thelinuxchoice |
Phishing Tool for 18 social media |
https://github.com/thelinuxchoice/shellphish |
http://twitter.com/linux_choice |
Twitter: @linux_choice |
None |
None |
103 |
0 |
38 |
2200 |
5 |
Python,Shell,HTML |
890 |
403 |
xdite |
互联网资安风控实战 |
https://github.com/xdite/internet-security |
http://blog.xdite.net |
CEO of OTCBTC |
Taipei, Taiwan |
OTCBTC |
177 |
0 |
214 |
1600 |
13 |
Makefile,Ruby |
315 |
82 |
trimstray |
Linux 安全加固配置手册 |
https://github.com/trimstray/linux-hardening-checklist |
https://trimstray.github.io/ |
BIO_read(wbio, buf, 4096) |
Poland |
None |
15 |
0 |
892 |
1400 |
265 |
Shell |
21500 |
2100 |
boy-hack |
w13scan: 被动扫描器 |
https://github.com/boy-hack/w13scan?from=timeline |
https://www.hacking8.com/ |
Hacking tools just for fun ~ |
china |
None |
29 |
0 |
118 |
809 |
15 |
Python,CSS |
797 |
287 |
ismailtasdelen |
Red Team Hardware Toolkit |
https://github.com/ismailtasdelen/redteam-hardware-toolkit |
http://ismailtasdelen.com |
Hi, My name is Ismail Tasdelen. As a security researcher. Im working Penetration Tester at Ernst & Young. Remember to follow and support. Have a great day. 😇 |
Istanbul |
Ernst & Young |
97 |
0 |
783 |
733 |
467 |
Python,Shell,HTML |
591 |
164 |
vanhauser-thc |
AFL 的社区维护版 afl++ 发布 2.53c 版本 |
https://github.com/vanhauser-thc/AFLplusplus/releases/tag/2.53c |
https://www.mh-sec.de/ |
Security researcher since 1994 https://www.thc.org/ https://twitter.com/hackerschoice |
Berlin |
The Hackers Choice |
mh-sec |
me |
myself |
22 |
0 |
33 |
630 |
19 |
infosecn1nja |
awesome-mitre-attack - 与 Mitre ATT&CK 攻击防御框架有关的工具和资料收集 |
https://github.com/infosecn1nja/awesome-mitre-attack |
None |
Red Teamer and Security Researcher |
Jakarta, Indonesia |
None |
31 |
0 |
575 |
508 |
56 |
Python,Shell,PowerShell |
4600 |
1500 |
zodiacon |
zodiacon 开源了一个工具,用于查看内核对象类型的句柄和对象 |
https://github.com/zodiacon/KernelObjectView |
http://scorpiosoftware.net |
|
Israel |
None |
56 |
0 |
106 |
503 |
9 |
C#,C,C++ |
714 |
208 |
pasta-auto |
丰田公司开发了一套汽车ECU系统的测试工具,包含软件和硬件,repo里面有这套工具的相关介绍,目前应该是在售的状态。 |
https://github.com/pasta-auto/PASTA1.0 |
None |
|
None |
None |
1 |
0 |
0 |
262 |
0 |
C |
49 |
11 |
RUB-SysSec |
NEMO:一款猜测password的工具,通过使用马尔可夫模型可以更高效地选择变异策略 |
https://github.com/RUB-SysSec/NEMO// |
https://syssec.rub.de |
|
Bochum, Germany |
Ruhr-University Bochum |
21 |
0 |
11 |
228 |
0 |
Python,C,C++ |
370 |
102 |
Bypass007 |
Safety-Project-Collection: 收集一些比较优秀的开源安全项目 |
https://github.com/Bypass007/Safety-Project-Collection |
None |
欢迎关注公众号Bypass--,专注于信息安全。 |
Xiamen, China |
None |
4 |
0 |
4 |
221 |
0 |
Java |
1100 |
274 |
bcoles |
bcoles 收集的 Linux 内核 Exploits |
https://github.com/bcoles/kernel-exploits |
https://itsecuritysolutions.org |
rm -rf /* |
rm -rf /* |
rm -rf /* |
29 |
0 |
62 |
217 |
19 |
Python,C,Shell,Ruby |
17100 |
8400 |
13o-bbr-bbq |
机器学习与安全相关的一些资料汇总 |
https://github.com/13o-bbr-bbq/machine_learning_security |
None |
Im an engineer, Machine Learning hacker and CISSP. Speaker at Black Hat Arsenal, DEFCON Demo Labs/AI Village, Pycon, CODE BLUE etc., |
Tokyo, Japan. |
None |
9 |
0 |
25 |
185 |
1 |
Python |
875 |
319 |
maddiestone |
谷歌安全团队成员在Recon 2019会议上分享的Android病毒逆向分析,病毒通过各种反射和混淆隐藏自身真实payload,但通过仔细逆向,仍然能够将其分析清楚,毕竟Java编译之后的代码语义的留存还是挺多的 |
https://github.com/maddiestone/ConPresentations/blob/master/REcon2019.PathToThePayload.pdf |
http://twitter.com/maddiestone |
|
None |
None |
3 |
0 |
2 |
160 |
1 |
Python |
436 |
91 |
milabs |
awesome-linux-rootkits - Linux 平台 Rootkits 相关的资料收集 |
https://github.com/milabs/awesome-linux-rootkits |
None |
Linux kernel addict, security researcher, reverse engineer |
Russia, Moscow |
None |
27 |
0 |
440 |
119 |
71 |
C |
282 |
48 |
luguanxing |
Cheating-Plugin-Program: 从零开始研究外挂设计原理 |
https://github.com/luguanxing/Cheating-Plugin-Program |
http://luguanxing.online:8080 |
|
None |
None |
17 |
0 |
7 |
102 |
2 |
C,JavaScript,HTML,C++ |
412 |
106 |
r35tart |
R3start 总结的一些日常渗透测试项目的案例 |
https://github.com/r35tart/Penetration_Testing_Case |
http://R3start.net |
人若无名,便可潜心练剑。 |
None |
None |
51 |
0 |
130 |
95 |
5 |
Python |
307 |
113 |
theLSA |
dz-ml-rce.py:discuz ml RCE漏洞检测工具 |
https://github.com/theLSA/discuz-ml-rce |
http://www.lsablog.com |
I like network security,penestration and programming(python,c/c++,php,java,ect),welcome to communicate with me! |
China |
None |
27 |
0 |
15 |
60 |
14 |
Python |
71 |
35 |
xinali |
Adobe Font Development Kit for OpenType 套件相关的漏洞分析 |
https://github.com/xinali/AfdkoFuzz/ |
None |
Malware Analysis, Coder & Antiy Lab |
Harbin,China |
Jilin University |
14 |
0 |
121 |
52 |
56 |
Python,HTML,Dockerfile,C++,Vue |
85 |
37 |
marcinguy |
Android 7月补丁修复的Media Framework漏洞CVE-2019-2107的PoC |
https://github.com/marcinguy/CVE-2019-2107 |
None |
|
Berlin, Germany |
None |
39 |
0 |
11 |
44 |
28 |
Python,C |
52 |
13 |
niemand-sec |
AntiCheat-Testing-Framework - 游戏反外挂测试框架,作者在 Recon2019 会议有一个关于这个工具的演讲 |
https://github.com/niemand-sec/AntiCheat-Testing-Framework |
None |
Twitter: @niemand_sec |
None |
None |
23 |
0 |
21 |
32 |
4 |
C#,Python,C++ |
102 |
21 |
hanbinglengyue |
FART: ART环境下自动化脱壳方案 |
https://github.com/hanbinglengyue/FART |
None |
大成若缺,大道至简 |
None |
None |
78 |
0 |
3 |
27 |
20 |
Python,Java,C,PHP,Ruby |
239 |
77 |
Alexandre-Bartel |
DOSBox 模拟器缓冲区溢出漏洞 CVE-2019-12594 Exploit |
https://github.com/Alexandre-Bartel/CVE-2019-12594/ |
https://www.abartel.net |
|
None |
None |
15 |
0 |
4 |
26 |
1 |
Python,C,Java |
7 |
2 |
KibodWapon |
Axis-1.4-RCE-Poc: Axis |
https://github.com/KibodWapon/Axis-1.4-RCE-Poc |
https://kibodwapon.github.io/ |
|
None |
None |
4 |
0 |
5 |
21 |
0 |
Python,HTML |
97 |
59 |
MagicZer0 |
fastjson 1.2.46 版本 RCE Exploit |
https://github.com/MagicZer0/fastjson-rce-exploit |
None |
web security researcher, like coding. |
None |
None |
8 |
0 |
6 |
20 |
4 |
HTML,Java,PHP |
59 |
21 |
Rman0fCN |
ML_Malware_detect: 阿里云安全恶意程序检测比赛 |
https://github.com/Rman0fCN/ML_Malware_detect |
None |
Stu from HITsz |
None |
None |
48 |
0 |
76 |
20 |
67 |
Python,PHP,JavaScript,Smarty |
43 |
10 |
paul-axe |
paul-axe 公开的 WCTF 2019 P Door 赛题的 writeup |
https://github.com/paul-axe/ctf/tree/master/wctf2019/p-door |
None |
|
None |
None |
5 |
0 |
94 |
19 |
10 |
Python,C,PHP,Haskell |
7 |
1 |
yangruiqiyr |
一个用Intel VT-X/EPT实现的类似Sysinternals Process Monitor的工具 |
https://github.com/yangruiqiyr/Syscall-Monitor |
None |
Weak chicken in weak chicken |
None |
None |
74 |
0 |
57 |
18 |
34 |
Python,C,PHP,Java,C++ |
1 |
0 |
rndinfosecguy |
Scavenger: Crawler searching for credential leaks on paste sites |
https://github.com/rndinfosecguy/Scavenger |
https://twitter.com/rnd_infosec_guy |
Just an information security guy marching down his path. |
/dev/null |
None |
2 |
0 |
2 |
16 |
7 |
Python,JavaScript |
114 |
27 |
Vlad-tri |
6 月份被发现的野外 Win32k 0Day 提权漏洞(CVE-2019-1132)的 PoC |
https://github.com/Vlad-tri/CVE-2019-1132/ |
http://www.botnetarmy.wordpress.com |
Learning Machine Learning and Malware Anlaysis |
None |
None |
16 |
0 |
1 |
15 |
1 |
Python,C++ |
27 |
19 |
kirk-sayre-work |
恶意 VB 脚本样本的分析 |
https://github.com/kirk-sayre-work/talks |
None |
I do cyber security work for Walmart. |
None |
Walmart |
7 |
0 |
3 |
10 |
0 |
Python,C#,JavaScript |
39 |
6 |
XiaoXiaoGuaiXiaShi |
OpenSource-HoneyPot: 对开源蜜罐的学习研究与理解 |
https://github.com/XiaoXiaoGuaiXiaShi/OpenSource-HoneyPot |
None |
信息安全学习者 |
None |
None |
3 |
0 |
80 |
7 |
38 |
Python,JavaScript |
12 |
1 |
cmcmsec |
dpia: GDPR个人数据合规评估 |
https://github.com/cmcmsec/dpia |
None |
|
None |
None |
3 |
0 |
0 |
4 |
0 |
JavaScript,Ruby |
21 |
15 |
skydive-project |
Skydive可用以对网络拓扑及协议进行实时分析,以图像的方式清晰展现。 |
https://github.com/skydive-project/skydive |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Go,Python,HTML,JavaScript,Puppet |
0 |
0 |
xiangpasama |
京东SRC小课堂系列文章 |
https://github.com/xiangpasama/JDSRC-Small-Classroom |
None |
|
None |
None |
1 |
0 |
0 |
0 |
0 |
|
34 |
9 |