Stars
Recovers passwords from pixelized screenshots
A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
Prowler is an Open Source Security tool for AWS, Azure, GCP and Kubernetes to do security assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readines…
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
The Leading Security Assessment Framework for Android.
Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.
A curated list of resources related to Industrial Control System (ICS) security.
Toolkit to emulate firmware and analyse it for security vulnerabilities
A graph-based tool for visualizing effective access and resource relationships in AWS environments.
Vulnerable REST API with OWASP top 10 vulnerabilities for security testing
Damn Vulnerable Restaurant is an intentionally vulnerable Web API game for learning and training purposes dedicated to developers, ethical hackers and security engineers.
Spoof SSDP replies and create fake UPnP devices to phish for credentials and NetNTLM challenge/response.
bata24 / gef
Forked from hugsy/gefGEF - GDB Enhanced Features for exploit devs & reversers
Automatic exploit generation for simple linux pwn challenges.
A python script to dump all the challenges locally of a CTFd-based Capture the Flag.
GitOSINT: The OSINT Powerhouse for Discord. The go-to Discord bot for Open Source Intelligence (OSINT).
WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a python function that leaks a file content and you have your…
Auto-Recon script that will help you in the Burp Suite Certified Practitioner Examor with any web-security lab.
When a Tor user switches tabs (to another Tor tab or to his clearnet browser) his sessions can be linked from the mouse entry-exit points.