Hacker0x01 |
5 |
0 |
107 |
118 |
0 |
Go,Python |
0 |
0 |
bitwiseshiftleft |
SJCL – Stanford JavaScript Crypto Library : |
https://github.com/bitwiseshiftleft/sjcl |
None |
|
None |
None |
5 |
0 |
2 |
117 |
0 |
Python,C,JavaScript,C++ |
5400 |
735 |
daniestevez |
gr-satellites - 针对特定卫星的 GNU Radio 解码器集合: |
https://github.com/daniestevez/gr-satellites |
http://destevez.net |
|
Madrid, Spain |
None |
42 |
0 |
33 |
117 |
2 |
Python,CMake,Jupyter,C++,OpenEdge |
0 |
0 |
eth0izzle |
bucket-stream - 通过检测证书透明报告日志监测 Amazon S3 Buckets: |
https://github.com/eth0izzle/bucket-stream |
http://www.darkport.co.uk |
I make stuff, break stuff, and protect stuff from getting hacked. @darkp0rt |
London |
None |
8 |
0 |
18 |
117 |
7 |
Python,C# |
0 |
0 |
fuzzbunch |
NSA/fuzzbunch |
https://github.com/fuzzbunch/fuzzbunch |
None |
|
None |
None |
1 |
0 |
0 |
117 |
0 |
Python |
764 |
407 |
arkadiyt |
Hackerone/Bugcrowd 平台的漏洞数据 DUMP,有研究员在 GitHub 上离线存储了 Hackerone/Bugcrowd 的漏洞报告并且定期更新: |
https://github.com/arkadiyt/bounty-targets-data |
https://arkadiyt.com |
|
San Francisco, CA |
None |
21 |
0 |
16 |
116 |
0 |
Ruby |
0 |
0 |
sebdraven |
Python 与机器学习:恶意软件数据集的聚类,来自 Hack.Lu 2017 会议上的一个 Workshop |
https://github.com/sebdraven/hack_lu_2017 |
http://twitter.com/Sebdraven |
CEO of SCTIF and Researcher at LSE (Epita) |
Anywhere |
None |
42 |
0 |
11 |
114 |
6 |
Python,Jupyter |
0 |
0 |
1u4nx |
Exploit-Exercises-Nebula 渗透教程 |
https://github.com/1u4nx/Exploit-Exercises-Nebula/ |
http://www.shellcodes.org |
|
Chengdu |
None |
17 |
0 |
230 |
113 |
63 |
Python,JavaScript,Emacs,Common |
199 |
96 |
SycloverSecurity |
13th届Syclover承办的ctf比赛题解 |
https://github.com/SycloverSecurity/ctf/tree/master/13th_cuit_game |
http://www.sycsec.com/ |
|
SiChuan, China |
Syclover Security Team |
4 |
0 |
0 |
112 |
0 |
C,HTML,Ruby |
49 |
15 |
ion-storm |
My Sysmon Threat Intelligence Dashboard for Graylog Available for Download: https://github.com/ion-storm/sysmon-config |
https://github.com/ion-storm/sysmon-config |
None |
|
None |
None |
95 |
0 |
697 |
112 |
138 |
Go,Shell,C,Batchfile,Python |
394 |
74 |
withzombies |
use computer vision to find deceptive IDNs |
https://github.com/withzombies/deceptiveidn |
None |
|
New York, NY |
None |
18 |
0 |
175 |
112 |
18 |
Python,CMake,Swift,C++ |
26 |
4 |
SadProcessor |
EmpireDog - BloodHound 和 PowerEmpire 的 PowerShell 模块收集: |
https://github.com/SadProcessor/EmpireDog |
None |
|
None |
None |
7 |
0 |
3 |
111 |
0 |
PowerShell |
163 |
42 |
plajjan |
Run virtual routers with docker |
https://github.com/plajjan/vrnetlab |
https://github.com/SpriteLink |
Network Automation Ninja at Deutsche Telekom / TeraStream. |
Stockholm, Sweden |
Deutsche Telekom / Terastream, @SpriteLink |
73 |
0 |
186 |
111 |
17 |
Python |
416 |
89 |
t3ntman |
Slides from my “Advanced Social Engineering for Red Teams” talk available here: |
https://github.com/t3ntman/Conference-Talks@ |
None |
|
None |
None |
4 |
0 |
14 |
111 |
26 |
C#,Python |
216 |
57 |
talos-vulndev |
Great work on Windows Intel PT driver, now support kernel mode tracing. Cool guys @richinseattle and @aall86 !. |
https://github.com/talos-vulndev/WindowsIntelPT |
None |
|
None |
None |
7 |
0 |
0 |
110 |
0 |
Python,C,C++ |
124 |
35 |
vah13 |
extractTVpasswords - 使用 Frida 从 TeamViewer 内存提取明文密码的工具: |
https://github.com/vah13/extractTVpasswords |
None |
https://twitter.com/vah_13 |
Armenia, Yerevan |
None |
65 |
0 |
117 |
110 |
1 |
Python,Java,HTML,JavaScript,C++ |
384 |
113 |
milostosic |
MTuner - 一个可用于 Windows, PS4, PS3 上的 memory profiler、内存泄漏分析工具: |
https://github.com/milostosic/MTuner |
https://twitter.com/milostosic |
|
Shenzhen, China |
None |
14 |
0 |
30 |
109 |
12 |
Lua,C,C++ |
1500 |
92 |
richinseattle |
Evolutionary Kernel Fuzzing,来自 Talos 团队研究员在 BlackHat 会议关于 Windows/Linux 内核 Fuzzing 技术的演讲: |
https://github.com/richinseattle/EvolutionaryKernelFuzzing/blob/master/slides/Evolutionary%20Kernel%20Fuzzing-BH2017-rjohnson-FINAL.pdf |
None |
|
None |
None |
185 |
0 |
921 |
109 |
26 |
Python,C,Java,Rust |
61 |
11 |
hteso |
iaito : A Qt and C++ GUI for radare2 reverse engineering framework : https://github.com/hteso/iaito cc @ hteso |
https://github.com/hteso/iaito |
http://www.commandercat.com |
|
None |
None |
14 |
0 |
14 |
108 |
1 |
Python,C,C++ |
1500 |
137 |
vallejocc |
用于解密 Cerber 勒索软件二进制文件中字符串的 IDA Pro 脚本: |
https://github.com/vallejocc/ida_scripts/blob/master/malware_analysis_scripts/cerber_string_decryptor.py |
http://www.vallejo.cc |
|
None |
None |
17 |
0 |
40 |
107 |
30 |
Python,C# |
0 |
0 |
ArmisSecurity |
Armis 团队分享的 BlueBorne 蓝牙漏洞 Exploit PoC: |
https://github.com/ArmisSecurity/blueborne |
http://www.armis.com |
Armis is the agentless IoT security platform that lets businesses discover, profile, and sanction the devices around them. |
Palo Alto, CA |
Armis, Inc. |
2 |
0 |
0 |
106 |
0 |
Python,C |
456 |
183 |
Kkevsterrr |
Introducing Backdoorme - a powerful backdooring utility |
https://github.com/Kkevsterrr/backdoorme |
None |
|
None |
University of Maryland |
16 |
0 |
84 |
106 |
12 |
Python,JavaScript |
0 |
0 |
deroko |
EMET 集成进 Windows 10 Insider 版本之后,名字也换为 PayloadRestrictions.dll。加载方式也不再依赖 SHIM database: |
https://github.com/deroko/payloadrestrictions |
http://deroko.phearless.org |
|
None |
None |
19 |
0 |
6 |
106 |
7 |
Python,C,Assembly |
118 |
20 |
SYWorks |
waidps: Wireless Auditing, Intrusion Detection & Prevention System |
https://github.com/SYWorks/waidps |
https://www.facebook.com/syworks |
|
None |
SYWorks |
9 |
0 |
5 |
105 |
2 |
Python,HTML |
387 |
159 |
katjahahn |
Added hints for code injection functions to #PortexAnalyzer. New version is online.https://github.com/katjahahn/PortEx/tree/master/progs |
https://github.com/katjahahn/PortEx/tree/master/progs |
None |
|
None |
None |
6 |
0 |
21 |
105 |
15 |
Python,Java,Scala |
266 |
61 |
brainsmoke |
ASLR on the Line - 利用 CPU 处理器的侧信道问题从 JavaScript 中 Bypass 浏览器的 ASLR: |
https://github.com/brainsmoke/pub-archive/raw/master/slides/aotl-34c3-slides.pdf |
None |
|
None |
None |
34 |
0 |
7 |
104 |
0 |
Python,Go,C,Assembly |
0 |
0 |
Lingerhk |
基于机器学习的分布式webshell检测系统-项目代码 |
https://github.com/Lingerhk/fshell |
https://www.s0nnet.com |
s0nnet is on the way. |
hangzhou |
XiyouLinuxGroup |
35 |
0 |
13 |
103 |
27 |
Python,PHP,JavaScript,C++ |
0 |
0 |
blacknbunny |
ShellcodeToAssembly - shellcode 转汇编代码的工具: |
https://github.com/blacknbunny/ShellcodeToAssembly |
https://blacknbunny.github.io/ |
筑路工人 17 y/o Youtube : http://tiny.cc/2y944y https://twitter.com/0DAYanc |
None |
None |
20 |
0 |
15 |
103 |
3 |
Python,HTML |
0 |
0 |
monoxgas |
sRDI - 用 Shellcode 实现的 DLL 反射注入。可以将指定 DLL 文件转换成 Shellcode 输出: |
https://github.com/monoxgas/sRDI |
None |
|
Utah, United States |
Silent Break Security |
14 |
0 |
28 |
103 |
1 |
C#,Python,Ruby,PowerShell |
381 |
107 |
n4xh4ck5 |
V1D0m: Enumerate subdomains through Virustotal |
https://github.com/n4xh4ck5/V1D0m |
https://twitter.com/@n4xh4ck5 |
|
fwhibbit.es |
None |
30 |
0 |
0 |
103 |
9 |
Python |
89 |
28 |
rajeshmajumdar |
BruteXSS is a tool written in python simply to find XSS vulnerabilities in web a |
https://github.com/rajeshmajumdar/BruteXSS |
https://github.com/SigBitsLabs |
Founder & Security Researcher @SigBitsLabs |
India |
@SigBitsLabs |
34 |
0 |
6 |
102 |
3 |
Python,JavaScript,Ruby |
175 |
74 |
dzonerzy |
GoWAPT - Web 应用渗透测试工具: |
https://github.com/dzonerzy/goWAPT |
None |
0xdeadbeef |
Italy, Rome |
Consulthink |
38 |
0 |
46 |
101 |
6 |
Go,Python,C,Swift |
213 |
55 |
mempodippy |
snodew:PHP root (suid) reverse shell |
https://github.com/mempodippy/snodew |
None |
mem@xmpp.is |
Edinburgh, Scotland |
None |
5 |
0 |
5 |
101 |
3 |
C,Shell |
684 |
161 |
doadam |
Zimperium 发布 iOS <= 10.3.1 的内核漏洞利用: https://github.com/doadam/ziVA 为此,蒸米spark写了一篇《关于iOS 10.3.1 ziVA内核漏洞利用的简单分析》: |
https://github.com/doadam/ziVA |
None |
|
None |
None |
4 |
0 |
2 |
100 |
0 |
Objective-C,C,C++ |
311 |
114 |
gaasedelen |
Lighthouse ( |
https://github.com/gaasedelen/lighthouse) |
None |
|
None |
None |
2 |
0 |
1 |
100 |
0 |
Python |
823 |
157 |
m0rtem |
CloudFail - 利用 DNS 的配置错误以及旧数据记录,定位 CloudFlare CDN 背后的真实 IP: |
https://github.com/m0rtem/CloudFail |
https://sploit.io |
Your friendly neighborhood hacker follow me: http://twitter.com/m0rtem |
None |
SPLOIT SECURITY |
5 |
0 |
65 |
100 |
5 |
Python,PHP,HTML |
766 |
165 |
RoliSoft |
ReconScan - 一款网络侦察和漏洞评估工具: |
https://github.com/RoliSoft/ReconScan |
https://rolisoft.net |
|
Târgu Mureș, Romania |
None |
30 |
0 |
50 |
99 |
0 |
Python,C#,Java,C++ |
1400 |
144 |
depthsecurity |
haveIbeenHarvested - Automated HaveIbeenPwned lookups using theharvester results |
https://github.com/depthsecurity/haveIbeenHarvested |
http://www.depthsecurity.com |
|
Kansas City, MO |
Depth Security |
12 |
0 |
1 |
99 |
1 |
Python,Ruby |
316 |
40 |
ewilded |
psychoPATH - hunting file uploads & LFI in the dark |
https://github.com/ewilded/psychoPATH |
None |
The Ministry of Health warns: programming seriously harms you and others around you. |
Poland |
hackingiscool |
47 |
0 |
858 |
99 |
42 |
PHP,Java,C++,Perl |
245 |
74 |
federicodotta |
HandyCollaborator: Burp Suite plugin created for using Collaborator tool |
https://github.com/federicodotta/HandyCollaborator |
None |
|
None |
None |
16 |
0 |
24 |
97 |
3 |
Java |
0 |
0 |
floyd-fuh |
破解 Java Key Store (JKS) 文件中存储的密钥信息,Java 和 Android 一直默认使用 JKS 文件存储密钥。这个项目来源于 POC,,GTFO 杂志的一篇文章《Nail in the Java Key Store Coffin》: |
https://github.com/floyd-fuh/JKS-private-key-cracker-hashcat |
http://www.floyd.ch |
http://www.floyd.ch |
None |
None |
34 |
0 |
6 |
97 |
10 |
Python,Shell,Java |
171 |
33 |
Plazmaz |
LNKup - 利用 Windows 快捷方式窃取用户 NTLM Hash 以及环境变量的工具: |
https://github.com/Plazmaz/LNKUp |
https://github.com/pluralsight |
Born 1998, been programming since age 9. I enjoy messing with things until they break/work. |
Seattle, WA, USA |
@pluralsight |
39 |
0 |
68 |
96 |
6 |
Python,JavaScript |
0 |
0 |
SharadKumar97 |
OSINT-SPY Search using OSINT(Open Source Intelligence) |
https://github.com/SharadKumar97/OSINT-SPY |
None |
|
None |
None |
1 |
0 |
0 |
95 |
0 |
Python |
266 |
82 |
mbechler |
Java Unmarshaller Security - Turning your data into code execution |
https://github.com/mbechler/marshalsec |
https://mbechler.github.io/ |
|
Germany |
None |
5 |
0 |
0 |
95 |
0 |
HTML,Java |
0 |
0 |
ITAYC0HEN |
A journey into Radare 2 – (Part 1) : Simple crackme : https://www.megabeets.net/a-journey-into-radare-2-part-1/ , Source-code : |
https://github.com/ITAYC0HEN/A-journey-into-Radare2/blob/master/Part%201%20-%20Simple%20crackme/megabeets_0x1.c |
https://github.com/radareorg |
I am a security researcher, reverser, blogger, activist and a big fan of the open-source reverse engineering framework radare2. aka Megabeet |
None |
@radareorg , @CheckPointSW |
26 |
0 |
12 |
94 |
3 |
C,Shell,Python,C++,HTML,PowerShell |
0 |
0 |
Lcys |
lcyscan:Python插件化漏洞扫描器 |
https://github.com/Lcys/lcyscan |
https://phpinfo.me |
|
None |
None |
3 |
0 |
327 |
94 |
21 |
Python,PHP,Dockerfile |
0 |
0 |
Paradoxis |
The PHP module rootkit [CODE] |
https://github.com/Paradoxis/PHP-Rootkit |
https://github.com/DearBytes |
Whats up, Im Luke Paris; a Dutch software engineer with a passion for penetration testing, my weapons of choice are Python and Linux. |
The Netherlands |
@DearBytes |
40 |
0 |
441 |
94 |
30 |
Python,C,Shell,HTML |
0 |
0 |
codewatchorg |
sqlipy - Burp Suite 的 Python插件,使用SQLMap API 集成了 SQLMap: |
https://github.com/codewatchorg/sqlipy |
https://www.codewatch.org |
|
None |
None |
15 |
0 |
0 |
94 |
0 |
Python,Java,PowerShell,C++,Perl |
237 |
78 |
0ang3el |
EasyCSRF - 用于测试 CSRF 的 BurpSuite 插件: |
https://github.com/0ang3el/EasyCSRF |
None |
|
None |
None |
9 |
0 |
0 |
93 |
0 |
Python,Java,Perl |
122 |
34 |
ThomasTJdev |
WMD (Weapon of Mass Destruction) : Python framework for IT security tools : |
https://github.com/ThomasTJdev/WMD |
http://ttj.dk |
Nim & Arch |
None |
TTJ codefactory |
63 |
0 |
104 |
91 |
11 |
Python,Nim |
0 |
0 |
i3visio |
OSRFramework: Open Sources Research Intelligence Framework |
https://github.com/i3visio/osrframework |
http://www.i3visio.com |
|
España |
i3visio |
32 |
0 |
21 |
91 |
0 |
Python,JavaScript,CSS |
328 |
105 |
lowleveldesign |
wtrace - Command line tracing tool for Windows, based on ETW. - |
https://github.com/lowleveldesign/wtrace |
https://lowleveldesign.org |
System Engineer • Interested in profiling, security, and OS internals |
Poland |
None |
18 |
0 |
89 |
90 |
0 |
C#,ASP,C++ |
0 |
0 |
vy |
hrrs : Record and replay HTTP requests in Java EE and Spring applications : |
https://github.com/vy/hrrs |
https://vlkan.com/ |
|
The Netherlands |
None |
58 |
0 |
66 |
90 |
0 |
C,Java,Common |
60 |
15 |
DenizParlak |
Zeus - AWS 安全审计与加固工具: |
https://github.com/DenizParlak/Zeus |
http://www.denizparlak.com/ |
linux/unix ninja. RHCSA - RHCE - LFCS - OCA |
Samsun |
None |
15 |
0 |
4 |
89 |
1 |
Shell,JavaScript |
542 |
65 |
SilverMoonSecurity |
Vulnerability-Exploit-Fuzz-Mitigation 漏洞利用与挖掘思维导图 |
https://github.com/SilverMoonSecurity/Security-misc |
https://twitter.com/flyic |
Moony Li @Flyic Vulnerability hunt and exploit Mac, Win, ios, Android, SandBox, Prsentate BlackHat EU/Pacsec/CodeBlue since2016 Buddist of 阿弥陀佛 |
None |
T |
13 |
0 |
0 |
89 |
25 |
C |
196 |
56 |
putterpanda |
Mimikittenz - A post-exploitation powershell tool for extracting juicy info from memory |
https://github.com/putterpanda/mimikittenz |
https://au.linkedin.com/in/jamieson-o-reilly-13ab6470 |
|
None |
None |
3 |
0 |
2 |
89 |
0 |
HTML,PowerShell |
1300 |
284 |
dineshshetty |
iOS-SandBox-Dumper - iOS 中每个 APP 都运行在自己的 Sandbox 中,程序 Binary 文件、数据文件也都相应地存储在自己的隔离 GUID 文件夹,iOS-SandBox-Dumper 这个工具用于帮助研究员定位 Binary 和数据文件的路径: |
https://github.com/dineshshetty/iOS-SandBox-Dumper |
None |
|
None |
None |
13 |
0 |
6 |
88 |
7 |
CMake,Objective-C,Java,C,Dockerfile |
600 |
199 |
fozavci |
VIPROY - VoIP Pen-Test Kit for Metasploit Framework |
https://github.com/fozavci/viproy-voipkit |
http://viproy.com/fozavci |
|
Australia |
None |
6 |
0 |
8 |
87 |
13 |
Ruby |
273 |
71 |
blazeinfosec |
bt2 - 使用 Python 编写的一款利用 Telegram 通信平台作为 C&C 服务的后门工具: |
https://github.com/blazeinfosec/bt2 |
https://www.blazeinfosec.com |
|
South America and Europe |
Blaze Information Security |
12 |
0 |
4 |
86 |
7 |
Python,Ruby |
152 |
54 |
lachesis |
scallion : GPU-based Onion Hash generator : |
https://github.com/lachesis/scallion |
https://alloscomp.com/ |
|
San Francisco, CA |
None |
54 |
0 |
35 |
86 |
0 |
C#,Python,Shell |
0 |
0 |
Quitten |
Autorize - BurpSuite 自动化认证测试插件: |
https://github.com/Quitten/Autorize |
None |
|
None |
None |
17 |
0 |
3 |
85 |
1 |
Python,PHP |
242 |
88 |
d30sa1 |
RootKits-List-Download : This is the list of all rootkits found so far on github and other sites : |
https://github.com/d30sa1/RootKits-List-Download |
None |
Dont Ask.. |
None |
None |
15 |
0 |
32 |
85 |
3 |
Python |
515 |
230 |
bitvijays |
Execute Infra PenTest engagements faster! |
https://github.com/bitvijays/Pentest-Scripts |
None |
|
None |
None |
6 |
0 |
0 |
84 |
0 |
Ruby,Shell,Puppet,HTML |
166 |
53 |
hgascon |
Pulsarnetwork fuzzer with automatic protocol learning and simulation capabilites by @ hgascon |
https://github.com/hgascon/pulsar |
https://hugogascon.com |
|
None |
None |
21 |
0 |
185 |
84 |
68 |
Python,JavaScript |
224 |
49 |
skavanagh |
KeyBox - a web-based SSH console that centrally manages administrative access to systems : https://github.com/skavanagh/KeyBox |
https://github.com/skavanagh/KeyBox |
https://twitter.com/spkavanagh6 |
|
Cleveland, OH |
None |
13 |
0 |
69 |
84 |
4 |
JavaScript,Java |
63 |
10 |
jandre |
safe-commit-hook - Git pre-commit hook,在提交前检测本次提交是否包含敏感文件: |
https://github.com/jandre/safe-commit-hook |
http://jenpire.com |
|
Boston, MA |
None |
90 |
0 |
255 |
83 |
12 |
Go,Python,JavaScript,C++ |
0 |
0 |
nurupo |
rootkit - 针对 Ubuntu 16.04 和 10.04 的 rootkit: |
https://github.com/nurupo/rootkit |
None |
GPG: 0x6F5509774B1EF0C2 |
nurupo at irc://chat.freenode.net |
None |
64 |
0 |
301 |
83 |
13 |
AutoIt,C,Assembly,C++ |
0 |
0 |
tazjin |
Reverse-engineering WatchGuard Mobile VPN : https://www.tazj.in/en/1486830338 , watchblob : |
https://github.com/tazjin/watchblob |
https://github.com/google |
computers |
London, UK |
@google |
139 |
0 |
135 |
83 |
51 |
Go,Nix,Emacs,Rust |
0 |
0 |
kokjo |
UniversalROP - 基于 Z3 求解器和 Unicorn 模拟器写的一个 Gadgets 搜索工具: |
https://github.com/kokjo/universalrop |
http://ebfe.dk |
Matematician. Hacker with the Pwnies student organization from DIKU. |
Denmark |
None |
31 |
0 |
13 |
82 |
1 |
Python,C,CSS |
0 |
0 |
t94j0 |
AIRMASTER: 红蓝对抗中对过期域名的利用 |
https://github.com/t94j0/AIRMASTER |
https://github.com/ireallydontcare |
Wonderful, the Flatline said, I never did like to do anything simple when I could do it ass-backwards. ―Neuromancer |
Charleston, SC |
@ireallydontcare |
75 |
0 |
132 |
82 |
154 |
Go,Python,Ruby,C# |
0 |
0 |
yanxiu0614 |
subdomain3:a simple and fast tool for bruting subdomains |
https://github.com/yanxiu0614/subdomain3 |
None |
A person who can not do anything! |
None |
china |
3 |
0 |
111 |
82 |
12 |
Python |
365 |
97 |
k3170makan |
PyMLProjects: Python 机器学习项目: |
https://github.com/k3170makan/PyMLProjects |
https://blog.k3170makan.com |
|
Cape Town |
None |
29 |
0 |
70 |
81 |
10 |
Python,C,Shell |
128 |
29 |
marin-m |
pbtk: A toolset for reverse engineering and fuzzing Protobuf-based apps |
https://github.com/marin-m/pbtk |
https://medium.com/@marin_m |
|
Paris, France |
None |
3 |
0 |
0 |
81 |
0 |
Python |
503 |
53 |
jtesta |
ssh-mitm : SSH MITM tool : |
https://github.com/jtesta/ssh-mitm |
https://www.positronsecurity.com/ |
Senior penetration tester and founder of Positron Security. Board member & treasurer of B-Sides Rochester. @therealjoetesta |
Rochester, NY |
Positron Security |
20 |
0 |
21 |
80 |
7 |
Python,C,Shell,Ruby |
0 |
0 |
Voulnet |
昨天推送的 Microsoft Office RTF WSDL Parser 野外被利用 0Day 的 PoC: https://github.com/Voulnet/CVE-2017-8759-Exploit-sample |
https://github.com/Voulnet/CVE-2017-8759-Exploit-sample |
https://twitter.com/voulnet |
|
Kuwait |
None |
8 |
0 |
11 |
79 |
10 |
Python |
251 |
107 |
pyllyukko |
user.js - Firefox 配置安全加固脚本: |
https://github.com/pyllyukko/user.js |
https://twitter.com/pyllyukko |
|
Finland |
None |
31 |
0 |
152 |
79 |
17 |
Shell,JavaScript,Ruby,PowerShell,Vim |
1600 |
152 |
sergey-pronin |
Awesome-Vulnerability-Research: 漏洞研究技术资源 |
https://github.com/sergey-pronin/Awesome-Vulnerability-Research |
None |
|
getCurrentPosition(); |
None |
105 |
0 |
331 |
78 |
102 |
Python |
0 |
0 |
ssooking |
CTFDefense: 一些CTF的离线工具 |
https://github.com/ssooking/CTFDefense |
http://www.cnblogs.com/ssooking |
征途漫漫,步履铿锵,无畏、无惧、无阻! |
None |
None |
13 |
0 |
67 |
78 |
2 |
Python,Shell,JavaScript |
222 |
70 |
dark-lbp |
ISF - 基于 Python 的工控漏洞利用框架: |
https://github.com/dark-lbp/isf |
https://dark-lbp.github.io/ |
|
None |
None |
47 |
0 |
211 |
77 |
22 |
Python |
0 |
0 |
denandz |
fuzzotron - 一个基于 TCP/UDP 的 fuzz 工具: |
https://github.com/denandz/fuzzotron |
https://pulsesecurity.co.nz |
|
Auckland, New Zealand |
None |
11 |
0 |
0 |
77 |
0 |
C,Python,C++,Verilog,Go,PowerShell |
750 |
119 |
leoloobeek |
LAPSToolkit - 对部署了 LAPS 解决方案的域环境的利用工具: |
https://github.com/leoloobeek/LAPSToolkit |
None |
|
None |
None |
22 |
0 |
36 |
77 |
0 |
Go,C#,PowerShell |
0 |
0 |
zacbrown |
. 基于 Windows ETW(事件日志)的入侵检测,来自微软研究员在 DerbyCon 2017 会议的演讲。之前推送过他在微软 Blog 上写过的两篇相关文章: https://github.com/zacbrown/hiddentreasure-etw-demo/blob/master/zbrown-HiddenTreasureETW-DerbyCon7.pdf https://blogs.technet.microsoft.com/office365security/hidden-treasure-intrusion-detection-with-etw-part-1/ |
https://github.com/zacbrown/hiddentreasure-etw-demo/blob/master/zbrown-HiddenTreasureETW-DerbyCon7.pdf |
https://github.com/redcanaryco |
Principal Software Engineer/Dev Lead at @redcanaryco. I like OSes, compilers, and security. Formerly with @microsoft Office 365 Security and Windows. |
Seattle, WA |
@redcanaryco |
42 |
0 |
198 |
77 |
15 |
C#,Emacs,C++ |
77 |
19 |
Mosuan |
FileScan: 敏感文件扫描 / 二次判断降低误报率 |
https://github.com/Mosuan/FileScan |
http://www.0aa.me/ |
Huobi Security - SDL Team |
BeiJing |
None |
32 |
0 |
117 |
76 |
29 |
Python,JavaScript |
132 |
36 |
droope |
基于CMS插件的扫描器 |
https://github.com/droope/droopescan |
https://droope.org/ |
|
New Zealand |
Freelance Security Consultant |
53 |
0 |
50 |
76 |
16 |
Python,C,Shell |
0 |
0 |
ron190 |
jsql-injection - Java 编写的 SQL 注入工具: |
https://github.com/ron190/jsql-injection |
https://twitter.com/ron190jsql |
|
None |
None |
2 |
0 |
21 |
76 |
16 |
Java |
608 |
226 |
vnik5287 |
Intel TSX/RTM (Restricted Transactional Memory) 缓存侧信道攻击 Bypass Linux kASLR PoC: |
https://github.com/vnik5287/kaslr_tsx_bypass |
http://cyseclabs.com |
|
Sydney |
None |
9 |
0 |
0 |
76 |
0 |
Python,C,CSS |
58 |
26 |
akayn |
研究员 akayn 整理的 HEVD Windows 内核驱动漏洞利用方面的资料和代码: |
https://github.com/akayn/demos |
http://rce.wtf |
|
None |
None |
14 |
0 |
23 |
75 |
0 |
Python,C,HTML,C++ |
0 |
0 |
0xdeadbeefJERKY |
Office-DDE-Payloads - 生成嵌入 DDE 的 恶意 Office 文档的脚本: |
https://github.com/0xdeadbeefJERKY/Office-DDE-Payloads |
https://0xdeadbeefjerky.com |
(Information,Cyber) security professional with particular interest in mobile security, red teaming and exploit development. |
None |
None |
15 |
0 |
132 |
74 |
30 |
Python,PowerShell,HCL,CSS |
413 |
104 |
aipengjie |
sensitivefilescan: 目录遍历与敏感文件扫描工具 |
https://github.com/aipengjie/sensitivefilescan |
None |
社会主义接班人 |
hangzhou china |
None |
118 |
0 |
712 |
74 |
104 |
Python,PHP,Java |
121 |
67 |
restran |
web-proxy: 基于 Tornado 实现的 Web 站点反向代理 |
https://github.com/restran/web-proxy |
http://www.restran.net |
浩瀚山海,浪漫宇宙,伴着我行 Email: Z3Jlc3RyYW5AZ21haWwuY29t |
China |
None |
79 |
0 |
572 |
74 |
70 |
Python,C#,C |
0 |
0 |
411Hall |
JAWS - Windows 渗透测试过程中提权之前用于收集系统信息的脚本,基于 PowerShell 编写: |
https://github.com/411Hall/JAWS |
http://www.ducktoolkit.com |
Incident Responder and creator of the Duck Toolkit. |
England |
None |
4 |
0 |
33 |
73 |
1 |
Python,PowerShell |
0 |
0 |
Cybereason |
Siofra - 用于发现并利用 Windows DLL 劫持漏洞的工具: |
https://github.com/Cybereason/siofra |
None |
|
None |
None |
4 |
0 |
0 |
72 |
0 |
Python,C,Assembly,PowerShell |
184 |
50 |
mateuszk87 |
BadIntent - 使用 Burp Suite 拦截、修改、重放和攻击 Android 的 Binder 通信: |
https://github.com/mateuszk87/BadIntent |
https://ethermat.com |
White-Hat Hacker , Founder |
Berlin, DE |
ETHΞRMAT GmbH |
5 |
0 |
339 |
72 |
20 |
Python,Java |
0 |
0 |
zerokeeper |
WebEye:识别WEB服务器类型、CMS类型、WAF类型、WHOIS信息 |
https://github.com/zerokeeper/WebEye |
http://www.zerokeeper.com/ |
|
None |
None |
8 |
0 |
367 |
72 |
28 |
Python,PHP |
152 |
46 |
derrekr |
fastboot3DS - Nintendo 3DS bootloader: |
https://github.com/derrekr/fastboot3DS |
None |
http://twitter.com/derrekr6 |
None |
None |
8 |
0 |
11 |
71 |
9 |
C,HTML |
178 |
21 |
Twi1ight |
TSpider: Yet Another Web Spider 动态Web爬虫 |
https://github.com/Twi1ight/TSpider |
http://twi1ight.com |
|
None |
None |
26 |
0 |
260 |
70 |
6 |
Python,Visual |
0 |
0 |
cocoahuke |
MacKextDump is a new tool to dump kernel extension information from MacOS kernel cache. #CapstoneInside |
https://github.com/cocoahuke/mackextdump |
None |
Security researcher. |
None |
None |
23 |
0 |
105 |
70 |
17 |
Objective-C,C |
78 |
15 |
n0fate |
Another new macOS keychain cracker https://github.com/macmade/KeychainCracker by @ macmade The other one is |
https://github.com/n0fate/chainbreaker |
None |
|
None |
None |
16 |
0 |
68 |
70 |
7 |
Python |
281 |
60 |
t00lsnet |
T00ls.Net 沙龙第一期 2017上 PPT合集 |
https://github.com/t00lsnet/Salon1 |
https://www.t00ls.net |
|
HongKong |
None |
6 |
0 |
0 |
70 |
1 |
HTML |
15 |
12 |
xiamx |
wesome-sentiment-analysis: A curated list of Sentiment Analysis methods |
https://github.com/xiamx/awesome-sentiment-analysis |
https://www.cs.mcgill.ca/~mxia3/ |
Distributed System Engineer - Mobile/Web Full Stack - Devops. NLP researcher in progress. |
Montreal |
None |
92 |
0 |
215 |
69 |
27 |
Python,TypeScript,HTML,Elixir |
0 |
0 |
polymorf |
IDA pro plugin to find crypto constants (and more) based on YARAhttps://github.com/polymorf/findcrypt-yara |
https://github.com/polymorf/findcrypt-yara |
http://www.davidberard.fr |
|
france |
polymorf.fr |
29 |
0 |
11 |
67 |
2 |
Python,Perl |
341 |
89 |
seb-m |
pyinotify:Linux文件系统监控工具 |
https://github.com/seb-m/pyinotify |
http://seb.dbzteam.org/ |
|
Marseille, France, EU |
None |
16 |
0 |
1200 |
67 |
0 |
Python,C,Rust |
1900 |
323 |
Jsitech |
relayer - SMB 重放攻击脚本: |
https://github.com/Jsitech/relayer |
http://www.jasonsoto.com |
IT Security Professional , Information Security Manager , Security+ , SSCP , Pentester |
None |
None |
24 |
0 |
12 |
66 |
3 |
Shell,PHP |
0 |
0 |
deadPix3l |
CryptSky - 一个简单的,完全由 python 编写的勒索软件样本: |
https://github.com/deadPix3l/CryptSky/ |
None |
A jack of all trades, master of none. Still oftentimes better than a master of one. |
None |
None |
12 |
0 |
105 |
66 |
30 |
Python,Vim |
0 |
0 |
oranav |
Samsung GT-I9300 手机 eMMC 芯片研究相关的一些工具和 sboot Exploit 代码: |
https://github.com/oranav/i9300_emmc_toolbox |
https://oranav.me |
|
Israel |
None |
11 |
0 |
13 |
66 |
14 |
C,JavaScript |
0 |
0 |
wizicer |
开源项目挣钱实用手册 |
https://github.com/wizicer/FinancialSupportForOpenSource/blob/master/README.md |
http://icerdesign.com |
Software Architect |
Shanghai, China |
Honeywell |
50 |
0 |
377 |
66 |
41 |
C#,TypeScript,HTML |
0 |
0 |
A-mIn3 |
Powershell-based Windows Security Auditing Toolbox |
https://github.com/A-mIn3/WINspect |
https://twitter.com/_A_mIn3 |
If it is useful it can be abused |
LSASS |
None |
165 |
0 |
172 |
65 |
39 |
C,Java,Python,C++,C#,PowerShell |
0 |
0 |
Microwave89 |
逃避内存扫描 |
https://github.com/Microwave89/rtsectiontest |
None |
|
None |
Stealth Enhancements Providers LLC |
24 |
0 |
7 |
65 |
4 |
C |
62 |
41 |
bollwarm |
sectoolset -- 搜集的Github关于安全工具集合 |
https://github.com/bollwarm/sectoolset |
http://ijz.me |
Perl , OP and SEC |
china |
ijz.me |
340 |
0 |
189 |
65 |
38 |
Python,Pascal,PHP,Perl |
0 |
0 |
AviAvni |
NativeLeakDetector - 调用 ETW 检测 Windows 内存泄漏: |
https://github.com/AviAvni/NativeLeakDetector |
https://twitter.com/AviAvni3 |
Consultant at SELA Group .NET C# Spark F# Compiler Contributor Neo4j Certified Professional |
Israel |
SELA Group |
33 |
0 |
705 |
64 |
144 |
C#,F# |
0 |
0 |
ak1t4 |
open-redirect-scanner - 任意网址跳转漏洞扫描脚本: |
https://github.com/ak1t4/open-redirect-scanner |
http://hackerone.com/ak1t4 |
|
None |
None |
6 |
0 |
0 |
64 |
2 |
Python,HTML |
170 |
54 |
joe-shenouda |
awesome-cyber-skills:黑客技术训练环境 |
https://github.com/joe-shenouda/awesome-cyber-skills |
https://nl.linkedin.com/in/josephshenouda |
Principal Cyber Analyst at Verizon |
The Netherlands |
Verizon |
1 |
0 |
56 |
64 |
6 |
|
0 |
0 |
mikesart |
GPUVis - 可视化的 GPU Trace 工具: |
https://github.com/mikesart/gpuvis |
None |
|
Colorado Springs |
None |
41 |
0 |
26 |
64 |
6 |
Python,C,C++ |
0 |
0 |
ring0lab |
catphish - 用于网络钓鱼和企业间谍活动中的相似域名生成工具: |
https://github.com/ring0lab/catphish |
http://ring0lab.com |
|
Matrix |
None |
37 |
0 |
273 |
64 |
3 |
C,Shell,Python,Go,Ruby,PowerShell |
459 |
106 |
bee13oy |
攻击杀软的(Windows)内核驱动,来自 bee13oy 在 Zer0Con2017 会议的演讲: |
https://github.com/bee13oy/AV_Kernel_Vulns/tree/master/Zer0Con2017 |
None |
Security Researcher & Bug Hunter |
None |
None |
1 |
0 |
5 |
63 |
1 |
C++ |
211 |
70 |
knightmare2600 |
ShadowBrokers 泄露的攻击工具,包括最近几个月的 monthlyleaks,有可能是最近的用户付费订阅服务中的那些攻击工具: |
https://github.com/knightmare2600/ShadowBrokers/tree/master/monthlyleaks |
None |
knightmare@granada[~]$ vlc wia.avi -V aa && nmap -A 0.0.0.0/0 , tee http://nmap.report && vim http://nmap.report |
The 80s |
None |
59 |
0 |
22 |
63 |
5 |
Python,C,Batchfile,Visual,Perl |
0 |
0 |
lauixData |
leakPasswd: Python 密码泄露查询模块 |
https://github.com/lauixData/leakPasswd |
https://5a8.org |
In me the tiger sniffes the rose. |
China |
None |
2 |
0 |
60 |
63 |
9 |
Python |
0 |
0 |
gellin |
TeamViewer_Permissions_Hook_V1 - 通过向 TeamViewer 注入 DLL 并改写内存的方式实现对特殊功能限制的破解,譬如特殊菜单的启用: https://github.com/gellin/TeamViewer_Permissions_Hook_V1TeamViewer 紧急推出了补丁,已修复这个问题: |
https://github.com/gellin/TeamViewer_Permissions_Hook_V1TeamViewer |
None |
Integration Engineer, red/blue team hacker, avid AWS user |
Denver, CO |
None |
4 |
0 |
29 |
62 |
12 |
C#,JavaScript,C++ |
248 |
71 |
MiniSafe |
MicroScan 基于B/S架构微扫描器 |
https://github.com/MiniSafe/microscan |
None |
我系渣渣辉,快啦玩贪玩拦月 |
None |
None |
22 |
0 |
67 |
60 |
3 |
Python,Shell,JavaScript |
74 |
30 |
Song-Li |
(Cross-)Browser Fingerprinting via OS and Hardware Level Features : http://yinzhicao.org/TrackingFree/crossbrowsertracking_NDSS17.pdf (pdf) ,Github : |
https://github.com/Song-Li/cross_browser |
http://www.songli.io |
Ph.D. student at Johns Hopkins University, Keep Young, Keep Simple, Keep Naive. |
None |
The Johns Hopkins University |
57 |
0 |
13 |
60 |
6 |
Python,CoffeeScript,JavaScript,C++ |
874 |
192 |
dyjakan |
Fuzzing results for various interpreters. |
https://github.com/dyjakan/interpreter-bugs |
https://dyjak.me |
Application Security. Vulnerability Research. Fuzzing. Exploit Development. |
Warsaw, Poland |
None |
73 |
0 |
1200 |
60 |
107 |
Python,DTrace,C,Ruby |
73 |
14 |
mxcxvn |
BurpUnlimited: EXTENDS BurpLoaders license |
https://github.com/mxcxvn/BurpUnlimited |
None |
|
None |
None |
3 |
0 |
1 |
60 |
0 |
JavaScript,CSS |
60 |
8 |
ntrippar |
sekey - 使用 Touch ID / Secure Enclave 进行 SSH 身份验证: |
https://github.com/ntrippar/sekey |
None |
|
New York, NY |
None |
20 |
0 |
108 |
60 |
40 |
Jupyter,Python,Perl,HTML,Rust,Swift,CSS |
78 |
21 |
reinterpretcat |
用于构建 LFS(Linux From Scratch system)系统的 Docker 配置文件: |
https://github.com/reinterpretcat/lfs |
None |
|
Berlin, Germany |
None |
10 |
0 |
3 |
60 |
2 |
Shell,C++ |
0 |
0 |
yrp604 |
I wrote a ptrace based assembly repl for x86, armv7, amd64. Useful for quickly playing with unknown instructions. |
https://github.com/yrp604/rappel |
None |
|
Vancouver, BC |
None |
32 |
0 |
76 |
60 |
0 |
C,C++ |
702 |
39 |
diogo-fernan |
malsub - 用于在线恶意软件分析和威胁情报服务的 Python RESTful API 框架: |
https://github.com/diogo-fernan/malsub?utm_content=buffer51301&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer |
https://twitter.com/dfernan__ |
|
Somewhere in Portugal |
None |
17 |
0 |
448 |
59 |
21 |
Python,TeX,C,Batchfile,PowerShell |
0 |
0 |
h4ck0ne |
安全技能树小密圈2017精选 |
https://github.com/h4ck0ne/security_circle_2017/blob/master/SUMMARY.md |
http://hackone.cc |
http://hackone.cc |
None |
None |
247 |
0 |
2 |
59 |
20 |
C,Java,Python,JavaScript,HTML,PowerShell |
74 |
79 |
milesrichardson |
docker-onion-nmap - 集成 Tor / proxychains / dnsmasq / nmap 等工具对 .onion 隐藏服务进行扫描的 Docker 容器: |
https://github.com/milesrichardson/docker-onion-nmap |
https://github.com/splitgraph |
Startup founder and software consultant. Working on @splitgraph |
Cambridge, UK |
@splitgraph |
17 |
0 |
810 |
59 |
82 |
Python,TeX,Shell,Ruby |
0 |
0 |
eviltik |
evilwaf: Web Application Firewall (WAF) Detection Tool |
https://github.com/eviltik/evilwaf |
None |
nodejs & security tools addict |
Sri Lanka (or not) |
None |
19 |
0 |
35 |
58 |
21 |
JavaScript |
375 |
48 |
joanbono |
Snorter: Snort + Barnyard2 + Pulledpork → The easy way! |
https://github.com/joanbono/Snorter |
http://joanbono.github.io |
IT Security Analyst / Pentester |
Prague |
¯_(ツ)_/¯ |
30 |
0 |
56 |
58 |
103 |
Go,Shell |
0 |
0 |
MRGEffitas |
Ironsquirrel - 以加密的方式将浏览器漏洞利用代码发往受害者浏览器的工具: |
https://github.com/MRGEffitas/Ironsquirrel |
https://www.mrg-effitas.com |
|
None |
Effitas Ltd |
15 |
0 |
2 |
57 |
0 |
Python,C#,C,JavaScript,HTML |
153 |
46 |
kevin2600 |
Bluetooth that bites -SmartLock-Hacking 蓝牙开锁技术研究 |
https://github.com/kevin2600/BTLE-SmartLock-Hacking/blob/master/Ozlockcon-2017-Bluetooth%20that%20bites.pdf |
https://www.youtube.com/user/ReverseKevin |
|
None |
None |
3 |
0 |
0 |
57 |
11 |
Python |
20 |
5 |
mdhiggins |
ESP8266 兼容的远红外控制器(IR Blaster): |
https://github.com/mdhiggins/ESP8266-HTTP-IR-Blaster/ |
None |
|
None |
None |
14 |
0 |
28 |
57 |
1 |
Python,C#,C++,Perl |
877 |
181 |
rexdex |
把 Xbox360 的可执行文件移植到 Windows 系统上运行: |
https://github.com/rexdex/recompiler |
None |
A one happy programmer. |
Warsaw, Poland |
True Rebels |
3 |
0 |
12 |
57 |
1 |
CSS,C++ |
1300 |
73 |
Nitr4x |
whichCDN: 网站 CDN 服务商识别工具 |
https://github.com/Nitr4x/whichCDN |
None |
Pentester / Hacker / Risk analyst |
None |
None |
11 |
0 |
28 |
56 |
10 |
Python,Go,Shell,Dockerfile,Perl |
105 |
42 |
Biprodeep |
wesome-ml-for-cybersecurity - 优秀的网络安全机器学习资源整合: |
https://github.com/Biprodeep/awesome-ml-for-cybersecurity |
None |
Researcher on integrated logics,information security and artificial intelligence. |
None |
Virtually Unvoid Defensive |
61 |
0 |
28 |
55 |
50 |
Python,C,Shell |
30 |
9 |
Eun |
ctf.tf - CTF 题目及其解决方案收集整理: https://t.co/ffhj5FNqy3,GitHub : |
https://github.com/Eun/ctf.tf |
https://salzmann.to |
|
Berlin (Germany) |
None |
150 |
0 |
583 |
55 |
0 |
Go,JavaScript,C++ |
1000 |
81 |
Tylous |
SniffAir - 无线渗透测试框架: |
https://github.com/Tylous/SniffAir |
https://twitter.com/Tyl0us |
|
None |
None |
5 |
0 |
28 |
55 |
10 |
Python,C,HTML |
956 |
132 |
V-E-O |
上周五推送的 Janus Android APK 签名有效性漏洞(CVE-2017-13156),有研究员公开了 PoC: |
https://github.com/V-E-O/PoC/tree/master/CVE-2017-13156 |
None |
|
None |
None |
59 |
0 |
43 |
55 |
45 |
C,Makefile |
0 |
0 |
a7vinx |
angr-doc-zh_CN: Angr-doc的中文翻译 (开源符号执行框架) |
https://github.com/a7vinx/angr-doc-zh_CN |
https://a7vinx.github.io |
|
None |
None |
20 |
0 |
1300 |
55 |
52 |
Python,C,C++ |
0 |
0 |
cuijianxiong |
基于Django 框架 Redis ElasticSearch Web指纹搜索引擎 |
https://github.com/cuijianxiong/websearch |
http://cuijianxiong.top |
LVU |
None |
None |
49 |
0 |
122 |
55 |
44 |
Python,JavaScript,Roff |
53 |
26 |
sa7mon |
S3Scanner: Scan for open S3 buckets and dump |
https://github.com/sa7mon/S3Scanner |
https://github.com/mnsu-isso |
Computer Science student - currently looking for a job! Contact info available at personal website. |
USA |
@mnsu-isso |
76 |
0 |
236 |
55 |
20 |
Python |
0 |
0 |
h-j-13 |
Malicious_Domain_Whois: 非法域名挖掘与画像系统 |
https://github.com/h-j-13/Malicious_Domain_Whois?from=timeline |
http://houjie13.com/ |
Student. |
Weihai, China |
Harbin Institute of Technology at Weihai |
58 |
0 |
323 |
54 |
56 |
Python,C++ |
0 |
0 |
timest |
goscan: 用Go开发可以内网活跃主机嗅探器 |
https://github.com/timest/goscan |
None |
|
China |
None |
9 |
0 |
145 |
53 |
7 |
Go,JavaScript |
557 |
75 |
NolanZhao |
实时监控1000家中国企业的新闻动态 |
https://github.com/NolanZhao/news_feed |
None |
|
Beijing.China |
None |
51 |
0 |
104 |
52 |
63 |
Python,Go,CSS |
0 |
0 |
nim4 |
数据库防火墙 |
https://github.com/nim4/DBShield |
None |
|
Izmir, Turkey |
None |
13 |
0 |
7 |
52 |
7 |
Go,Python,PHP,HTML,C++ |
573 |
132 |
technion |
3652fa - 绕过 Office 365 多因素认证抓取密码: |
https://github.com/technion/3652fa |
https://lolware.net |
|
Sydney, Australia |
None |
73 |
0 |
30 |
52 |
1 |
TypeScript,Shell,Ruby,Erlang |
0 |
0 |
SnakeHacker |
QA-Snake: 基于多搜索引擎和深度学习技术的自动问答 |
https://github.com/SnakeHacker/QA-Snake |
http://www.snakehacker.me |
You cannot improve your past, but you can improve your future. Once time is wasted, life is wasted. |
None |
None |
66 |
0 |
315 |
51 |
52 |
Python,JavaScript |
0 |
0 |
biggiesmallsAG |
nightHawkResponse - 事件响应取证框架: |
https://github.com/biggiesmallsAG/nightHawkResponse |
None |
|
None |
None |
4 |
0 |
1 |
51 |
0 |
Go,JavaScript |
530 |
119 |
chr4 |
Using Vim? Configuring or programming SSL/TLS servers? You better use this |
https://github.com/chr4/sslsecure.vim |
https://chr4.org |
Devops. Ive never asked for this. |
None |
None |
68 |
0 |
2 |
51 |
7 |
Go,SaltStack,Shell,Rust,Vim |
0 |
0 |
igogo-x86 |
HexRaysPyTools : An IDAPython framework targeting Hex-Rays and classes/structures : |
https://github.com/igogo-x86/HexRaysPyTools |
None |
|
None |
None |
3 |
0 |
92 |
51 |
2 |
Python,C++ |
560 |
114 |
j91321 |
rextRouter EXploitation ToolkitAuthor: @ j91321#router #exploit |
https://github.com/j91321/rext |
None |
|
None |
None |
10 |
0 |
75 |
51 |
1 |
Python,Ruby,Java |
0 |
0 |
BryanSharp |
HiBeaver is an android plugin for modifying your library jars byte code. |
https://github.com/BryanSharp/hibeaver |
https://github.com/microsoft |
Be creative |
Beijing |
@microsoft |
86 |
0 |
574 |
48 |
24 |
Groovy,Python,Java |
0 |
0 |
ydkhatri |
macOS 全盘镜像(Image)文件静态解析工具: |
https://github.com/ydkhatri/mac_apt |
https://www.swiftforensics.com |
Professor @ Champlain College |
None |
None |
19 |
0 |
9 |
48 |
1 |
Python |
146 |
22 |
UltimateHackers |
XSStrike - Fuzz XSS 漏洞的工具,可以自动发现并绕过常见 WAF: |
https://github.com/UltimateHackers/XSStrike |
None |
This profile has been moved to: https://github.com/s0md3v |
None |
None |
0 |
0 |
0 |
47 |
0 |
|
0 |
0 |
cliffe |
Security Scenario Generator (SecGen) - 随机创建存在漏洞的虚拟机,方便学习渗透测试技术: |
https://github.com/cliffe/SecGen |
http://z.cliffe.schreuders.org |
|
Most of my code is hosted elsewhere, but I am growing to like GitHub... |
None |
9 |
0 |
1 |
47 |
0 |
JavaScript,Ruby |
0 |
0 |
m0l1ce |
wooyunallbugs: wooyun_all_bugs 历史存档数据和图片 |
https://github.com/m0l1ce/wooyunallbugs |
None |
|
None |
vipkid |
14 |
0 |
16 |
47 |
16 |
Lua,Dockerfile,JavaScript,Shell,CSS |
353 |
138 |
1111joe1111 |
用于辅助 IDA 逆向的多个脚本工具: |
https://github.com/1111joe1111/ida_ea |
None |
|
None |
None |
2 |
0 |
13 |
46 |
0 |
Python |
372 |
75 |
Professor-plum |
Just posted my source code to GitHub for reflectively loading a Windows kernel driver |
https://github.com/Professor-plum/Reflective-Driver-Loader |
None |
|
None |
None |
6 |
0 |
2 |
46 |
3 |
HTML,Ruby,C++ |
252 |
114 |
f0rgetting |
《Make LoadLibrary Great Again》,来自绿盟科技张云海在 POC 2017 会议的演讲。介绍了如何 Bypass 各种缓解措施,实现 Windows 10 系统中 LoadLibrary 的再次利用: |
https://github.com/f0rgetting/Presentations/blob/master/POC%202017%20-%20Make%20LoadLibrary%20Great%20Again.pdf |
None |
|
None |
None |
1 |
0 |
0 |
46 |
0 |
|
76 |
22 |
hegusung |
AVSignSeek - 在恶意软件 Payload 二进制文件中定位杀软查杀特征(Signature)偏移量的工具: |
https://github.com/hegusung/AVSignSeek |
https://twitter.com/hegusung |
|
Behind you |
None |
14 |
0 |
19 |
46 |
0 |
Python,JavaScript |
264 |
54 |
pbiernat |
ripr - 将二进制工具打包成 Python 软件包的工具,基于 Binary Ninja 和 Unicorn Engine 实现: |
https://github.com/pbiernat/ripr |
https://github.com/ret2 |
|
New York |
@ret2 |
6 |
0 |
28 |
46 |
0 |
Python,C++ |
264 |
25 |
repoog |
GitPrey: GitHub敏感信息扫描工具 |
https://github.com/repoog/GitPrey |
None |
Hacker, Engineer, PM |
None |
None |
11 |
0 |
20 |
46 |
1 |
Python,Shell,C,PHP |
336 |
131 |
securesocketfunneling |
SSF - 在 TLS 隧道下提供 TCP/UDP 端口转发、SOCKS5 代理以及远程 Shell 的工具: |
https://github.com/securesocketfunneling/ssf |
None |
|
None |
None |
7 |
0 |
0 |
46 |
0 |
C,CMake,C++ |
859 |
125 |
securing |
GATTacker - BLE(蓝牙低功耗)设备的中间人劫持测试工具,是个 Node.js 包: https://tirateunping.wordpress.com/2016/11/01/gattacker-ble-bluetooth-low-energy-man-in-the-middle/ |
https://github.com/securing/gattacker |
https://www.securing.pl |
|
None |
None |
7 |
0 |
3 |
46 |
0 |
Python,JavaScript,Swift |
342 |
96 |
GoFetchAD |
BloodHound 是一个模拟攻击计划的应用,可以用它画出 Active Directory 环境中攻击步骤与关系。而 GoFetch 是 BloodHound 攻击计划的自动化实施工具: https://github.com/BloodHoundAD/BloodHound |
https://github.com/GoFetchAD/GoFetch |
None |
|
None |
None |
2 |
0 |
1 |
45 |
1 |
C,PowerShell |
438 |
82 |
bowu678 |
php_bugs: PHP代码审计分段讲解 |
https://github.com/bowu678/php_bugs |
http://www.bowu8.com |
More efforts to more happiness. |
None |
None |
1 |
0 |
2 |
45 |
15 |
PHP |
727 |
212 |
toyakula |
Luna: 开源的轻量级被动式扫描框架 |
https://github.com/toyakula/luna |
None |
|
None |
None |
1 |
0 |
2 |
45 |
0 |
Python |
264 |
64 |
ALSchwalm |
dwarfexport - 从 IDA Pro 中导出 dwarf 调试信息的工具,dawrf 信息可以导入 gdb 等调试器: |
https://github.com/ALSchwalm/dwarfexport |
https://github.com/starlab-io |
Im a software engineer and security researcher, mostly working with rust and C. Sometimes some elisp stuff too. |
Huntsville, AL |
@starlab-io |
95 |
0 |
162 |
44 |
5 |
Python,C,Emacs,Rust,C++ |
0 |
0 |
HackingThings |
Just finished uploading all past publications, including code and demo videos. now available at |
https://github.com/HackingThings/Publications |
http://laplinker.com |
|
None |
None |
8 |
0 |
14 |
44 |
12 |
C#,JavaScript,HTML |
48 |
16 |
dekimir |
RamFuzz - 基于深度神经网络、自动化生成单元测试用例的 C++ 代码 Fuzzing: |
https://github.com/dekimir/RamFuzz/blob/master/sci/ramfuzz.md |
https://github.com/google |
@google 2014-16; Endeca 2004-14; ProfitLogic 2001-04; Sun Microsystems 1999-2001; @rice-university 1993-99 |
Waterloo, Ontario |
None |
7 |
0 |
3 |
44 |
4 |
Jupyter,C++ |
269 |
36 |
CapacitorSet |
box-js : A tool for studying JavaScript malware : |
https://github.com/CapacitorSet/box-js |
https://keybase.io/CapacitorSet |
I move electrons around. |
None |
None |
68 |
0 |
156 |
43 |
2 |
Go,JavaScript,C++,Scala |
0 |
0 |
exakat |
Static analysis tools for PHP (PHP静态分析工具列表) |
https://github.com/exakat/php-static-analysis-tools |
http://www.exakat.io/ |
Exakat is a static analysis engine for PHP. |
Internet |
Exakat |
14 |
0 |
3 |
43 |
0 |
Shell,PHP,Makefile |
2000 |
200 |
vitaly-kamluk |
Bitscout - 一款用于远程数字取证的工具: https://securelist.com/bitscout-the-free-remote-digital-forensics-tool-builder/78991/ Github: |
https://github.com/vitaly-kamluk/bitscout |
None |
|
None |
None |
5 |
0 |
1 |
43 |
1 |
C,Shell,C++ |
285 |
66 |
A3sal0n |
CyberThreatHunting: A collection of resources for Threat Hunters |
https://github.com/A3sal0n/CyberThreatHunting |
None |
|
None |
None |
5 |
0 |
1 |
42 |
0 |
Python |
293 |
73 |
wolfpack1 |
intel_collection_tools: 多个威胁情报分析的脚本文件 |
https://github.com/wolfpack1/intel_collection_tools |
http://wapacklabs.com/ |
|
Manchester NH |
Wapack Labs |
10 |
0 |
7 |
42 |
3 |
Python,Shell,Ruby |
30 |
7 |
CERT-W |
certitudePython-based tool which aims at assessing the compromised perimeter during IR assignments |
https://github.com/CERT-W/certitude |
http://wavestone-advisors.com/ |
|
La Défense, Paris, France |
Wavestone |
4 |
0 |
3 |
41 |
0 |
Python |
106 |
27 |
abazhaniuk |
给手机的一颗蓝色药丸,来自 BlackHat 会议的一篇,关于 ARM TrustZone 和 Hypervisor 的逆向和攻击: |
https://github.com/abazhaniuk/Publications/blob/master/2017/BlackHat_USA_2017/us-17-Bazhaniuk-Bulygin-BluePill-for-Your-Phone.pdf |
None |
Independent Security Researcher |
None |
None |
61 |
0 |
4 |
41 |
1 |
Python,Shell,Java,C++ |
60 |
8 |
brunofacca |
zen-rails-security-checklist: Ruby 程序基线检查列表 |
https://github.com/brunofacca/zen-rails-security-checklist |
https://github.com/toptal |
Backend Developer (Ruby on Rails) at @toptal. |
Brazil |
@toptal |
6 |
0 |
82 |
41 |
55 |
Ruby |
0 |
0 |
leveryd |
vulndocker: 漏洞靶场平台 |
https://github.com/leveryd/vulndocker |
None |
|
None |
None |
50 |
0 |
600 |
41 |
41 |
Python,Visual,JavaScript,CSS |
41 |
14 |
36hours |
uEmu - 基于 Unicorn 实现的 IDA CPU 模拟器插件,之前还推送过一个类似的 idaemu: https://github.com/alexhude/uEmu |
https://github.com/36hours/idaemu |
None |
|
China,guangzhou |
None |
6 |
0 |
177 |
40 |
0 |
Python,JavaScript,HTML |
0 |
0 |
gdelugre |
IDA ARM 指令解码与高亮的插件: |
https://github.com/gdelugre/ida-arm-system-highlight |
https://twitter.com/lapinhib0u |
|
São Paulo |
None |
14 |
0 |
17 |
40 |
0 |
Python,C,Ruby,C++ |
0 |
0 |
gymgle |
区块链资料 |
https://github.com/gymgle/blockchain-reference |
https://g2ex.github.io |
Im nobody. |
None |
None |
30 |
0 |
424 |
40 |
15 |
Python,Go,HTML |
180 |
59 |
hillbrad |
从实现角度对几款 U2F 双因素认证 TOKEN 设备的比较: https://github.com/hillbrad/U2FReviews#implissues |
https://github.com/hillbrad/U2FReviews#implissues |
None |
|
Seattle |
Facebook |
33 |
0 |
14 |
40 |
6 |
HTML,JavaScript |
362 |
22 |
ortegaalfredo |
将硬盘转换为特殊的麦克风设备: https://github.com/ortegaalfredo/kscope/blob/master/doc/HDD-microphones.pdf Video: |
https://github.com/ortegaalfredo/kscope/blob/master/doc/HDD-microphones.pdf |
None |
bio #5 |
Buenos Aires, Argentina |
None |
13 |
0 |
3 |
40 |
5 |
Python,TeX,C,Verilog |
149 |
23 |
silverf0x |
RpcView - powerfull RPC interface explorer (http://www.rpcview.org/features.html) now w/ source code - |
https://github.com/silverf0x/RpcView |
None |
|
None |
None |
8 |
0 |
6 |
40 |
1 |
Python,C,C++ |
248 |
67 |
subTee |
No Blog. Just code ;-) |
https://github.com/subTee/Shellcode-Via-HTAShellcode |
None |
|
None |
None |
1 |
0 |
0 |
40 |
0 |
|
1 |
0 |
tbarabosch |
quincy - 内存取证工具,从内存转储中检测代码注入攻击: |
https://github.com/tbarabosch/quincy |
http://tbarabosch.de/ |
I ❤️ everything that compiles down to machine code 🤓. |
Bonn, Germany |
Fraunhofer FKIE |
20 |
0 |
164 |
40 |
40 |
Python,C,Emacs,OCaml |
0 |
0 |
linchaolong |
可视化的跨平台 apk 分析工具 |
https://github.com/linchaolong/ApkToolPlus |
http://www.jianshu.com/users/149dc6683cc7 |
|
Guangzhou China |
linchaolong |
9 |
0 |
201 |
39 |
1 |
Java |
483 |
140 |
pellegre |
libcrafter: 用于网络数据包嗅探和制作的高等级 C++ 库: |
https://github.com/pellegre/libcrafter |
https://twitter.com/zesteban |
|
None |
None |
6 |
0 |
11 |
39 |
12 |
JavaScript,C++ |
227 |
77 |
z00nx |
Analyse SQL injection attempts in web server logs |
https://github.com/z00nx/reversemap |
https://z00nx.github.io |
|
None |
None |
51 |
0 |
428 |
39 |
149 |
Python,PowerShell |
0 |
0 |
danielplohmann |
apiscout - aims at simplifying Windows API import recovery on arbitrary memory dumps. Based on IDAPython, pefile. |
https://github.com/danielplohmann/apiscout |
https://github.com/fkie |
Malware Researcher. Working for Fraunhofer @fkie. |
None |
None |
7 |
0 |
79 |
38 |
0 |
Python |
0 |
0 |
aurel26 |
TS-Security-Editor: Windows 远程桌面服务安全配置工具: |
https://github.com/aurel26/TS-Security-Editor |
None |
|
None |
None |
5 |
0 |
1 |
37 |
0 |
C,HTML,C++ |
40 |
8 |
eliasgranderubio |
dagda: static analysis of known vulnerabilities in docker images/containers |
https://github.com/eliasgranderubio/dagda |
https://twitter.com/3grander |
|
Spain |
None |
9 |
0 |
8 |
37 |
4 |
Python |
0 |
0 |
gelim |
基于Censys API 的命令行搜索脚本 |
https://github.com/gelim/censys |
None |
Insecurity researcher |
None |
None |
15 |
0 |
14 |
37 |
1 |
Python |
0 |
0 |
tylabs |
Open source QuickSand.io Document Malware analysis tool updated with some safety and performance enhancements |
https://github.com/tylabs/quicksand_lite/releases/tag/01.01.002 |
https://tylabs.com |
Tools to detect malware in common document formats. |
Canada |
tylabs |
17 |
0 |
30 |
37 |
0 |
Bro,Python,C,HTML,PHP |
113 |
30 |
JKO |
nsearch: minimal script to help find script into the nse database |
https://github.com/JKO/nsearch |
None |
|
Colombia |
DragonJAR SAS |
37 |
0 |
29 |
36 |
33 |
Python,Shell,JavaScript,PHP |
113 |
36 |
Sambor123 |
最全的中文版深度学习资源索引 |
https://github.com/Sambor123/Awesome-Deep-Learning-for-Chinese |
None |
A deep spider interested in machine learning |
Beijing Haidian |
Beijing Jiaotong Univercity |
27 |
0 |
9 |
36 |
4 |
Python,JavaScript,Java,HTML |
157 |
90 |
maximehip |
Safari-iOS10.3.2-macOS-10.12.4-exploit-Bugs,利用以下几个漏洞穿越 Safari 的沙箱(TOCTOU in diskarbitrationd/PID reuse logic bug in authd/Arbitrary dylib loading in speechsynthesisd/NULL ptr dereference in nsurlstoraged): |
https://github.com/maximehip/Safari-iOS10.3.2-macOS-10.12.4-exploit-Bugs |
None |
|
None |
None |
25 |
0 |
1 |
36 |
1 |
Logos,C,JavaScript,Swift,Objective-C |
82 |
19 |
simonclausen |
dnscrypt-autoinstall - 自动安装和配置 DNSCrypt 的脚本: |
https://github.com/simonclausen/dnscrypt-autoinstall |
https://simonclausen.dk |
|
Denmark |
None |
33 |
0 |
42 |
36 |
2 |
C#,Python,Shell,PHP,CSS |
228 |
83 |
Den1al |
JSShell - An interactive multi-user web JS shell written in #Python |
https://github.com/Den1al/JSShell/ |
http://blog.den1al.com |
|
None |
None |
9 |
0 |
7 |
35 |
4 |
Python |
212 |
54 |
c0d3z3r0 |
有研究者公开了一个前两周的 Linux Sudo get_process_ttyname()(CVE-2017-1000367) 漏洞的 Exploit: http://seclists.org/oss-sec/2017/q2/470 |
https://github.com/c0d3z3r0/sudo-CVE-2017-1000367 |
None |
|
3072R/22274CD17216A9FC |
None |
63 |
0 |
19 |
35 |
5 |
Python,C,Shell |
114 |
38 |
paulgclark |
waveconverter : An Open Source tool for RF reverse engineering : https://github.com/paulgclark/waveconverter |
https://github.com/paulgclark/waveconverter |
http://www.factorialabs.com |
|
Bellevue, WA |
Factoria Labs |
13 |
0 |
62 |
35 |
2 |
Python,C,Shell |
379 |
47 |
AndreaOm |
小密圈备份-json版本 |
https://github.com/AndreaOm/xiaomiquan_bak |
None |
Nothing |
z |
None |
18 |
0 |
901 |
34 |
26 |
Python,HTML,JavaScript |
0 |
0 |
icchy |
Windows API tracer with @ unicorn_engine |
https://github.com/icchy/unitracer |
https://github.com/TokyoWesterns |
capturing the flag at @TokyoWesterns |
Tokyo |
None |
32 |
0 |
42 |
34 |
9 |
Python,Go,C,Java |
0 |
0 |
kd8bny |
LiMEaide - 基于 Python 实现的远程转储 Linux 客户端 RAM 工具: |
https://github.com/kd8bny/LiMEaide |
https://kd8bny.github.io/ |
Information Engineer with past experience in security, mobile, hardware, and autonomous dev. |
None |
None |
35 |
0 |
174 |
34 |
28 |
Python,C |
0 |
0 |
segment-srl |
htcap - Web 应用扫描器,可扫描 SPA: |
https://github.com/segment-srl/htcap |
None |
|
None |
None |
0 |
0 |
1 |
34 |
0 |
|
0 |
0 |
freener |
Exploit for CVE-2016-5342 |
https://github.com/freener/exploits/tree/master/CVE-2016-5342. |
http://freener.github.io |
https://twitter.com/freener0 |
None |
None |
3 |
0 |
115 |
33 |
42 |
C,HTML |
32 |
17 |
int0 |
Decided to release my old Code Integrity bypass PoC |
https://github.com/int0/ltmdm64_poc |
None |
|
None |
None |
9 |
0 |
0 |
33 |
0 |
C,Batchfile,C++ |
58 |
19 |
BeetleChunks |
redsails - 一个基于 Python 的后渗透项目,旨在绕过基于主机的安全监控与日志记录: |
https://github.com/BeetleChunks/redsails |
https://redsails.io |
OSCP, Red Teamer, Pentester, Developer, Hacker |
None |
None |
9 |
0 |
51 |
32 |
2 |
Python,C,PowerShell |
208 |
57 |
daniel-gallagher |
Automated install scripts for Cuckoo sandbox 一键安装 Cuckoo |
https://github.com/daniel-gallagher/cuckoo-autoinstall |
None |
|
None |
None |
36 |
0 |
37 |
32 |
17 |
Python,Shell,Jupyter |
0 |
0 |
maxwellkoh |
2FAssassin - 双因素认证绕过工具: |
https://github.com/maxwellkoh/2FAssassin |
None |
|
None |
None |
10 |
0 |
0 |
32 |
0 |
Python,Ruby |
0 |
0 |
mrschyte |
#Nmap Converter - Python script for converting nmap reports into XLS |
https://github.com/mrschyte/nmap-converter |
None |
|
None |
None |
32 |
0 |
11 |
32 |
2 |
Python,C,Shell |
148 |
39 |
nsmfoo |
Script to create templates to use with VirtualBox to make vm detection harder |
https://github.com/nsmfoo/antivmdetection |
http://blog.prowling.nu |
|
Sweden |
None |
19 |
0 |
24 |
32 |
15 |
Python |
0 |
0 |
zyrikby |
Releasing data related to the evolution of the Android permissions work |
https://github.com/zyrikby/android_permission_evolution |
https://zhauniarovich.com |
|
Minsk, Belarus |
Perfect Equanimity |
13 |
0 |
174 |
32 |
4 |
Python,HTML,Java |
51 |
14 |
antoinet |
valora - 发送随机 MAC 地址和 SSID 以迷惑 WiFi 追踪系统的工具: |
https://github.com/antoinet/valora |
http://ant0i.net |
|
Zürich |
None |
37 |
0 |
23 |
31 |
16 |
C,Java,Python,JavaScript,Objective-C,CMake,PowerShell |
64 |
10 |
jjf012 |
PassiveScanner: 基于Mitmproxy和Arachni的被动式扫描器 |
https://github.com/jjf012/PassiveScanner |
None |
|
None |
None |
80 |
0 |
349 |
31 |
4 |
Python,Shell,PHP |
93 |
28 |
samizzo |
hexed - Windows 终端下的 hex 编辑器: |
https://github.com/samizzo/hexed |
http://www.horsedrawngames.com |
Console, PC, mobile video games outsourcing and development. |
Melbourne, Australia |
Horse Drawn Games |
30 |
0 |
4 |
31 |
11 |
C#,JavaScript,Assembly,C++ |
0 |
0 |
0xM3R |
cgPwn : A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) & wargaming tasks : |
https://github.com/0xM3R/cgPwn |
None |
BSoD |
None |
None |
69 |
0 |
218 |
30 |
169 |
C,Shell,Assembly,Python,C++,Vim |
314 |
63 |
GradiusX |
ArbitraryOverwrite exploit for Win10 x64 v1511 w/ SMEP bypass : https://github.com/GradiusX/HEVD-Python-Solutions/blob/master/Win10%20x64%20v1511/HEVD_arbitraryoverwrite.py cc @ GradiusX |
https://github.com/GradiusX/HEVD-Python-Solutions/blob/master/Win10%20x64%20v1511/HEVD_arbitraryoverwrite.py |
None |
|
None |
None |
3 |
0 |
1 |
30 |
0 |
Python,CSS |
132 |
45 |
alexander-hanel |
idapython6to7 - IDA Pro 7.0 的 IDAPython 与上一个版本(6.x) 的 API/变量名 差异对照表: |
https://github.com/alexander-hanel/idapython6to7 |
None |
|
Boulder, Colorado USA |
None |
6 |
0 |
57 |
30 |
26 |
Python,C++ |
63 |
13 |
enzet |
从时间轴的角度回顾符号执行(Symbolic execution)及其衍生技术/工具的发展: |
https://github.com/enzet/symbolic-execution |
http://enzet.ru |
|
Moscow, Russia |
Institute for System Programming RAS |
12 |
0 |
128 |
30 |
28 |
TeX,Python |
0 |
0 |
nluedtke |
linux_kernel_cves - Linux 内核 CVE 追踪: |
https://github.com/nluedtke/linux_kernel_cves |
https://github.com/fireeye |
Security Engineer. |
None |
FireEye @fireeye |
8 |
0 |
19 |
30 |
6 |
Python,C,Vue,CSS |
215 |
32 |
retbandit |
微软威胁防护(ATP)平台的对抗技术研究,来自 BlackHat 2017 会议: |
https://github.com/retbandit/BlackHat2017/blob/master/eu-17-Thompson-Red-Team-Techniques-for-Evading-Bypassing-and-Disabling-MS-Advanced-Threat-Protection-and-Advanced-Threat-Analytics.pptx |
https://twitter.com/retBandit |
|
None |
None |
22 |
0 |
9 |
30 |
5 |
Python,Shell,PowerShell |
23 |
5 |
rudSarkar |
crlf-injector: Auto CRLF Injector |
https://github.com/rudSarkar/crlf-injector |
https://proghub.net |
Like To Break Things And Build.Just another security researcher interested in exploring new things. |
Natore, Bangladesh |
@GeekSoftBD |
49 |
0 |
46 |
30 |
40 |
Python |
0 |
0 |
koenbuyens |
kalirouter - 将 Kali Linux 搭建成路由器,该路由可将所有 HTTP/HTTPS 请求发送到 Burpsuite 代理以便分析: |
https://github.com/koenbuyens/kalirouter |
http://koen.buyens.org/ |
appsec for fun and profit |
None |
None |
5 |
0 |
118 |
29 |
36 |
Python,Shell,JavaScript |
0 |
0 |
xd4rker |
MinerBlock - 用于阻止基于 Web 页面的加密货币挖矿后门的浏览器扩展: |
https://github.com/xd4rker/MinerBlock |
https://twitter.com/xd4rker |
|
Morocco |
None |
15 |
0 |
594 |
29 |
13 |
Python,JavaScript,PHP |
0 |
0 |
Hopsken |
SaaS 创业公司安全基础(security-101-for-saas-startups ) |
https://github.com/Hopsken/security-101-for-saas-startups-zh_CN |
https://hopsken.com |
|
Shanghai, China |
None |
20 |
0 |
465 |
28 |
17 |
Swift,HTML,JavaScript,CSS |
93 |
18 |
elcodigok |
wphardening -WordPress 安全加固工具: |
https://github.com/elcodigok/wphardening |
http://caceriadespammers.com.ar |
Ing. en Computación, Analista en Sistemas y Técnico Informático por la Universidad Católica de Santiago del Estero D.A.S.S. San Salvador de Jujuy - Argentina. |
Jujuy - Argentina |
Cacería de Spammers |
22 |
0 |
18 |
28 |
4 |
Python,Shell,JavaScript |
141 |
28 |
frranck |
asm2c tool to convert 386-era TASM code to C https://github.com/frranck/asm2c used to convert old 8-players Bomberman clone... |
https://github.com/frranck/asm2c |
http://mumblecore.org |
|
Berlin |
None |
27 |
0 |
87 |
28 |
23 |
Java,Assembly |
0 |
0 |
jasonsheh |
FingerScan:网站服务识别工具 |
https://github.com/jasonsheh/FingerScan |
http://octfive.cn |
|
China |
None |
11 |
0 |
9 |
28 |
8 |
Python,JavaScript,HTML |
99 |
28 |
securifybv |
ShellLink - 处理 ShellLink(LNK) 文件的 .Net 类库: https://github.com/securifybv/ShellLink... |
https://github.com/securifybv/ShellLink... |
https://securify.nl |
|
Amsterdam |
Software Security |
7 |
0 |
0 |
26 |
0 |
C#,Python,PHP,Java,C++ |
55 |
20 |
virqdroid |
ZNIU - 趋势科技发现了一款利用 Linux 内核 Dirty COW 漏洞攻击 Android 手机的恶意软件。并且认为这是来源于国内的黑产组织的行为: http://blog.trendmicro.com/trendlabs-security-intelligence/zniu-first-android-malware-exploit-dirty-cow-vulnerability/ http://weibo.com/2255436844/FnHBwFWPb http://blog.tetrane.com/2017/09/dirtyc0w-1.html |
https://github.com/virqdroid/Android_Malware/tree/master/DirtyCow-trj |
http://virqdroid.com |
|
None |
None |
31 |
0 |
130 |
26 |
14 |
Python |
0 |
0 |
Monyer |
xssee: A js encode/decode simple tool for XSS |
https://github.com/Monyer/xssee |
None |
|
None |
None |
5 |
0 |
72 |
25 |
0 |
HTML,JavaScript,PHP,CSS |
11 |
4 |
Or3stis |
apparatus - IoT 网络安全性分析与可视化工具: |
https://github.com/Or3stis/apparatus |
None |
|
None |
None |
11 |
0 |
212 |
25 |
4 |
Python,JavaScript,Ruby |
190 |
76 |
Phype |
telnet-iot-honeypot: Python telnet honeypot for catching botnet binaries |
https://github.com/Phype/telnet-iot-honeypot |
https://github.com/fraunhoferSIT |
Interested in security and networking research. |
Darmstadt, Germany |
@fraunhoferSIT / TU Darmstadt |
2 |
0 |
3 |
25 |
4 |
Python |
168 |
56 |
ansjdnakjdnajkd |
最常用的 iOS 渗透测试工具集: |
https://github.com/ansjdnakjdnajkd/iOS |
https://github.com/ansjdnakjdnajkd |
Redteam/PT https://medium.com/@ansjdnakjdnajkd |
Singapore |
None |
7 |
0 |
390 |
25 |
24 |
JavaScript,Ruby,Perl |
272 |
71 |
jzadeh |
Aktaion - 用于研究 Exploit 和钓鱼检测的开源机器学习工具和样本 |
https://github.com/jzadeh/Aktaion |
None |
|
None |
None |
4 |
0 |
0 |
25 |
1 |
Python |
132 |
41 |
magicming200 |
tomcat后台弱口令扫描器,命令行版+图形界面版 |
https://github.com/magicming200/tomcat-weak-password-scanner |
None |
Do or Die! |
None |
None |
10 |
0 |
29 |
25 |
22 |
Python,PHP,Java |
64 |
33 |
niallmcl |
Code for Deep Android Malware Detection paper |
https://github.com/niallmcl/Deep-Android-Malware-Detection |
None |
|
None |
Queens University Belfast |
4 |
0 |
96 |
25 |
1 |
Python,Lua,MATLAB |
87 |
49 |
vtky |
Swizzler2 - 协助分析 MDM / EMS iOS 应用程序的工具: |
https://github.com/vtky/Swizzler2 |
None |
|
None |
None |
16 |
0 |
0 |
25 |
0 |
Go,Objective-C,JavaScript |
0 |
0 |
chen-charles |
PEDetour is a new tool using @capstone_engine & @keystone_engine to inject code to hook export functions of PE file |
https://github.com/chen-charles/PEDetour |
None |
uWaterloo CS |
None |
None |
13 |
0 |
45 |
24 |
5 |
Python,C,C++ |
0 |
0 |
odensc |
利用前两天爆出的 Android APK 签名验证漏洞 Janus 生成 APK 样本的工具: |
https://github.com/odensc/janus |
https://odensc.me |
Full-stack developer. |
None |
None |
57 |
0 |
6 |
24 |
0 |
Python,TypeScript,JavaScript,CSS |
0 |
0 |
rickey-g |
Apparently theres Fancy Bear source code found during IR on github |
https://github.com/rickey-g/fancybear |
None |
|
None |
None |
3 |
0 |
0 |
24 |
22 |
Python |
247 |
202 |
t4mo |
Http-Proxy-Scan: 利用censys.io快速爬取http代理 |
https://github.com/t4mo/Http-Proxy-Scan |
http://weibo.com/335407345 |
javascript,phpcoder security |
beijing |
TS |
210 |
0 |
186 |
24 |
51 |
Python,JavaScript |
61 |
18 |
eastee |
Breaking Google’s ReCaptcha v2 : https://east-ee.com/2017/02/28/rebreakcaptcha-breaking-googles-recaptcha-v2-using-google/ ,Github : |
https://github.com/eastee/rebreakcaptcha |
https://east-ee.com |
|
None |
None |
1 |
0 |
0 |
23 |
0 |
Python |
735 |
139 |
secfree |
bcrpscan: 智能备份文件扫描工具 |
https://github.com/secfree/bcrpscan |
None |
|
None |
None |
8 |
0 |
22 |
23 |
1 |
Python,HTML,Java |
64 |
31 |
securisec |
radare2 逆向框架的 wiki 文档整理: |
https://github.com/securisec/radare2_wiki |
None |
Hapsidas repo |
None |
None |
23 |
0 |
0 |
23 |
0 |
Python,TypeScript,JavaScript |
0 |
0 |
G4lB1t |
SmoothCriminal - 从光标移动速度的角度检测沙盒: |
https://github.com/G4lB1t/SmoothCriminal |
https://twitter.com/Gal_B1t |
Sr. Malware Psychologist |
Tel-Aviv |
None |
13 |
0 |
5 |
22 |
1 |
Python,PowerShell,C++ |
43 |
13 |
Maktm |
FLIRT database repository on GitHub: |
https://github.com/Maktm/FLIRTDB |
None |
|
None |
None |
18 |
0 |
14 |
22 |
1 |
Max,C,C++ |
0 |
0 |
blockadeio |
Best way to integrate into @ blockadeio is the cloud node /admin/add-indicators call. Python script sample here - |
https://github.com/blockadeio/cloud_node/blob/master/test-scripts/add-indicators.py |
https://www.blockade.io |
Built as a browser extension, Blockade blocks malicious resources from being viewed or loaded inside of Chrome. |
Internet |
None |
6 |
0 |
0 |
22 |
0 |
Python,JavaScript,HTML |
47 |
15 |
tnich |
honssh - HonSSH 旨在记录客户端和服务器之间所有SSH通信的密罐: |
https://github.com/tnich/honssh |
None |
|
United Kingdom |
None |
1 |
0 |
1 |
22 |
6 |
Python |
308 |
62 |
wylok |
opsweb: 百合网运维综合管理平台(Python+Flask框架+cmdb+scheduler+salt) |
https://github.com/wylok/opsweb |
None |
|
None |
None |
1 |
0 |
3 |
22 |
0 |
Python |
406 |
238 |
Huseck |
CTF线下赛思路总结手册 |
https://github.com/Huseck/CTF/blob/master/CTF%E7%BA%BF%E4%B8%8B%E8%B5%9B%E6%80%9D%E8%B7%AF%E6%80%BB%E7%BB%93%E6%89%8B%E5%86%8C.pdf |
http://www.xjseck.com |
|
None |
None |
17 |
0 |
4 |
21 |
4 |
Python,HTML,Java,PHP |
17 |
6 |
briterator |
@ BruceDawson0xB drpdb is a SymbolSort based tool to convert PDBs to a MySQL database - worth a look? |
https://github.com/briterator/drpdb |
None |
|
None |
None |
6 |
0 |
0 |
21 |
0 |
C++ |
31 |
7 |
flothrone |
用于防护 RootKits,确保启动链安全的 Intel 项目 - Boot Guard: https://github.com/flothrone/bootguard |
https://github.com/flothrone/bootguard |
None |
|
None |
None |
1 |
0 |
2 |
21 |
0 |
|
95 |
21 |
ptonewreckin |
Blind-XXE: A basis for a Blind-Based XXE Exploitation Framework |
https://github.com/ptonewreckin/Blind-XXE |
None |
|
None |
None |
5 |
0 |
95 |
21 |
51 |
Python,Go |
22 |
12 |
ProAppleOS |
如何利用 SHSH Blobs 将越狱后的设备升级到 iOS 11.1.2: |
https://github.com/ProAppleOS/Upgrade-from-any-Jailbroken-Device-to-iOS-11.1.2-with-Blobs/blob/master/README.md |
https://twitter.com/ProAppleOS |
Twitter: https://twitter.com/ProAppleOS |
None |
None |
6 |
0 |
5 |
20 |
2 |
|
0 |
0 |
gast04 |
r4ge - 调用宏进行符号执行的 radare2 插件: |
https://github.com/gast04/r4ge |
https://twitter.com/NistelbergerK |
I am a computer science student on TU Graz, favorite topics are about Reverse Engineering, IT-Security, AI and Logic. |
None |
None |
21 |
0 |
61 |
20 |
18 |
Python,PHP,PowerShell,C++ |
85 |
11 |
romankh |
GSM Assessment Toolkit - A security evaluation framework for GSM networks |
https://github.com/romankh/gsm-assessment-toolkit |
None |
|
None |
None |
19 |
0 |
46 |
20 |
2 |
Python,Java |
0 |
0 |
Skons |
RDS hijacking again - this time start a process inside another RDP session, without SYSTEM rights |
https://github.com/Skons/ms17-0100/blob/master/Start-ProcessInSession.ps1 |
None |
Twitter: @sk0ns |
None |
None |
14 |
0 |
1 |
19 |
1 |
Python,C#,PowerShell |
23 |
13 |
Spajed |
ProcessRefund - 前两天推送了一种新的无文件恶意软件杀软逃逸技术 - Process Doppelgänging,今天研究员在 GitHub 上分享了一个 PoC 代码: |
https://github.com/Spajed/processrefund |
None |
|
None |
None |
2 |
0 |
2 |
19 |
0 |
C,Java |
146 |
71 |
elkokc |
reflector - 在浏览网站时实时监测反射型 XSS 页面的 BurpSuite 插件: |
https://github.com/elkokc/reflector/ |
None |
|
None |
None |
7 |
0 |
5 |
19 |
0 |
Python,Ruby,Java |
263 |
68 |
ivildeed |
Update your VMware instances: |
https://github.com/ivildeed/vmw_vmx_overloader |
None |
|
None |
None |
1 |
0 |
7 |
19 |
9 |
C++ |
121 |
36 |
leostat |
rtfm - 以数据库形式存储常用工具的命令行参数的工具,比如记录 sqlmap 的命令行格式: |
https://github.com/leostat/rtfm |
https://necurity.co.uk |
|
Yorkshire, UK |
None |
6 |
0 |
3 |
19 |
0 |
Python,C,HTML,Ruby,PowerShell |
558 |
61 |
veramine |
Mitre 组织创建了一个称作 ATT&CK 的项目,之前有过推送,这个项目整理了攻击和入侵者常用的一些技术和策略。看到这个项目之后,来自 Veramine 团队的研究员也创建了一个项目,用于总结和讨论如何检测和防御 ATT&CK 项目中涉及的攻击技术: https://attack.mitre.org/wiki/Main_Page |
https://github.com/veramine/Detections/wiki |
https://veramine.com |
|
Seattle, Washington |
Veramine |
4 |
0 |
32 |
19 |
1 |
JavaScript,C++ |
96 |
12 |
havysec |
vulnerable-scene: 基于 Exploit-DB的漏洞环境 |
https://github.com/havysec/vulnerable-scene |
https://weibo.com/crypto1as |
|
None |
None |
67 |
0 |
5 |
18 |
1 |
Python,Shell,PHP,JavaScript |
33 |
3 |
hxp2k6 |
Smart7ec:基于Linux c开发的插件式扫描器(Python/lua) |
https://github.com/hxp2k6/smart7ec-scan-console |
None |
|
None |
None |
321 |
0 |
0 |
18 |
4 |
Python,C,JavaScript |
28 |
87 |
oxagast |
An advanced fuzzing framework designed to find vulnerabilities in C/C++ code |
https://github.com/oxagast/ansvif |
http://maskster.site |
I turn RedBull into code, parts into machines, and am an expert at being an amateur at all things. |
Asheville, NC, USA |
Dominos Pizza |
13 |
0 |
19 |
18 |
9 |
Assembly,JavaScript,Java,C++,Perl |
0 |
0 |
Flyteas |
Struts2 S2-045 漏洞检测利用工具 Exp GUI 版 |
https://github.com/Flyteas/Struts2-045-Exp |
http://flyteas.com |
Linux kernel ? Web security ? |
Chongqing |
CS,CQU |
20 |
0 |
20 |
17 |
7 |
Pascal,Java,C++ |
59 |
26 |
Ike-Clinton |
AeroHive AP 340 路由器 Root Exploit: |
https://github.com/Ike-Clinton/aerohive-ap340-root |
None |
|
None |
None |
61 |
0 |
57 |
17 |
14 |
Python,C,Shell,C++ |
0 |
0 |
egaus |
MaliciousMacroBot: classify and cluster Microsoft office document |
https://github.com/egaus/MaliciousMacroBot |
None |
|
None |
None |
11 |
0 |
1 |
17 |
0 |
Python,Bro,Jupyter |
102 |
18 |
mhelwig |
APK-Anal - 基于 Radare2 的 Android APK 静态分析工具: |
https://github.com/mhelwig/apk-anal |
https://www.codemetrix.io |
IT-Security Consultant (@c0dmtr1x on Twitter) |
Germany |
codemetrix.io |
17 |
0 |
3 |
17 |
0 |
Python,JavaScript,Java |
147 |
25 |
adamkusey |
Detecting Malicious Requests Using Keras & Tensorflow |
https://github.com/adamkusey/securitai-lstm-model |
None |
|
Chicago |
None |
4 |
0 |
6 |
16 |
0 |
Python,JavaScript |
41 |
27 |
neithernut |
Git-dit : A distributed issue tracker for git : |
https://github.com/neithernut/git-dit |
None |
|
None |
None |
14 |
0 |
39 |
16 |
10 |
C,C++,Rust |
0 |
0 |
robertfisk |
New USG Firewalls Protect USB Drives From Malicious Attacks : https://github.com/robertfisk/USG/wiki ,Technical Details :... |
https://github.com/robertfisk/USG/wiki |
None |
|
None |
None |
2 |
0 |
2 |
16 |
0 |
C |
374 |
34 |
ariccio |
altWinDirStat - 非官方开源版本的 WinDirStat,用于实时展示磁盘的使用情况: |
https://github.com/ariccio/altWinDirStat |
http://about.me/ariccio |
|
NYC |
None |
45 |
0 |
112 |
15 |
28 |
Python,C#,C++ |
251 |
24 |
gento |
New SMB code release: open source honeypot Dionaea is capturing #WannaCry in the wild! |
https://github.com/gento/dionaea |
None |
|
None |
None |
6 |
0 |
0 |
15 |
0 |
Python,Go,C |
71 |
18 |
julieeen |
KleeFL - Seeding fuzzers with symbolic execution,为 Fuzzer 增加符号执行的支持: |
https://github.com/julieeen/kleefl |
https://twitter.com/julieeen |
Security Researcher @ SecT, TU Berlin & T-Labs |
Potsdam - Berlin |
SecT - TU Berlin |
15 |
0 |
11 |
15 |
12 |
Python,C,C++ |
0 |
0 |
EyeOfRa |
上周推送过 FireEye 一篇监控 Windows Console 活动的 Blog,有位研究员根据 Blog 自己实现了一个工具: |
https://github.com/EyeOfRa/WinConMon |
http://eyeofrablog.wordpress.com |
Reverse engineering, O/S security, security solution development. |
HaNoi, VietNam |
None |
5 |
0 |
0 |
14 |
0 |
Go,PowerShell,C++ |
60 |
16 |
g-solaria |
OSINTforPenTests: 渗透测试中的开源情报信息收集 |
https://github.com/g-solaria/OSINTforPenTests |
http://twitter.com/g_solaria |
|
None |
None |
3 |
0 |
0 |
14 |
0 |
Python |
54 |
11 |
manikantareddyd |
ics-attack-detection: Detection of Cyber Attacks with Zone Dividing and PCA |
https://github.com/manikantareddyd/ics-attack-detection |
https://ManikantaReddyD.github.io |
|
Atlanta, GA, USA |
Graduate Researcher, Georgia Tech |
75 |
0 |
20 |
14 |
1 |
Python,JavaScript |
0 |
0 |
mogongtech |
RansomDetection: 基于行为的Ransomware检测原型 |
https://github.com/mogongtech/RansomDetection |
None |
|
None |
None |
1 |
0 |
0 |
14 |
0 |
C++ |
28 |
16 |
phar |
eyephish : PoC for computer vision phishing domain name generator : |
https://github.com/phar/eyephish |
None |
|
None |
None |
29 |
0 |
5 |
14 |
0 |
Python,C |
36 |
10 |
pythonran |
Pcap_tools: 基于网络流量包的漏洞自动化分析 |
https://github.com/pythonran/Pcap_tools |
None |
|
None |
None |
15 |
0 |
6 |
14 |
5 |
Python,JavaScript |
0 |
0 |
smythtech |
sdnpwn - SDNs 安全性的工具: |
https://github.com/smythtech/sdnpwn |
https://www.smythtech.net |
Security researcher |
Ireland |
None |
16 |
0 |
15 |
14 |
4 |
Python,Shell,Java,HTML |
0 |
0 |
bkup |
SlackShell - 基于 Slack API 的 PowerShell 版本 C&C 命令控制实现: |
https://github.com/bkup/SlackShell |
None |
|
Pittsburgh, PA |
None |
4 |
0 |
3 |
13 |
0 |
Python,Shell,PowerShell |
77 |
13 |
bugsafe |
WeReport: 渗透报告自动化生成平台 |
https://github.com/bugsafe/WeReport |
None |
|
None |
None |
4 |
0 |
2 |
13 |
0 |
Python,PHP,Java |
74 |
16 |
anilyuk |
Puny Domain Check - 用于检测 Punycode 域名的工具: |
https://github.com/anilyuk/punydomaincheck |
None |
|
None |
None |
6 |
0 |
60 |
12 |
2 |
Python,TeX,Shell,PowerShell |
31 |
7 |
dxflatline |
A TCP proxy over named pipes for maintaining a #meterpreter session over 445 for less network alarms #smb - |
https://github.com/dxflatline/flatpipes |
http://www.securityfiction.com/ (not working) |
Wire: dcflatline (66BF47AC0B00E679 / 32F5EB8870BA4E81) |
None |
Obrela Security Industries |
9 |
0 |
34 |
12 |
30 |
C#,C |
0 |
0 |
ezarko |
OpenDLP: 免费&开源的DLP 系统 |
https://github.com/ezarko/opendlp |
https://github.com/oracle |
|
Marin County, California |
@oracle |
38 |
0 |
24 |
12 |
9 |
Objective-C,Perl |
38 |
29 |
tomacwrt |
Sword - 基于 Openwrt 的 Dropboxes 渗透测试用户操作界面: |
https://github.com/tomacwrt/tomacwrt.github.io/blob/master/sword.pdf |
None |
|
None |
None |
1 |
0 |
0 |
11 |
0 |
|
126 |
37 |
Waffles-2 |
CVE-2017-7494 - Detection Scripts |
https://github.com/Waffles-2/SambaCry |
None |
Daniel Perrie, focusing on malware analysis. |
United Kingdom |
None |
2 |
0 |
0 |
10 |
0 |
Python,Lua |
61 |
21 |
a118n |
Powershell scripts useful for Windows enterprise administration |
https://github.com/a118n/poweradmin |
None |
|
None |
None |
6 |
0 |
35 |
10 |
0 |
Shell,HTML,PowerShell |
0 |
0 |
davidoren |
CuckooSploit: automated analysis of web-based exploits, based on Cuckoobox |
https://github.com/davidoren/CuckooSploit |
None |
|
None |
None |
3 |
0 |
0 |
10 |
0 |
Python,C,MATLAB |
123 |
35 |
evilsocketbr |
Shodanwave - 针对 Netwave IP 摄像头的信息获取及利用工具: |
https://github.com/evilsocketbr/shodanwave |
None |
|
None |
None |
3 |
0 |
5 |
10 |
1 |
Python |
0 |
0 |
luctalpe |
WMIMon - 用于监控 Windows WMI 行为的工具: |
https://github.com/luctalpe/WMIMon |
https://github.com/microsoft |
|
Paris |
@microsoft |
3 |
0 |
1 |
10 |
0 |
C++ |
0 |
0 |
niloofarkheirkhah |
Nili - 一款集网络扫描、中间人攻击、协议逆向与 Fuzz 为一体的工具: |
https://github.com/niloofarkheirkhah/nili |
None |
niloofar.kheirkhah@gmail.com |
None |
None |
2 |
0 |
3 |
10 |
2 |
Python |
164 |
34 |
phocean |
Metasploit Framework docker 版本 |
https://github.com/phocean/dockerfile-msf |
https://phocean.net |
|
None |
None |
23 |
0 |
235 |
10 |
2 |
Python,JavaScript,Dockerfile |
480 |
85 |
shinyke |
Time-NLP: 中文语句中的时间语义识别 |
https://github.com/shinyke/Time-NLP |
https://github.com/shinyke |
|
GuangZhou, China |
uc |
2 |
0 |
14 |
10 |
2 |
Java |
340 |
117 |
IoTsec |
Z3sec: Penetration testing framework for ZigBee security research |
https://github.com/IoTsec/Z3sec |
None |
Research resources on IoT security and privacy by the Friedrich-Alexander-Universität Erlangen-Nürnberg and the University of Mannheim. |
None |
None |
2 |
0 |
0 |
9 |
0 |
Python |
56 |
7 |
JannikArndt |
E-Mail Tracker Blocker 禁止邮件跟踪(隐私保护) |
https://github.com/JannikArndt/EMailTrackerBlocker |
http://www.jannikarndt.de |
Scala Dev |
Hamburg |
MOIA |
30 |
0 |
75 |
9 |
31 |
C#,Scala |
0 |
0 |
alexvanmaele |
ics-checklist: Industrial Security Checklist |
https://github.com/alexvanmaele/ics-checklist |
http://atlesque.com |
Art and Open-Source aficionado Creative portfolio @ http://atlesque.com |
Belgium |
Alexander Atlesque |
20 |
0 |
0 |
9 |
5 |
JavaScript,PHP,PLpgSQL |
8 |
4 |
flowztul |
keyexec - 自动解锁磁盘加密 LUKS 设备的脚本(Ubuntu 16.04 LTS): |
https://github.com/flowztul/keyexec |
None |
|
None |
None |
21 |
0 |
1 |
9 |
0 |
Shell,Java,Python,C++,Go,Ruby |
30 |
5 |
stoyan-shopov |
Troll - 针对 ARM Cortex-M 系统的 C 语言源码级调试器: |
https://github.com/stoyan-shopov/troll#testing-the-troll |
None |
|
None |
None |
42 |
0 |
16 |
9 |
1 |
C,C++ |
0 |
0 |
szimeus |
evalyzer - 利用 WinDBG 来调试 JavaScript 的脚本: |
https://github.com/szimeus/evalyzer |
None |
|
None |
None |
5 |
0 |
0 |
9 |
0 |
HTML,Java,CSS |
76 |
31 |
RedLectroid |
Tool for easily generating sketches for Arduinos to deliver HID attacks via keyboard emulation |
https://github.com/RedLectroid/OverThruster |
None |
Computer security enthusiast and martial artist. I like to find holes in defenses and exploit them. |
None |
None |
3 |
0 |
1 |
8 |
1 |
Python |
99 |
29 |
butteff |
How to make your Ubuntu less shitty |
https://github.com/butteff/Ubuntu-Telemetry-Free-Privacy-Secure |
None |
|
Moscow, Russia |
None |
8 |
0 |
33 |
8 |
15 |
Shell,PHP |
83 |
14 |
coincoin7 |
Wireless-Router-Vulnerability: 无线路由漏洞及利用代码 |
https://github.com/coincoin7/Wireless-Router-Vulnerability |
None |
|
None |
None |
2 |
0 |
2 |
8 |
0 |
Python,JavaScript |
48 |
15 |
ondrejbudai |
hidviz : Tool for in-depth analysis of USB HID devices communication : https://github.com/ondrejbudai/hidviz/ |
https://github.com/ondrejbudai/hidviz/ |
None |
|
None |
None |
34 |
0 |
11 |
8 |
0 |
C++ |
0 |
0 |
yongchuan |
msafe: 从底层分析PHP执行代码的安全性(混淆/审计) |
https://github.com/yongchuan/msafe |
None |
|
None |
None |
11 |
0 |
0 |
8 |
0 |
C,PHP,C++ |
68 |
33 |
LisonFan |
china_ip_list: 中国 IP 地址列表( IPIP&APNIC ) |
https://github.com/LisonFan/china_ip_list |
None |
|
None |
None |
17 |
0 |
168 |
7 |
3 |
HTML,Objective-C,Shell,Dockerfile,JavaScript |
233 |
56 |
SaulLawliet |
watchdog: IF (网页某区域有变化) THEN (邮件提醒你) |
https://github.com/SaulLawliet/watchdog |
https://0111.studio/ |
Everythings gonna be OK. |
Earth ;) |
None |
11 |
0 |
43 |
7 |
6 |
Python,C,Shell,Ruby |
0 |
0 |
jevalenciap |
获取IP相对应域名脚本 |
https://github.com/jevalenciap/iptodomain |
None |
|
Colombia |
None |
8 |
0 |
0 |
7 |
0 |
Python |
37 |
47 |
brandonasuncion |
Reverse-Engineering-Bluetooth-Protocols (Reverse-Engineering a Bluetooth-Enabled Radar Detector) : |
https://github.com/brandonasuncion/Reverse-Engineering-Bluetooth-Protocols |
https://brandonasuncion.dev |
Software Engineer // iOS Developer // Tech Enthusiast |
California |
None |
24 |
0 |
169 |
6 |
8 |
Python,Pascal,JavaScript,Swift,C |
0 |
0 |
roastbeef |
CompileShellCode.py : Embed up to 65KB of Shellcode into a x86 Windows exe for analysis : |
https://github.com/roastbeef/compileShellCode/blob/master/compileShellCode.py |
None |
|
None |
None |
0 |
0 |
0 |
6 |
0 |
|
0 |
0 |
jgrancell |
malscan: A fully featured malware scanner for Linux desktops and servers. |
https://github.com/jgrancell/malscan |
https://www.joshgrancell.com |
|
Dearborn, Michigan |
Campbell Marketing and Communications |
9 |
0 |
6 |
5 |
1 |
Go,Shell,HTML |
0 |
0 |
zsenliao |
shellMonitor: Linux 下基于 Bash 的文件和数据库监控及备份工具,微信报警 |
https://github.com/zsenliao/shellMonitor |
None |
|
None |
None |
4 |
0 |
89 |
5 |
0 |
Shell,JavaScript |
72 |
23 |
Hack-Hut |
Automatic remote/local file inclusion vulnerablity analysis and exploit tool |
https://github.com/Hack-Hut/CrabStick |
http://www.hackhut.co.uk |
|
None |
None |
17 |
0 |
8 |
4 |
0 |
Python,C |
0 |
0 |
casperreverser |
Reverse engineering a hypocritical private API! |
https://github.com/casperreverser/CasperReverse/blob/master/writeup.md |
None |
|
None |
None |
1 |
0 |
0 |
4 |
0 |
Assembly |
53 |
12 |
jingchengyou |
crawler_email: crawl email of BBS 论坛邮件地址获取 |
https://github.com/jingchengyou/crawler_email |
None |
Tomorrow is better! |
None |
None |
6 |
0 |
0 |
4 |
0 |
Python,HTML |
8 |
6 |
mudiyouyou |
外卖订单爬虫:美团,饿了么,百度 |
https://github.com/mudiyouyou/waimai-crawler |
None |
|
Beijing |
None |
9 |
0 |
6 |
4 |
1 |
Python,HTML,Java,JavaScript |
116 |
54 |
phroxvs |
【EXP】VMware vSphere Data Protection CVE-2016-7456 Authentication Bypass |
https://github.com/phroxvs/metasploit-framework/blob/exploit_vdp_known_privkey/modules/exploits/linux/ssh/vmware_vdp_known_privkey.rb |
None |
|
Munich, Germany |
HvS-Consulting AG |
2 |
0 |
0 |
4 |
1 |
Ruby,PowerShell |
8 |
1 |
vysec |
昨天推送的 Microsoft Office RTF WSDL Parser 野外被利用 0Day 的 PoC: https://github.com/Voulnet/CVE-2017-8759-Exploit-sample |
https://github.com/vysec/CVE-2017-8759 |
None |
|
None |
None |
0 |
0 |
0 |
4 |
0 |
|
0 |
0 |
yawuplus |
weibo-api: 免登陆获取新浪微博数据的Python库 |
https://github.com/yawuplus/weibo-api |
http://yawujia.cn/ |
Talk is cheap,show me the code. Contact me via 3013568147@qq.com |
China |
None |
29 |
0 |
139 |
4 |
57 |
Python,JavaScript,Java,C++ |
0 |
0 |
fs0c1ety |
前两周推送过 Android 平台模仿 WannaCry 的勒索软件 - SLocker,有研究员通过逆向的方式还原了它的源码: |
https://github.com/fs0c1ety/SLocker |
None |
|
None |
None |
1 |
0 |
0 |
3 |
0 |
HTML |
0 |
0 |
juansacco |
exploitpack: Exploit Pack - Penetration testing framework |
https://github.com/juansacco/exploitpack |
None |
|
None |
None |
1 |
0 |
0 |
3 |
0 |
|
0 |
0 |
matthiasmaes |
Development of an anomaly based web application firewall |
https://github.com/matthiasmaes/AnomalyWebApplicationFirewall |
http://matthiasmaes.me |
|
Belgium |
Odisee |
6 |
0 |
2 |
3 |
0 |
Python,HTML,Java,CSS |
0 |
0 |
CoalfireLabs |
Added two more Java deserialization exploits! 1 for Jenkins and 1 for WebLogic. Getem here |
https://github.com/CoalfireLabs/java_deserialization_exploits. |
None |
|
None |
None |
0 |
0 |
0 |
1 |
0 |
|
0 |
0 |
Phreak87 |
Build your own Bad USB Stick for pentesting with wifi and dip switches http://bit.ly/2i8Xpko #infosec #hacking... |
https://github.com/Phreak87/ESPeensy-and-Peensy-Payload-Generator-ESP8266-Teensy-3.5- |
http://github.com/Phreak87 |
|
Germany |
NerdCoreWG |
17 |
0 |
16 |
1 |
11 |
C#,Visual,JavaScript |
0 |
0 |
fredericopissarra |
mixed packet injector tool |
https://github.com/fredericopissarra/t50 |
https://bitismyth.wordpress.com/ |
|
None |
None |
1 |
0 |
0 |
1 |
0 |
C |
0 |
0 |
kyurchenko |
用于辅助分析 UEFI 的 IDA Python 脚本: |
https://github.com/kyurchenko/IDAPython-scripts-for-UEFI-analisys |
None |
|
St. Petersburg |
None |
5 |
0 |
1 |
1 |
6 |
Python,C,Makefile |
1 |
0 |
0Linchen |
CTFCrackTools: 中国国内首个CTFcrack框架 |
https://github.com/0Linchen/CTFCrackTools |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
None |
0 |
0 |
AndroidVTS |
Android漏洞测试套件 |
https://github.com/AndroidVTS/android-vts |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Java |
0 |
0 |
BinaryAnalysisPlatform |
QEMU Interactive Runtime Analyser |
https://github.com/BinaryAnalysisPlatform/qira |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,Shell,Python,OCaml,C++,TeX,HTML,Rust |
0 |
0 |
BloodHoundAD |
SharpHound - C# 重写的 BloodHound Ingestor,它用图论的形式展示 Active Directory 环境中的节点的关系: https://github.com/BloodHoundAD/BloodHound https://github.com/BloodHoundAD/SharpHound |
https://github.com/BloodHoundAD/BloodHound |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,C#,PowerShell |
0 |
0 |
CERT-BDF |
CERT-BDF/Cortex: Powerful Observable Analysis Engine |
https://github.com/CERT-BDF/Cortex |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
|
0 |
0 |
Canbing007 |
wukong: 悟空扫描器 |
https://github.com/Canbing007/wukong |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
None |
0 |
0 |
CyberArkLabs |
ACLight - 用于寻找域中高权限账户和隐藏管理员的 Powershell 脚本: |
https://github.com/CyberArkLabs/ACLight |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
None |
0 |
0 |
Cymmetria |
Struts Apache 2 based honeypot & detection module by @nirkrakowksi @lorgandon https://t.co/oJzc8qnvFo [CVE 2017-5638 |
https://github.com/Cymmetria/StrutsHoneypot |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
ASP,Python,JavaScript,Shell,HTML,PHP |
0 |
0 |
DLACERT |
ThreatHunting - 在 Windows 系统中寻找威胁的 PowerShell 脚本: |
https://github.com/DLACERT/ThreatHunting |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
None |
0 |
0 |
EtixLabs |
Cameradar - 攻击 RTSP 监控摄像头的工具: |
https://github.com/EtixLabs/cameradar |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,JavaScript,OCaml,C++,CoffeeScript,Objective-C,HTML,Go,PHP,Swift |
0 |
0 |
GoogleChrome |
Rendertron - Docker 化、headless 版本的 Chrome,Rendertron 作为一个独立的 HTTP Server 运行,目标是实现 Google 提出的 Web APP 新形态:PWA(Progressive Web Apps): |
https://github.com/GoogleChrome/rendertron |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
TypeScript,Java,Python,JavaScript,HTML,CSS |
0 |
0 |
Grey-Noise-Intelligence |
Grey-Noise-Intelligence: GreyNoise威胁情报接口使用说明 |
https://github.com/Grey-Noise-Intelligence/api.greynoise.io |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
None |
0 |
0 |
Hadesy2k |
sqliv - 大范围 SQL 注入漏洞扫描器: |
https://github.com/Hadesy2k/sqliv |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
None |
0 |
0 |
ICSrepo |
TRISIS/TRITON/HATMAN 恶意软件样本的原始和反编译样本: |
https://github.com/ICSrepo/TRISIS-TRITON-HATMAN |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
None |
0 |
0 |
ICT-BDA |
EasyML: 中科院计算所开源的交互式图形化机器学习平台 |
https://github.com/ICT-BDA/EasyML |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,Java,C++ |
0 |
0 |
KruDex |
lan-monitor - 根据 NMAP 扫描结果在网页上显示 LAN 状态: |
https://github.com/KruDex/lan-monitor |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
None |
0 |
0 |
M1ND-B3ND3R |
BoopSuite : Wireless Sniffer Tool (in Python for wireless auditing/security testing) as alternative to airodump-ng : |
https://github.com/M1ND-B3ND3R/BoopSuite |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
None |
0 |
0 |
MalwareReverseBrasil |
malwaresearch: A command line tool to find malwares |
https://github.com/MalwareReverseBrasil/malwaresearch |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
None |
0 |
0 |
OrOneEqualsOne |
Reconned - 用于搜集子域名的工具,之前叫 PyBrute: |
https://github.com/OrOneEqualsOne/reconned |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
None |
0 |
0 |
PassingTheKnowledge |
Ganxo - 开源 API Hook 框架: |
https://github.com/PassingTheKnowledge/Ganxo |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,Batchfile |
0 |
0 |
PowerShellMafia |
CimSweep - 基于 CIM/WMI 的应急响应和威胁检测工具,该工具可以远程在 Windows 全版本使用: |
https://github.com/PowerShellMafia/CimSweep |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
PowerShell |
0 |
0 |
SecurityFTW |
Cloud Security Suite (cs-suite) - 亚马逊 AWS 云基础设施安全审计工具: |
https://github.com/SecurityFTW/cs-suite |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Shell,HTML |
0 |
0 |
SerpicoProject |
Serpico - 渗透测试报告生成与协作工具: |
https://github.com/SerpicoProject/Serpico |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
JavaScript,Ruby,HTML |
0 |
0 |
SparkSharly |
Deep Learning for detection with XSS |
https://github.com/SparkSharly/DL_for_xss |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python |
0 |
0 |
VVard0g |
ThreatHuner-Playbook: 从Windows事件和Sysmon日志分析取证 |
https://github.com/VVard0g/ThreatHunter-Playbook |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
None |
0 |
0 |
WhitewidowScanner |
whitewidow - SQL 漏洞扫描器: |
https://github.com/WhitewidowScanner/whitewidow |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Ruby |
0 |
0 |
aWeiMiaoMiao |
db_security:数据库安全审计工具 |
https://github.com/aWeiMiaoMiao/db_security |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
None |
0 |
0 |
adaptivethreat |
BloodHound 1.2 is here!Changelog and download here - |
https://github.com/adaptivethreat/BloodHound/releases/tag/1.2 |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
|
0 |
0 |
blastxiang |
lucky-js-fuzz: 开源jsfuzzer |
https://github.com/blastxiang/lucky-js-fuzz |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
None |
0 |
0 |
blockchain-university |
databank: 区块链技术相关的论文、文档 |
https://github.com/blockchain-university/databank |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Shell,Java,Python,JavaScript,Haskell,TeX,HTML,Go,CSS |
0 |
0 |
blog |
GitHub 社区对已经启用依赖图谱(Dependency Graph)功能的用户会推送已知漏洞预警: |
https://github.com/blog/2470-introducing-security-alerts-on-github |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
|
0 |
0 |
brandis-project |
Brandis - Web 版的端到端加密应用: |
https://github.com/brandis-project/brandis |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
HTML |
0 |
0 |
bulaza |
自动化动态恶意软件分析中的逃逸与反逃逸技术调查(Paper) |
https://github.com/bulaza/Publications/blob/master/ROOTS2017/A%20Survey%20On%20Automated%20Dynamic%20Malware%20Analysis%20Evasion%20and%20Counter-Evasion.pdf |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
None |
0 |
0 |
bunnyblue |
Android AntiVM - Android虚拟机检测库,意在未授权的情况下禁止在虚拟机App上非法运行: |
https://github.com/bunnyblue/AntiVM |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
None |
0 |
0 |
chamli |
CyberCrowl is a python Web path scanner tool |
https://github.com/chamli/CyberCrowl |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
None |
0 |
0 |
checkyfuntime |
iMessagesBackdoor - 利用 iMessage 支持的 AppleScript Handler 可以设置后门,发一条消息就可以触发后门被激活:: |
https://github.com/checkyfuntime/iMessagesBackdoor |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
None |
0 |
0 |
docileninja |
dress : add symbols back into a stripped ELF binary (~strip) : |
https://github.com/docileninja/dress |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
None |
0 |
0 |
falexorr |
Siofra - DLL 劫持漏洞扫描器、PE 感染工具: |
https://github.com/falexorr/Siofra |
None |
|
None |
None |
1 |
0 |
0 |
0 |
0 |
Assembly |
2 |
0 |
fiht |
educn-sqlScan: 对全国edu域名以及其二级域名进行的一次Sql注入 |
https://github.com/fiht/educn-sqlScan |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
None |
0 |
0 |
intellectualheaven |
ceed : A tiny x86 compiler with ELF and PE target : https://github.com/intellectualheaven/ceed , Details : |
https://github.com/intellectualheaven/ceed |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
|
0 |
0 |
intelpt |
Just checked in Windows Intel PT Driver for Windows v0.5 from our presentation |
https://github.com/intelpt/WindowsIntelPT |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,C,C++ |
0 |
0 |
joshDelta |
Gloom-Framework - Linux 渗透测试框架: |
https://github.com/joshDelta/Gloom-Framework |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
None |
0 |
0 |
jumpserver |
jumpserver: 开源跳板机(堡垒机):认证,授权,审计,自动化运维 |
https://github.com/jumpserver/jumpserver |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,Java,JavaScript,Dockerfile,HTML |
0 |
0 |
kotobukki |
BigDataAudit: security vulns detector for Hadoop and Spark 大数据安全检测工具 |
https://github.com/kotobukki/BigDataAudit |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
None |
0 |
0 |
laplinker |
Use Wireshark to sniff CAN traffic in windows for under 20$ worth of hardware: |
https://github.com/laplinker/CAN-pipe |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
None |
0 |
0 |
lianfeng30 |
githubscan: GitHub敏感信息扫描工具 |
https://github.com/lianfeng30/githubscan |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
None |
0 |
0 |
m3liot |
filewatcher - macOS 系统一款监控进程资源访问情况的工具,比如可以监控指定进程的文件访问操作: |
https://github.com/m3liot/filewatcher |
None |
|
None |
None |
1 |
0 |
0 |
0 |
0 |
HTML |
0 |
0 |
manwhoami |
Bella : A pure python, post-exploitation, data mining tool and remote administration tool for macOS : |
https://github.com/manwhoami/Bella |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
None |
0 |
0 |
minisllc |
Domain Hunter - 域名信誉对于攻击者从事钓鱼和 C&C 很重要,所以攻击者开始尝试注册一些过期的历史信誉良好的域名,用于躲避检测。Domain Hunter 这个工具用于识别这类域名: |
https://github.com/minisllc/domainhunter |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
None |
0 |
0 |
missDronio |
MySQL盲注检测脚本 |
https://github.com/missDronio/blindy |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
None |
0 |
0 |
mromnia |
FB Event Map API |
https://github.com/mromnia/fb_event_map |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
None |
0 |
0 |
olacabs |
JACKHAMMER - Security vulnerability assessment tool |
https://github.com/olacabs/jackhammer |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,JavaScript,Java,HTML |
0 |
0 |
orppra |
ropa - 基于 Ropper 实现的一个 GUI 版本的 ROP 链构造工具: |
https://github.com/orppra/ropa |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,JavaScript |
0 |
0 |
rebellionil |
tornado: All in one MITM tool |
https://github.com/rebellionil/tornado |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
None |
0 |
0 |
recodeking |
recodeking/MalwareAnalysis: 恶意软件分析工具和资源列表 |
https://github.com/recodeking/MalwareAnalysis |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
None |
0 |
0 |
samgha |
vipas: Vipasyin Webshell detector Go 语言编写的Webshell检测工具 |
https://github.com/samgha/vipas |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,XSLT,Python,JavaScript,C++,Go |
0 |
0 |
session-replay-tools |
tcpcopy - TCP 流重放工具: |
https://github.com/session-replay-tools/tcpcopy |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C |
0 |
0 |
sonarwhal |
微软开源扫描工具Sonar |
https://github.com/sonarwhal/sonar |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
None |
0 |
0 |
tylerhalfpop |
List of reverse engineering resourceshttps://github.com/tylerhalfpop/awesome-reversing#reverseengineering |
https://github.com/tylerhalfpop/awesome-reversing#reverseengineering |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
None |
0 |
0 |
vusec |
Finally! Vuzzer was open sourced |
https://github.com/vusec/vuzzer |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,C,Java,OCaml,C++ |
0 |
0 |
wafpassproject |
wafpassproject: 各种WAF 测试与 Bypass用例 |
https://github.com/wafpassproject/wafpass |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python |
0 |
0 |
weiboad |
fiery: APM for PHP 基于PHP的分布式跟踪系统 |
https://github.com/weiboad/fiery |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Objective-C,PHP,Java,C++ |
0 |
0 |