thelinuxchoice |
恶意Android apk生成器GetDroid v1.3发布(反向Shell),请注意分析和防范。 |
https://github.com/thelinuxchoice/getdroid |
http://twitter.com/linux_choice |
Twitter: @linux_choice |
None |
None |
112 |
0 |
38 |
4200 |
5 |
Python,Shell,HTML |
1600 |
626 |
Neo23x0 |
开源日志数据分析工具sigma更新了现有的ATT&CK技术参考 |
SigmaHQ/sigma#845 |
https://github.com/NextronSystems |
#DFIR #Python #YARA #Golang #SIEM #SOC #Sigma #Malware |
None |
@NextronSystems |
83 |
0 |
121 |
1800 |
15 |
Python,Batchfile,Java |
2600 |
687 |
jas502n |
CVE-2020-2551 Weblogic RCE with IIOP |
https://github.com/jas502n/CVE-2020-2551 |
https://twitter.com/jas502n |
1.misc 2.crypto 3. web 4. reverse 5. android 6. pwn 7. elf |
Hong Kong |
jas502n |
235 |
0 |
379 |
1600 |
343 |
Python,C,Shell,Java |
302 |
129 |
3gstudent |
利用 Python3 快速枚举 Active Directory 用户 |
https://github.com/3gstudent/pyKerbrute// |
https://3gstudent.github.io/ |
good in study,attitude and health |
None |
None |
79 |
0 |
170 |
1600 |
14 |
Python,Batchfile,PowerShell,C++ |
640 |
214 |
CHYbeta |
Web安全学习的一个github库 |
https://github.com/CHYbeta/Web-Security-Learning |
https://twitter.com/chybeta |
|
China |
XMU |
27 |
0 |
1600 |
1400 |
122 |
Python,HTML |
2700 |
807 |
CHEF-KOCH |
KMS-activator - 关于 Windows 激活机制研究的一个项目 |
https://github.com/CHEF-KOCH/KMS-activator |
https://github.com/microsoft |
Former @microsoft and @NVIDIA employee. Since 2018 NTT-Security. Interested in privacy/security, gaming & demoscene related topics. |
Lausanne |
CKs Technology News |
125 |
0 |
4100 |
1400 |
127 |
Python,C,Batchfile,JavaScript,Pascal |
590 |
145 |
mattifestation |
用于辅助构建、审计、部署 Windows Defender Application Control (WDAC) 策略的工具 |
https://github.com/mattifestation/WDACTools |
http://www.exploit-monday.com/ |
|
None |
None |
26 |
0 |
9 |
1100 |
1 |
PowerShell |
653 |
167 |
ionescu007 |
TpmTool - TPM NV Space Access Tool |
https://github.com/ionescu007/tpmtool// |
https://github.com/aionescu |
VP of EDR Strategy at CrowdStrike President of Winsider Seminars & Solutions, Inc. Follow me at @aionescu on Twitter and http://www.alex-ionescu.com |
None |
Winsider Seminars & Solutions Inc. |
22 |
0 |
0 |
1100 |
1 |
C,C++ |
1100 |
193 |
FuzzySecurity |
基于 Electron 为 Frida 编写一个 UI 界面 |
https://github.com/FuzzySecurity/Fermion/blob/master/CHANGELOG.txt |
http://www.fuzzysecurity.com/ |
|
None |
None |
16 |
0 |
0 |
1100 |
0 |
C#,JavaScript,PowerShell |
1800 |
595 |
vanhauser-thc |
如何在 AFL++ 的 QEMU 模式下使用 persistent 运行模式 |
https://github.com/vanhauser-thc/AFLplusplus/blob/master/qemu_mode/README.persistent.md |
https://www.mh-sec.de/ |
Security researcher since 1994 https://www.mh-sec.de/ https://www.thc.org/ https://twitter.com/hackerschoice |
Berlin |
The Hackers Choice , mh-sec , me , myself |
26 |
0 |
54 |
851 |
21 |
Batchfile,C,HTML,C++ |
3500 |
963 |
random-robbie |
一款用于检查SSRF漏洞的fuzz工具。 |
https://github.com/random-robbie/ssrf-finder |
https://www.what-security.co.uk |
Bug Bounty Hunter that appears in your searches! Soz not Soz! Raise an Issue if you wish to contact me do not email me! |
Wirral UK |
None |
232 |
0 |
295 |
696 |
113 |
Python |
554 |
212 |
tandasat |
在 Hyper-V 环境中测试 UEFI |
https://github.com/tandasat/MiniVisorPkg/blob/master/Docs/Testing_UEFI_on_Hyper-V.md |
http://standa-note.blogspot.ca/ |
Engineer @standa_t |
Vancouver, Canada |
None |
58 |
0 |
19 |
668 |
3 |
C,C++ |
777 |
245 |
klionsec |
RedTeamer: 红方人员作战执行手册 |
https://github.com/klionsec/RedTeamer |
https://huntingday.github.io |
|
MITRE , ATT&CK 中文站 |
[email protected] |
6 |
0 |
91 |
629 |
14 |
Shell,HTML |
352 |
85 |
lirantal |
Awesome Node.js Security resources |
https://github.com/lirantal/awesome-nodejs-security#static-code-analysis |
https://github.com/snyksec |
🥑 Developer Advocate @snyksec , @nodejs Security WG , @jsheroes ambassador , Author of Essential Node.js Security , #opensource #web ❤ |
Tel Aviv, Israel |
@snyk |
240 |
0 |
695 |
621 |
271 |
JavaScript |
2600 |
108 |
grayddq |
ScanCVE: 监控Github上CVE增量 |
https://github.com/grayddq/ScanCVE |
None |
一位喜欢原创的安全工作者! |
None |
None |
17 |
0 |
0 |
587 |
0 |
Python |
844 |
265 |
404notf0und |
AISec 17~19 届会议的 Papers |
https://github.com/404notf0und/AI-for-Security-Paper |
https://www.4o4notfound.org |
欢迎关注公众号:404 Not F0und,专注于Cyber-Security and Data-Analysis |
Hangzhou,China |
Ant Financial |
17 |
0 |
96 |
575 |
17 |
Python,Jupyter,TSQL |
703 |
160 |
tanjiti |
2019安全技术资讯年报 |
https://github.com/tanjiti/sec_profile/blob/master/README_YEAR_2019.md |
http://tanjiti.com/ |
#Network Security Monitor #threat intelligence #waf #ids #iOS App Security #Android App Security #game security |
shanghai |
baidu |
17 |
0 |
6 |
552 |
171 |
Python,PHP,HTML,Perl |
385 |
174 |
0x09AL |
A native backdoor module for Microsoft IIS |
https://github.com/0x09AL/IIS-Raid |
https://twitter.com/0x09AL |
|
None |
MDSec |
126 |
0 |
150 |
552 |
26 |
Go,C#,Ruby,C++ |
679 |
149 |
qazbnm456 |
awesome-web-security: List of Web Security materials and resources |
https://github.com/qazbnm456/awesome-web-security |
https://www.patreon.com/boik |
https://www.boik.com.tw/ |
Taiwan |
None |
109 |
0 |
1100 |
550 |
20 |
Python,JavaScript |
4700 |
907 |
TheKingOfDuck |
ApkAnalyser: 一键提取安卓应用中可能存在的敏感信息 |
https://github.com/TheKingOfDuck/ApkAnalyser |
https://blog.gzsec.org/ |
一个废物 |
V1g6VGhlS2luZ09mR2FHYUdh |
None |
36 |
0 |
190 |
515 |
26 |
Shell,Python,JavaScript,HTML,Go,PowerShell |
1600 |
653 |
pyn3rd |
Apache Tomcat + MongoDB 远程代码执行Poc公布 |
https://github.com/pyn3rd/Apache-Tomcat-MongoDB-Remote-Code-Execution |
https://twitter.com/pyn3rd |
|
Hangzhou |
None |
10 |
0 |
0 |
505 |
3 |
Python,Batchfile,Java |
172 |
60 |
unamer |
之前被用于 WizardOpium APT 攻击行动的 CVE-2019-1458 Windows LPE 漏洞的 Exploit |
https://github.com/unamer/CVE-2019-1458 |
http://127.0.0.1/phpMyAdmin |
<script>alert(Hello world)</script> |
C:\Windows\ |
None |
39 |
0 |
35 |
499 |
4 |
Python,C,C++ |
748 |
359 |
moonbingbing |
OpenResty 最佳实践 |
https://github.com/moonbingbing/openresty-best-practices |
None |
|
None |
360 |
30 |
0 |
49 |
465 |
5 |
Python,Lua,C,Perl |
2900 |
726 |
blackorbird |
伊朗 APT 组织攻击活动 DUSTMAN 的分析报告 |
https://github.com/blackorbird/APT_REPORT/blob/master/International%20Strategic/Iran/Saudi-Arabia-CNA-report.pdf |
http://blackorbird.com |
APT hunter threat analyst |
https://twitter.com/blackorbird |
https://twitter.com/blackorbird |
51 |
0 |
112 |
352 |
36 |
Python,C,C++ |
702 |
239 |
woj-ciech |
LeakLooker X - 数据库/源码泄漏监控工具 |
https://github.com/woj-ciech/LeakLooker-X |
None |
|
None |
None |
15 |
0 |
0 |
306 |
0 |
Python,Go,JavaScript,CSS |
1100 |
227 |
alephsecurity |
QEMU 的 Aleph Research fork 版本,用于运行 iOS 系统 |
https://github.com/alephsecurity/xnu-qemu-arm64 |
https://alephsecurity.com/ |
Security Research |
None |
HCL Technologies |
14 |
0 |
0 |
292 |
0 |
Python,C,Shell,Java |
419 |
49 |
mhaskar |
Python 编写的 C&C Server,可以通过 HTTP/S 控制 PowerShell Agent |
https://github.com/mhaskar/Octopus |
https://shells.systems |
Hacker and Python developer , OSCP and OSCE certified. |
Amman |
iSecur1ty |
46 |
0 |
40 |
290 |
12 |
Python,C |
269 |
61 |
djhohnstein |
SharpChromium - 用于从 Chromium 系列浏览器中获取 Cookie、访问历史、网站登录凭据等敏感信息的工具 |
https://github.com/djhohnstein/SharpChromium |
https://github.com/specterops |
Operator at SpecterOps. Kali Contributor. |
Seattle, WA |
@specterops |
123 |
0 |
10 |
288 |
6 |
C#,VBScript,C++ |
104 |
23 |
alphaSeclab |
DBI(Dynamic Binary Instrumentation:动态二进制插桩)逆向有关的资源收集 |
https://github.com/alphaSeclab/DBI-Stuff |
None |
|
None |
None |
17 |
0 |
38 |
288 |
0 |
|
1600 |
264 |
irsdl |
历年Web hacking技巧大全 |
https://github.com/irsdl/top10webseclist |
https://soroush.me/ |
|
@irsdl (Twitter), UK, The Contrived World of InfoSec >abcd |
@MDSecLabs (Twitter) |
27 |
0 |
43 |
269 |
0 |
Python,C#,Java |
430 |
120 |
0xZ0F |
Windows x64 平台逆向分析教程 |
https://github.com/0xZ0F/Z0FCourse_ReverseEngineering |
https://0xz0f.github.io/ |
Security Researcher & Exploit Dev. |
United States of America |
Z0F |
19 |
0 |
4 |
235 |
0 |
C++ |
3500 |
244 |
HyperSine |
QQ安全中心 - 动态口令的生成算法 |
https://github.com/HyperSine/forensic-qqtoken |
None |
|
None |
None |
19 |
0 |
1 |
228 |
0 |
Python,C,C++ |
251 |
97 |
haidragon |
haidragon/KiwiVM-1: virtualization encryption software for mobile applications |
https://github.com/haidragon/KiwiVM-1 |
http://weibo.com/haidragon |
QQ交流群 : 826038086 |
中国 北京 |
None |
1200 |
0 |
57 |
227 |
532 |
C,JavaScript,C++ |
87 |
31 |
jvoisin |
php-malware-finder – Detect Potentially Malicious PHP |
https://github.com/jvoisin/php-malware-finder |
https://dustri.org |
|
None |
None |
19 |
0 |
158 |
226 |
8 |
C,PHP,C++ |
12600 |
2200 |
guhe120 |
guhe 对 Windows RPC Marshalling 溢出漏洞(CVE-2020-1281)的分析 |
https://github.com/guhe120/Windows-EoP/blob/master/CVE-2020-1281/CVE-2020-1281.pdf |
None |
|
None |
None |
8 |
0 |
0 |
225 |
0 |
Python,HTML,Java |
80 |
11 |
hahwul |
Powerfull XSS Scanning and Parameter analysis tool |
https://github.com/hahwul/XSpear |
https://www.hahwul.com |
Security engineer, Rubyist, Gopher and... H4cker |
Republic of Korea |
None |
47 |
0 |
64 |
222 |
10 |
Python,Go,Ruby |
396 |
115 |
ioncodes |
在 VS Code 中调试 IDA idapython 脚本的插件 |
https://github.com/ioncodes/idacode |
https://twitter.com/layle_ctf |
Hacker in the streets, reverse engineer in the sheets. Thats how it works, right? |
Here |
None |
264 |
0 |
1800 |
203 |
33 |
C#,Python,Ruby |
209 |
29 |
sailay1996 |
AMD User Experience Program Launcher 本地提权漏洞分析(CVE-2020-8950) |
https://github.com/sailay1996/amd_eop_poc |
https://heynowyouseeme.blogspot.com/ |
Twitter: @404death , https://www.hackthebox.eu/profile/1467 |
Myanmar |
None |
177 |
0 |
4 |
197 |
0 |
Python,C,Shell,Batchfile |
432 |
69 |
Wenzel |
awesome-virtualization: Collection of resources about Virtualization |
https://github.com/Wenzel/awesome-virtualization |
None |
Security Researcher , VMI hypervisor-level debugger |
Paris, France |
None |
110 |
0 |
363 |
192 |
104 |
Python,Ruby,Rust |
517 |
103 |
Leezj9671 |
渗透测试和安全面试的经验之谈 |
https://github.com/Leezj9671/Pentest_Interview |
http://neversec.top |
2018 newly graduated student. Web pentester/Python coder. 公众号: NeverSec |
Shenzhen,CN |
None |
45 |
0 |
95 |
178 |
0 |
Python,JavaScript,Dockerfile |
891 |
207 |
Kelvinhack |
ThreadSpy - 基于硬件实现的 Thread Hijacker |
https://github.com/Kelvinhack/ThreadSpy |
https://github.com/Tencent |
@Tencent Ex Anti-Cheat Researcher @microsoft Security Researcher II |
Vancouver |
Microsoft |
40 |
0 |
18 |
176 |
1 |
C,C++ |
229 |
85 |
LeadroyaL |
shadowsocks redirect attack exploit |
https://github.com/LeadroyaL/ss-redirect-vuln-exp |
https://www.leadroyal.cn |
Android & Pwn. |
ZJU |
ZJU |
29 |
0 |
44 |
162 |
7 |
Python,Java,C++ |
178 |
28 |
citronneur |
rdp-rs: Remote Desktop Protocol in RUST |
https://github.com/citronneur/rdp-rs |
https://github.com/airbus-cert |
|
Toulouse, France |
@airbus-cert |
24 |
0 |
284 |
159 |
102 |
Python,C#,JavaScript,Rust |
1200 |
305 |
nshalabi |
SysmonTools - 用于为 Sysmon 提供可视化 UI 和配置的工具套件 |
https://github.com/nshalabi/SysmonTools |
http://nosecurecode.com |
#InfoSec Manager, #Programmer. Following the digital [chaos] and threats landscape. My opinions are my own. Follow me @nader_shalabi and http://nosecurecode.com |
Australia |
nosecurecode.com |
5 |
0 |
162 |
143 |
16 |
C#,HTML,Java,C++ |
694 |
145 |
ddz |
Decrypt WhatsApp encrypted media files |
https://github.com/ddz/whatsapp-media-decrypt |
https://github.com/cashapp |
Securing @cashapp at @square. Prev: Co-founder/CTO @capsule8, @trailofbits. Co-author “The Mac Hacker’s Handbook,” “iOS Hacker’s Handbook,” etc. |
Brooklyn, NY |
@cashapp |
4 |
0 |
0 |
143 |
0 |
Go,Nix,Shell |
423 |
44 |
threedr3am |
Java安全相关的漏洞和技术demo |
https://github.com/threedr3am/learnjavabug |
https://threedr3am.github.io |
|
None |
None |
30 |
0 |
159 |
142 |
27 |
Java |
514 |
102 |
wcventure |
MemLock: Memory Usage Guided Fuzzing |
https://github.com/wcventure/MemLock-Fuzz |
https://wcventure.github.io/ |
Computer Software and Theory, Software Engineering, Machine Learning, Formal Method, Program Analysis, Software Verification, Cyber Security. |
Shenzhen, Guangdong Province, China, 518060 |
Shenzhen University |
15 |
0 |
98 |
138 |
14 |
Python,C,Batchfile |
244 |
36 |
jacobsoo |
研究员 Jacob Soo 分享的关于恶意软件分析的几篇笔记 |
https://github.com/jacobsoo/Shared// |
None |
|
None |
None |
63 |
0 |
0 |
136 |
23 |
Python,HTML,Jupyter |
131 |
47 |
WalterInSH |
风险控制笔记,适用于互联网企业 |
https://github.com/WalterInSH/risk-management-note |
http://walterinsh.github.io |
|
Po Shanghai |
None |
30 |
0 |
678 |
134 |
86 |
Java |
489 |
211 |
theLSA |
emergency-response-checklist:应急响应指南 |
https://github.com/theLSA/emergency-response-checklist |
http://www.lsablog.com |
I like network security,penestration and programming(python,c/c++,php,java,ect),welcome to communicate with me! |
China |
None |
38 |
0 |
36 |
133 |
35 |
Python |
281 |
77 |
dayt0n |
64-bit iOS boot image patcher written in C |
https://github.com/dayt0n/kairos |
http://dayt0n.com |
19. iOS and OS X tinkerer. Computer Science at UAH. |
United States |
None |
37 |
0 |
43 |
132 |
47 |
Python,C,Shell,C++ |
23 |
7 |
gobysec |
Goby新一代安全测试工具 |
https://github.com/gobysec/Goby |
http://gobies.org |
Goby - Make Cybersecurity More Effective The new generation of network security technology |
None |
Goby |
7 |
0 |
1 |
128 |
0 |
Python,Go |
73 |
9 |
guimaizi |
testing_wave: 被动式web扫描器 |
https://github.com/guimaizi/testing_wave |
http://www.guimaizi.com/ |
|
None |
None |
5 |
0 |
31 |
125 |
2 |
Python,HTML |
313 |
81 |
euphrat1ca |
security_w1k1: 安全相关资源列表 |
https://github.com/euphrat1ca/security_w1k1 |
None |
Thousands Times |
polar |
None |
79 |
0 |
498 |
120 |
40 |
Python,Go,Ruby |
343 |
119 |
dwisiswant0 |
一款可以用于检查IP地址是否属于Cloudflare |
https://github.com/dwisiswant0/cf-check// |
https://github.com/kitabisa |
Security Engineer |
id_ID |
@kitabisa |
165 |
0 |
473 |
119 |
12 |
Go,Python,Shell,PHP |
105 |
26 |
ChanChiChoi |
人脸识别相关的 Papers 收集 - Awesome Face Recognition |
https://github.com/ChanChiChoi/awesome-Face_Recognition |
http://www.cnblogs.com/shouhuxianjian/ |
|
China |
None |
21 |
0 |
184 |
110 |
51 |
Python,Jupyter |
1800 |
495 |
itm4n |
PrivescCheck - 用于探测 Windows 是否存在可以被用于本地提权的错误配置 |
https://github.com/itm4n/PrivescCheck |
https://itm4n.github.io/ |
Pentester |
Paris |
None |
8 |
0 |
27 |
109 |
11 |
VBA,PowerShell,C++ |
321 |
87 |
brompwnie |
A HTTP PoC Endpoint for cve-2020-5260 |
https://github.com/brompwnie/cve-2020-5260/ |
https://twitter.com/brompwnie |
Keyboard wrangler ⌨️ |
None |
None |
29 |
0 |
16 |
91 |
169 |
Go,Shell |
269 |
25 |
beader |
首届中文NL2SQL挑战赛决赛第3名方案+代码 |
https://github.com/beader/tianchi_nl2sql |
None |
|
上海 |
None |
20 |
0 |
396 |
90 |
3 |
Python,Shell,Jupyter |
148 |
57 |
angelwhu |
基于JVM-Sandbox实现RASP安全监控防护 |
https://github.com/angelwhu/jvm-rasp |
http://www.angelwhu.com/ |
|
wuhan |
whu |
71 |
0 |
307 |
89 |
33 |
Python,C,PHP,Java |
21 |
8 |
insightglacier |
Apache Shiro 反序列化漏洞扫描与利用工具 |
https://github.com/insightglacier/Shiro_exploit |
http:/www.shellpub.com |
Security Research |
Beijing |
Shellpub |
65 |
0 |
352 |
87 |
220 |
Python,C,PHP,CSS,C++ |
44 |
26 |
JavierOlmedo |
Joplin markdown 笔记软件被发现 XSS 任意文件读漏洞(CVE-2020-9038) |
https://github.com/JavierOlmedo/CVE-2020-9038// |
https://hackpuntes.com |
👨💻 Security Researcher & Ethical Hacker |
Toledo, Spain |
None |
117 |
0 |
753 |
86 |
230 |
Python,JavaScript,Visual,HTML,Go,CSS |
186 |
38 |
omergunal |
Predict attacker groups from the techniques and software used |
https://github.com/omergunal/Attacker-Group-Predictor |
https://ogunal.com |
|
Turkey |
None |
18 |
0 |
52 |
85 |
17 |
Python |
2000 |
229 |
StrangerealIntel |
DailyIOC: IOC from articles, tweets for archives |
https://github.com/StrangerealIntel/DailyIOC |
None |
|
None |
None |
2 |
0 |
2 |
83 |
0 |
YARA,JavaScript |
280 |
44 |
Flangvik |
BetterSafetyKatz: SafetyKatz dynamically fetches the lates... |
https://github.com/Flangvik/BetterSafetyKatz |
https://twitter.com/Flangvik |
Nerd that spend way to much time at this stuff |
Norway |
None |
23 |
0 |
38 |
82 |
1 |
C#,Python |
234 |
50 |
NoorQureshi |
Kali Linux 渗透测试手册 |
https://github.com/NoorQureshi/kali-linux-cheatsheet |
https://github.com/RocketChat |
#Hackers Are Real, Monsters are real too. They live inside us, and sometimes, They Win. |
None |
@RocketChat |
187 |
0 |
106 |
81 |
37 |
Python,Shell |
288 |
116 |
BatchDrake |
SigDigger - 基于 QT 编写的数字信号分析工具 |
https://github.com/BatchDrake/SigDigger |
http://actinid.org |
I code for fun. Interested in reverse engineering, astronomy, microkernel design, radio and digital signal processing. EA1IYR |
Madrid, Spain |
None |
25 |
0 |
5 |
81 |
4 |
C,CSS,C++ |
95 |
13 |
Captainarash |
X86架构圣经指南手册。 |
https://github.com/Captainarash/The_Holy_Book_of_X86 |
https://twitter.com/H4UL4 |
Computing Offsets \x00 |
Helsinki, Finland |
None |
6 |
0 |
19 |
80 |
6 |
JavaScript,C++ |
492 |
101 |
DimitriFourny |
macOS/iOS CVE-2019-6207 内核信息泄漏的 PoC 代码 |
https://github.com/DimitriFourny/cve-2019-6207 |
https://dimitrifourny.github.io |
French security researcher. |
None |
None |
17 |
0 |
70 |
69 |
6 |
Python,C,C++ |
62 |
13 |
ReddyyZ |
GhostShell - 一款开源恶意软件,具有 Bypass AVs、VMs、以及 Sandboxes 的实现 |
https://github.com/ReddyyZ/GhostShell |
https://www.youtube.com/c/fantasmanosistema |
Im a young programmer, 13 years old, and Im always looking for knowledge. |
Brazil |
None |
32 |
0 |
138 |
68 |
13 |
Python,C,Shell |
160 |
58 |
zsdlove |
Hades - 静态代码脆弱性检测系统 |
https://github.com/zsdlove/Hades |
None |
|
None |
None |
126 |
0 |
193 |
62 |
16 |
Python,Java,Smali |
163 |
41 |
wooyunwang |
Fortify: 源代码漏洞の审计 |
https://github.com/wooyunwang/Fortify |
http://www.52pwn.club/ |
A strange guy who will make the world a better place! |
California |
Google Inc. |
27 |
0 |
15 |
60 |
14 |
Python,C#,Java,PowerShell |
322 |
104 |
insanitybit |
grapl: Graph platform for Detection and Response |
https://github.com/insanitybit/grapl |
http://insanitybit.com |
|
New York |
None |
69 |
0 |
27 |
60 |
0 |
Rust |
275 |
21 |
SoftwareGift |
CVPR2019 面部识别欺骗检测比赛的代码 |
https://github.com/SoftwareGift/FeatherNets_Face-Anti-spoofing-Attack-Detection-Challenge-CVPR2019 |
None |
I am a graduate student at Huazhong University of Science and Technology, focusing on mobile network design and face anti-spoofing. |
None |
None |
64 |
0 |
738 |
60 |
12 |
Python,C++ |
563 |
194 |
bohops |
GhostBuild - MSBuild launchers for various GhostPack/.NET projects |
https://github.com/bohops/GhostBuild |
http://bohops.com |
|
None |
None |
9 |
0 |
31 |
59 |
2 |
Python,PowerShell |
105 |
17 |
smodnix |
This challenge is Inon Shkedys 31 days API Security Tips. |
https://github.com/smodnix/31-days-of-API-Security-Tips |
https://smodnix.codes |
Experienced in Web related technologies and interested in security aspects as well. |
None |
None |
30 |
0 |
450 |
58 |
582 |
|
801 |
106 |
BeetleChunks |
ManageEngine OpManger 任意文件读漏洞 PoC(CVE-2020-12116) |
https://github.com/BeetleChunks/CVE-2020-12116 |
None |
OSCP, Red Teamer, Pentester, Developer, Hacker |
None |
None |
11 |
0 |
62 |
58 |
3 |
Python,C,PowerShell |
277 |
73 |
ph4ntonn |
Impost3r -- 悄悄偷走sudo密码的小偷 |
https://github.com/ph4ntonn/Impost3r |
None |
The wheel turns,nothing is ever new |
0x7F000001 |
Unknown |
35 |
0 |
38 |
57 |
21 |
C,Shell,Python,JavaScript,HTML,Go |
226 |
40 |
mai-lang-chai |
CMS、中间件漏洞检测利用合集 |
https://github.com/mai-lang-chai/Middleware-Vulnerability-detection |
https://mai-lang-chai.github.io |
🗝 under Control😎 |
None |
None |
19 |
0 |
15 |
57 |
8 |
Python |
93 |
32 |
FoxHex0ne |
作者开源了博客中提到的监控 Hyper Call 的工具 |
https://github.com/FoxHex0ne/BlogHyperV |
None |
|
None |
None |
8 |
0 |
0 |
57 |
0 |
Python,Java,C++ |
98 |
25 |
maxpl0it |
IE 浏览器 JS 脚本引擎 CVE-2020-0674 漏洞的 Exploit |
https://github.com/maxpl0it/CVE-2020-0674-Exploit |
https://twitter.com/maxpl0it |
Security researcher from the South East of England. |
South East, England |
None |
10 |
0 |
0 |
55 |
0 |
Python,C,HTML |
84 |
24 |
mike-goodwin |
owasp-threat-dragon-desktop: 威胁建模工具 |
https://github.com/mike-goodwin/owasp-threat-dragon-desktop |
https://github.com/OWASP |
|
UK |
@OWASP |
24 |
0 |
1 |
54 |
1 |
Shell,JavaScript,HTML,CSS |
398 |
88 |
pventuzelo |
WARF - WebAssembly Runtimes Fuzzing project |
https://github.com/pventuzelo/wasm_runtimes_fuzzing |
https://webassembly-security.com/ |
Independent Security Researcher, Trainer of WebAssembly & Rust Security, mainly focused on Fuzzing, Vulnerability Research, Reversing & Binary analysis |
Paris, France |
Independent Security Researcher |
40 |
0 |
254 |
53 |
55 |
Python,WebAssembly,JavaScript,HTML,Rust |
230 |
38 |
vavkamil |
Damn Vulnerable WordPress - 用于研究 Wordpress 漏洞的一个项目 |
https://github.com/vavkamil/dvwp |
https://vavkamil.cz |
|
Czechia |
None |
13 |
0 |
1100 |
51 |
22 |
Python,PHP,TSQL |
56 |
9 |
EddieIvan01 |
iox: 端口转发 & 内网代理工具 |
https://github.com/EddieIvan01/iox/blob/master/docs/README_CN.md |
http://iv4n.cc/ |
|
127.0.0.1 |
None |
36 |
0 |
55 |
51 |
16 |
Go,Python,Scheme |
115 |
23 |
ollypwn |
GitHub 出现疑似昨天微软修复的 CVE-2020-0601 证书验证欺骗漏洞的 PoC |
https://github.com/ollypwn/cve-2020-0601 |
None |
https://twitter.com/ollypwn |
Copenhagen, Denmark |
None |
2 |
0 |
0 |
49 |
0 |
C,Ruby |
574 |
149 |
zrax |
Decompyle++ - Python 字节码反编译工具 |
https://github.com/zrax/pycdc |
None |
|
None |
None |
45 |
0 |
24 |
48 |
7 |
C++ |
736 |
164 |
lightswitch05 |
php-version-audit - 根据 PHP 版本检测已知漏洞 |
https://github.com/lightswitch05/php-version-audit |
None |
|
None |
None |
42 |
0 |
32 |
47 |
22 |
Python,PHP |
82 |
13 |
CTF-MissFeng |
bayonet: SRC资产管理系统 |
https://github.com/CTF-MissFeng/bayonet |
None |
|
None |
None |
3 |
0 |
57 |
46 |
0 |
Python |
443 |
87 |
gerhart01 |
Hyper-V internals researches (2006-2019) |
https://github.com/gerhart01/Hyper-V-Internals/blob/master/HyperResearchesHistory.md |
https://hvinternals.blogspot.com/ |
|
None |
None |
6 |
0 |
124 |
45 |
0 |
Python,C,HTML,C++ |
80 |
17 |
nafod |
nafod 公开了自己 VMware UHCI ZDI-19-421 漏洞的 Exploit |
https://github.com/nafod/advent-vmpwn// |
None |
|
None |
None |
15 |
0 |
117 |
44 |
24 |
C,JavaScript |
5 |
1 |
0xricksanchez |
HITB 2020 Lockdown 会议 《Fuzz 文件系统的实现》议题的代码与 PPT |
https://github.com/0xricksanchez/fs-fuzzer |
http://0x434b.dev |
Trying to advance in the areas of IT-Sec, reversing and hacking. Also doing administrative jobs @ www.0x00sec.org |
@0xricksanchez |
None |
14 |
0 |
395 |
44 |
46 |
Python,Shell,CSS |
10 |
4 |
cedowens |
macOS 平台一款类似 Seatbelt 的工具,可以用于渗透阶段提取系统的各类信息 |
https://github.com/cedowens/SwiftBelt |
https://medium.com/red-teaming-with-a-blue-team-mentaility |
offensive security engineer |
None |
None |
27 |
0 |
0 |
39 |
3 |
Python,Swift |
52 |
12 |
sahilmgandhi |
IotShark - Monitoring and Analyzing IoT Traffic |
https://github.com/sahilmgandhi/IotShark |
http://www.sahilmgandhi.com |
Distributed and Big Data Systems @ UCLA |
UCLA |
None |
29 |
0 |
21 |
38 |
31 |
C,Java,Python,JavaScript,C++,HTML |
42 |
7 |
assafmo |
joincap: Merge multiple pcap files together, gracefully. |
https://github.com/assafmo/joincap |
https://github.com/enigmampc |
|
Israel |
@enigmampc |
25 |
0 |
270 |
35 |
18 |
Go,JavaScript |
140 |
12 |
Qftm |
Handbook of information collection for penetration testing and src |
https://github.com/Qftm/Information_Collection_Handbook |
https://qftm.github.io/ |
CTFer,Pentester,BugBountyHunter,Security Researcher,Mobile Security and Development |
Internet |
None |
7 |
0 |
53 |
35 |
35 |
Python,HTML,JavaScript,PHP,C++ |
254 |
56 |
p1g3 |
JSONP-Hunter: JSONP Hunter in Burpsuite |
https://github.com/p1g3/JSONP-Hunter |
None |
|
None |
None |
8 |
0 |
16 |
34 |
0 |
Python,Shell,HTML |
60 |
11 |
lilang-wu |
p-joker - 用于分析 iOS/macOS 内核 Kernelcache 与扩展的工具 |
https://github.com/lilang-wu/p-joker |
None |
|
None |
None |
32 |
0 |
11 |
29 |
13 |
Python,C |
40 |
19 |
Wangpeiyi9979 |
IE-Bert-CNN: 百度2019语言与智能技术竞赛信息抽取模型 |
https://github.com/Wangpeiyi9979/IE-Bert-CNN |
None |
我可以做到,我必须做到,我做的最好。 |
ChengDu,SiChuan,China |
TianJin University |
22 |
0 |
27 |
29 |
18 |
Python,Jupyter |
101 |
28 |
ATpiu |
asset-scan: 甲方企业的外网资产周期性扫描监控系统 |
https://github.com/ATpiu/asset-scan |
None |
Penetration Test/Gopher/App Sec/ICS Sec |
None |
None |
100 |
0 |
292 |
28 |
119 |
Go,Python |
40 |
6 |
kabeor |
有研究员总结的 Unicorn CPU 模拟器的非官方 API 文档 |
https://github.com/kabeor/Micro-Unicorn-Engine-API-Documentation |
https://kabeor.cn |
Hello,Computers ! |
SiChuan,China |
SWUST |
11 |
0 |
79 |
27 |
0 |
HTML,C++ |
41 |
16 |
yusufqk |
SystemToken: Steal privileged token to obtain SYSTEM shell |
https://github.com/yusufqk/SystemToken |
None |
Twitter: @ZupOctopus |
None |
None |
5 |
0 |
6 |
26 |
37 |
Python,C,JavaScript |
112 |
24 |
linhaow |
TextClassify: 基于预训练模型的文本分类模板 |
https://github.com/linhaow/TextClassify |
http://公众号:纸鱼AI |
USTC |
上海-徐汇 |
南七技校&字节跳动intern |
3 |
0 |
5 |
26 |
359 |
Python |
66 |
25 |
Ascotbe |
Medusa: 美杜莎扫描器 |
https://github.com/Ascotbe/Medusa |
https://www.ascotbe.com/ |
在?来个女朋友?喵喵喵? |
一切都是命运石之门的选择 |
None |
12 |
0 |
75 |
26 |
1 |
Python,HTML,C++ |
125 |
24 |
threat-hunting |
Awesome Threat Detection and Hunting library |
https://github.com/threat-hunting/awesome_Threat-Hunting |
None |
|
Sweden |
None |
42 |
0 |
5 |
25 |
16 |
JavaScript,Java |
228 |
46 |
NomadCN112 |
ATT&CK 框架图中文翻译版 |
https://github.com/NomadCN112/Chinese-translation-ATT-CK-framework |
None |
憨批独眼小子 (如果可以的话,谁愿意拿命去战斗呢) |
None |
None |
15 |
0 |
10 |
25 |
2 |
Python,C# |
131 |
37 |
cbwang505 |
Windows CardSpace 服务符号链接导致任意文件替换漏洞 Exploit |
https://github.com/cbwang505/CVE-2020-1066-EXP |
https://blog.csdn.net/oShuangYue12 |
始于C#,精于C&C++,醉心于Windows内核与Com组件安全研究 |
China ZheJiang Ningbo |
ZheJiang Guoli Security Technology |
30 |
0 |
17 |
24 |
5 |
C,C++ |
43 |
9 |
S1lkys |
XAMPP 本地提权漏洞分析(CVE-2020-11107) |
https://github.com/S1lkys/CVE-2020-11107/ |
None |
|
None |
None |
27 |
0 |
1 |
23 |
0 |
Python,Shell |
12 |
3 |
yoava333 |
Bug on the Windshield - Fuzzing the Windows kernel,来自 OffensiveCon 2020 会议 |
https://github.com/yoava333/presentations/blob/master/Fuzzing%20the%20Windows%20Kernel%20-%20OffensiveCon%202020.pdf |
None |
|
None |
None |
15 |
0 |
16 |
22 |
0 |
Go,Java,Rust |
17 |
1 |
yardenshafir |
KernelDataStructureFinder - 在内核 lookaside 链表中搜索数据结构的工具 |
https://github.com/yardenshafir/KernelDataStructureFinder |
None |
|
None |
None |
5 |
0 |
2 |
22 |
0 |
C,C++ |
40 |
20 |
ody5sey |
Voyager: 安全工具集合平台 |
https://github.com/ody5sey/Voyager |
None |
|
None |
None |
3 |
0 |
1 |
21 |
0 |
Python,HTML |
147 |
61 |
Cl0udG0d |
碎遮SZhe_Scan Web漏洞扫描器 |
https://github.com/Cl0udG0d/SZhe_Scan |
None |
愿你在冷铁卷刃前,得以窥见天光 |
重庆 |
CQUT |
10 |
0 |
5 |
21 |
2 |
Python |
141 |
39 |
sisoc-tokyo |
Real-time detection of high-risk attacks leveraging Kerber... |
https://github.com/sisoc-tokyo/Real-timeDetectionAD_jornal |
None |
|
None |
None |
23 |
0 |
2 |
20 |
0 |
Python,HTML |
71 |
9 |
m4yfly |
基于正则的VSCode代码审计插件 |
https://github.com/m4yfly/vscode-maudit |
https://aiyo.xyz |
|
None |
None |
29 |
0 |
398 |
20 |
39 |
Python,Dockerfile,TypeScript,JavaScript |
43 |
14 |
guibacellar |
DNCI - 将 .NET 代码远程注入到非托管进程中 |
https://github.com/guibacellar/DNCI |
https://theobservator.net |
Security Researcher and Machine Learning Specialist, researching in fraud detection, cyber espionage and artificial intelligence areas. |
Brazil |
None |
11 |
0 |
10 |
20 |
0 |
C#,Python,CSS |
74 |
30 |
mrlnc |
禁用LTE网络安全性-商业网络中的配置错误安全研究分享。 |
https://github.com/mrlnc/LTE-ciphercheck |
None |
Research Assistant & PhD student. Mobile Network Security at Ruhr-Universität Bochum. |
Bochum, Germany |
Ruhr-Universität Bochum |
15 |
0 |
26 |
18 |
30 |
C++ |
36 |
13 |
MisakiKata |
Python 代码审计 |
https://github.com/MisakiKata/python_code_audit |
https://misakikata.github.io |
企业安全,Python,红队,渗透等 |
Shanghai |
None |
16 |
0 |
30 |
18 |
31 |
Python,C,Shell,Java,HTML |
19 |
6 |
3xp0rt |
Sorano恶意软件加载器源代码泄漏 |
https://github.com/3xp0rt/SoranoBot |
https://twitter.com/3xp0rtblog |
|
Ukraine |
None |
10 |
0 |
10 |
18 |
3 |
C#,C,HTML |
10 |
10 |
rootsecdev |
ChromeOS Security Notes,包含一份 MIT 对 ChromeOS 的分析报告 |
https://github.com/rootsecdev/ChromeOS |
None |
|
None |
None |
16 |
0 |
1 |
16 |
0 |
Batchfile,Ruby |
75 |
8 |
GuoKerS |
基于协程的CVE-2020-0796快速检测脚本 |
https://github.com/GuoKerS/aioScan_CVE-2020-0796 |
https://o0o0.club |
好好学习,天天向上。 |
Guang Xi |
None |
43 |
0 |
281 |
15 |
41 |
Python,C#,HTML,PowerShell |
10 |
5 |
LakeVilladom |
goSkylar: 基于Golang开发的企业级外网端口资产扫描 |
https://github.com/LakeVilladom/goSkylar |
None |
|
None |
None |
107 |
0 |
140 |
14 |
2 |
Go,Shell,JavaScript |
38 |
21 |
xscorp |
pingfisher: A ping detection tool for linux |
https://github.com/xscorp/pingfisher |
None |
I am a computer science noob who loves programming and cyber security stuff. I believe in self learning and hard work rather than miracles :-) |
None |
None |
10 |
0 |
3 |
13 |
0 |
Python,PHP,Hack |
18 |
2 |
qianxiao996 |
CTF-Tools: 一款Python+Pyqt写的CTF编解码工具 |
https://github.com/qianxiao996/CTF-Tools |
http://blog.qianxiao996.cn |
博客:blog.qianxiao996.cn |
None |
None |
35 |
0 |
193 |
13 |
4 |
Python,C#,HTML |
15 |
8 |
open-source-rs |
The-Cyber-Intelligence-Analyst-Cookbook |
https://github.com/open-source-rs/The-Cyber-Intelligence-Analyst-Cookbook |
None |
|
None |
None |
8 |
0 |
0 |
13 |
2 |
Python,PHP |
34 |
7 |
chrivers |
三星SSD固件文件解密工具Samsung Firmware Magic发布 |
https://github.com/chrivers/samsung-firmware-magic |
http://christianiversenit.dk |
|
Denmark |
Iversen IT |
23 |
0 |
15 |
13 |
6 |
Python,HTML,Smarty |
135 |
20 |
renzu0 |
nw-tips: Win内网_域控安全 |
https://github.com/renzu0/nw-tips |
None |
|
None |
None |
31 |
0 |
2 |
12 |
2 |
Python,TypeScript |
3 |
2 |
onSec-fr |
基于 HTTP 协议的异步反弹 Shell |
https://github.com/onSec-fr/Http-Asynchronous-Reverse-Shell |
None |
Cybersecurity Enthusiast. |
None |
None |
4 |
0 |
7 |
12 |
1 |
C#,Shell,PowerShell |
78 |
20 |
whitehatnote |
BlueShell: 红蓝对抗跨平台远控工具 |
https://github.com/whitehatnote/BlueShell?from=timeline |
None |
|
None |
None |
1 |
0 |
4 |
9 |
0 |
Go |
71 |
10 |
aforensics |
HiddenVM — Use any desktop OS without leaving a trace. |
https://github.com/aforensics/HiddenVM |
None |
|
None |
None |
1 |
0 |
0 |
9 |
0 |
Shell |
836 |
31 |
chompie1337 |
有研究员公开了一个三星 S8 手机利用 CVE-2019-2215 漏洞 Bypass DAC + SELinux + Knox/RKP 保护机制的完整 Exploit |
https://github.com/chompie1337/s8_2019_2215_poc |
None |
|
None |
None |
1 |
0 |
1 |
7 |
0 |
C |
28 |
10 |
afilipovich |
用于 Google Safe Browsing API 交互的 Python 库 |
https://github.com/afilipovich/gglsbl |
None |
|
Olomouc |
None |
10 |
0 |
31 |
7 |
4 |
Python,JavaScript |
66 |
30 |
HE-Wenjian |
CVE-2019-14615 - Intel iGPU 信息泄露漏洞的分析文档和 Demo 代码 |
https://github.com/HE-Wenjian/iGPU-Leak |
None |
PhD Candidate |
Hong Kong |
HKUST: Hong Kong Univ. of Science and Technology |
4 |
0 |
40 |
7 |
7 |
C,HTML |
8 |
2 |
karkason |
PyWinSandbox - Python 实现的将进程放到 Sandbox 环境运行的工具 |
https://github.com/karkason/pywinsandbox |
None |
|
None |
None |
3 |
0 |
19 |
6 |
7 |
Python,C++ |
61 |
3 |
Tera0017 |
APT组织TA505所使用的SDBbot RAT解包工具发布,支持x86和x64 |
https://github.com/Tera0017/SDBbot-Unpacker |
None |
I dont get it. |
None |
None |
3 |
0 |
0 |
6 |
0 |
Python |
38 |
4 |
AlanChou |
unofficial PyTorch implementation of the paper Adversarial Training for Free! |
https://github.com/AlanChou/Adversarial-Training-for-Free |
None |
My research interests lie in weakly supervised learning and adversarial attack/defense. Im also interested in optimization with imbalanced or noisy data. |
Hsinchu City |
None |
5 |
0 |
199 |
6 |
9 |
Python |
13 |
9 |
A2kaid |
Get-WeChat-DB: 获取目标机器的微信数据库和密钥 |
https://github.com/A2kaid/Get-WeChat-DB |
https://www.dongzt.cn/ |
二进制萌新 |
北京 |
None |
33 |
0 |
134 |
6 |
14 |
Python,C,C++ |
44 |
7 |
chip-red-pill |
有研究员利用 Intel Atom CPU 的 Local Direct Access Test (LDAT) DFT 特性 Dump Microcode Sequencer ROM |
https://github.com/chip-red-pill/glm-ucode |
https://github.com/h0t |
Research Team Members: Dmitry Sklyarov (@Dmit), Mark Ermolov (@markel_), Maxim Goryachy (@h0t) |
Moscow |
None |
2 |
0 |
0 |
5 |
0 |
Python |
12 |
1 |
Martyx00 |
Assistant plugin for vulnerability research |
https://github.com/Martyx00/VulnFanatic |
None |
|
None |
None |
4 |
0 |
2 |
5 |
0 |
Python,Objective-C,Shell |
26 |
4 |
weizman |
WhatsApp Desktop 0.3.9309 之前版本 XSS 漏洞分析 |
https://github.com/weizman/CVE-2019-18426 |
http://www.weizmangal.com |
javascript expert and web security enthusiastic :) |
Israel |
https://www.perimeterx.com |
8 |
0 |
3 |
4 |
1 |
JavaScript |
5 |
1 |
reddelexc |
Top disclosed reports from HackerOne |
https://github.com/reddelexc/hackerone-reports |
None |
|
Russia |
Kontur |
2 |
0 |
30 |
4 |
0 |
Python |
89 |
21 |
Equationliu |
ImageNet 图像分类对抗攻击 No.3 solution |
https://github.com/Equationliu/Attack-ImageNet |
None |
|
None |
None |
9 |
0 |
19 |
4 |
1 |
Python |
2 |
1 |
zj1244 |
beholder:一款监控端口变化的系统 |
https://github.com/zj1244/beholder_scanner |
None |
|
|
None |
10 |
0 |
60 |
3 |
3 |
Python,C,HTML,Java |
6 |
5 |
ztosec |
Hunter 中通DevSecOps闭环方案 |
https://github.com/ztosec/hunter |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,Go,Java |
0 |
0 |
zodiacon |
基于 Event Tracing for Windows (ETW) 而不再依赖驱动实现的 Process Monitor |
https://github.com/zodiacon/ProcMonXv2 |
http://scorpiosoftware.net |
|
Israel |
None |
68 |
0 |
0 |
0 |
0 |
C#,C,C++ |
1100 |
296 |
zhutougg |
内网渗透测试常用工具收集 |
https://github.com/zhutougg/Awesome-Intranet_pentest_tool |
None |
|
None |
None |
69 |
0 |
0 |
0 |
0 |
Python,C#,Java |
39 |
9 |
zer0yu |
Awesome CobaltStrike |
https://github.com/zer0yu/Awesome-CobaltStrike |
http://zeroyu.xyz/ |
RedTeam@PolarisLab / CTFer@kn0ck |
None |
None |
40 |
0 |
0 |
0 |
0 |
Python,HTML |
626 |
111 |
ze0r |
Windows Win32k CVE-2020-17057 漏洞 PoC |
https://github.com/ze0r/cve-2020-17057// |
None |
|
None |
None |
49 |
0 |
0 |
0 |
0 |
PowerShell,C++ |
127 |
60 |
zbnio |
zbn: 安全编排与自动化响应平台 |
https://github.com/zbnio/zbn |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python |
0 |
0 |
yifengyou |
QEMU KVM学习笔记. |
https://github.com/yifengyou/learn-kvm |
https://github.com/yifengyou |
一天不科研,浑身都难受~ |
ShenZhen |
Tencent |
262 |
0 |
0 |
0 |
0 |
C |
328 |
97 |
xiaoweiChen |
《Professional CMake - A Practical Guide》的中文翻译版资源。 |
https://github.com/xiaoweiChen/Professional-CMake |
None |
Coder |
China, Zhejiang, Hangzhou |
None |
32 |
0 |
0 |
0 |
0 |
JavaScript,C++ |
1300 |
447 |
x1tan |
用Rust编写的具有串行日志记录和调试支持的UEFI运行时驱动程序项目。 |
https://github.com/x1tan/rust-uefi-runtime-driver |
https://xitan.me |
hypervisors, reverse engineering |
None |
None |
22 |
0 |
0 |
0 |
0 |
Python,Rust |
29 |
6 |
withdk |
Pulse Secure VPN 中间人劫持漏洞分析(CVE-2020-8241、CVE-2020-8239) |
https://github.com/withdk/pulse-secure-vpn-mitm-research |
None |
Quant/technical enthusiast, infosec analyst, red teamer, researcher and search security award winner. @withdk on Twitter. |
London |
None |
17 |
0 |
0 |
0 |
0 |
Python,C,PowerShell |
247 |
62 |
wireapp |
桌面版本 Wire 应用因使用 Electron 不当导致 RCE 漏洞 |
https://github.com/wireapp/wire-desktop/security/advisories/GHSA-5gpx-9976-ggpm |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Groovy,C,TypeScript,Java,HTML,Scala,JavaScript,Shell,Objective-C,Haskell,Swift,HCL |
2900 |
516 |
vxunderground |
vxunderground 按照不同语言收集的恶意软件源码 |
https://github.com/vxunderground/MalwareSourceCode |
https://vx-underground.org |
The largest collection of malware source code, samples, and papers on the internet. |
International |
None |
2 |
0 |
0 |
0 |
0 |
Go,Assembly |
2800 |
276 |
uknowsec |
SharpSQLDump:内网渗透中快速获取数据库所有库名,表名,列名功能。 |
https://github.com/uknowsec/SharpSQLDump |
http://uknowsec.cn |
不忘初心,方得始终 |
Nanjing |
None |
38 |
0 |
0 |
0 |
0 |
C# |
936 |
211 |
ttonys |
获取每日最新的CVE和CNVD漏洞 |
https://github.com/ttonys/Scrapy-CVE-CNVD |
https://www.sys71m.top/ |
只见树木,不见森林 |
None |
None |
5 |
0 |
0 |
0 |
0 |
Python,PHP,HTML,CSS |
15 |
1 |
trailofbits |
Sienna Locomotive - 为缺乏安全经验的 Windows 开发者写的 Fuzzer |
https://github.com/trailofbits/sienna-locomotive |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,Shell,CMake,Python,Ruby,JavaScript,C++,Go,Swift,Rust |
18300 |
1600 |
tothi |
如何利用DLL代理进行DLL劫持 |
https://github.com/tothi/dll-hijack-by-proxying |
https://twitter.com/an0n_r0 |
|
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,C#,C,HTML |
207 |
67 |
tomer8007 |
Chromium IPC Sniffer - 有研究员开发了一个监控 Chromium 浏览器命名管道通信消息的工具 |
https://github.com/tomer8007/chromium-ipc-sniffer |
None |
|
None |
None |
6 |
0 |
0 |
0 |
0 |
Python,Lua,Objective-C,JavaScript,C# |
81 |
44 |
tenable |
用于从 IDL 接口文件中提取 RPC 接口定义的 IDA 插件 |
https://github.com/tenable/mIDA |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Java,Scala,Python,C++,Vim,HTML |
311 |
116 |
tech-srl |
Neural Reverse Engineering of Stripped Binaries using Augmented Control Flow Graphs(Paper) |
https://github.com/tech-srl/Nero |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,Assembly,Python,JavaScript,C#,Java,Jupyter |
0 |
0 |
target |
halogen: Automatically create YARA rules from malicious do... |
https://github.com/target/halogen |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Shell,FreeMarker,Scala,Python,JavaScript,C++,Haskell,CSS,Go,Ruby,Rust |
1100 |
101 |
taomujian |
linbing: 临兵漏洞扫描系统 |
https://github.com/taomujian/linbing |
None |
|
以色列 |
None |
14 |
0 |
0 |
0 |
0 |
Python,C#,Java,HTML,Dockerfile |
139 |
48 |
talos-systems |
Talos - 为 Kubernetes 环境准备的操作系统 |
https://github.com/talos-systems/talos |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Go,Dockerfile,Vue,Makefile |
1900 |
108 |
tacnetsol |
IOT Exploitation Ghidra Scripts |
https://github.com/tacnetsol/ghidra_scripts |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python |
0 |
0 |
synacktiv |
如何利用Windows内核堆栈溢出漏洞进行特权提升(Poc) |
https://github.com/synacktiv/Windows-kernel-SegmentHeap-Aligned-Chunk-Confusion |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,C,PHP,Rust |
0 |
0 |
susam |
UNIX命令语言(1976)资源。 |
https://github.com/susam/tucl |
https://susam.in/ |
|
None |
None |
29 |
0 |
0 |
0 |
0 |
Python,C,JavaScript,Makefile,CSS |
1500 |
66 |
spyre-project |
基于Yara的简单IOC扫描器Spyre |
https://github.com/spyre-project/spyre |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Go |
0 |
0 |
sophos-ai |
SOREL-20M: Sophos-ReversingLabs 20 million sample dataset |
https://github.com/sophos-ai/SOREL-20M |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
YARA,Jupyter,Scala,Python,C++,CSS |
0 |
0 |
sleirsgoevy |
PS4 6.72 版本固件的越狱利用代码 |
https://github.com/sleirsgoevy/ps4jb |
None |
|
None |
None |
38 |
0 |
0 |
0 |
0 |
Python,C,JavaScript |
379 |
107 |
sibears |
用于修改 IDA HexRays AST 的工具 |
https://github.com/sibears/HRAST |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,JavaScript,HTML,CSS |
0 |
0 |
shellphish |
Shellphish 最近更新了 how2heap Repo,包含最新的各类堆利用技巧 |
https://github.com/shellphish/how2heap |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,C,CSS |
4100 |
855 |
seemoo-lab |
Frankenstein - 用于为无线设备固件提供模拟执行和 Fuzz 环境的框架 |
https://github.com/seemoo-lab/frankenstein/ |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,Shell,Jupyter,Python,JavaScript,TeX,Objective-C,HTML,MATLAB,Java |
4100 |
296 |
securesystemslab |
Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints |
https://github.com/securesystemslab/agamotto |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,Shell,Java,Objective-C++,Python,C++,CMake,Rust |
0 |
0 |
sbousseaden |
Windows 系统各类攻击和渗透行为的 Events 样本收集 |
https://github.com/sbousseaden/EVTX-ATTACK-SAMPLES |
http://@SBousseaden |
Threat Hunting & DFIR |
None |
None |
63 |
0 |
0 |
0 |
0 |
Python,YARA,PowerShell |
974 |
195 |
samsonpianofingers |
RTTIDumper - 注入目标进程 Dump 虚函数表的工具 |
https://github.com/samsonpianofingers/RTTIDumper |
None |
A Man-Geek Interested in reverse engineering, software and web development, computer architecture and computer security. |
None |
None |
15 |
0 |
0 |
0 |
0 |
Python,Java,C++ |
3 |
1 |
saferwall |
saferwall: 下一代开源恶意软件分析平台 |
https://github.com/saferwall/saferwall |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Go |
0 |
0 |
saeidshirazi |
Awesome Android Security GitHub Repo |
https://github.com/saeidshirazi/awesome-android-security |
None |
Cyber Security Researcher |
canada |
None |
22 |
0 |
0 |
0 |
0 |
Python,CSS |
194 |
19 |
saaramar |
Google Quals CTF 2020 Echo PWN Challenge Writeup |
https://github.com/saaramar/echo_googlequals2020 |
https://twitter.com/AmarSaar |
@AmarSaar in twitter, known as amarsa |
None |
None |
9 |
0 |
0 |
0 |
0 |
Python,C,Rust,C++ |
203 |
41 |
rtcatc |
一款针对Webpack等前端打包工具所构造的网站进行快速、高效安全检测的扫描工具 |
https://github.com/rtcatc/Packer-Fuzzer |
https://www.hackinn.com |
嗷呜 NJI123%2MR% ç(-é$ùé&ù$$$éùù =$m$=$ |
None |
None |
16 |
0 |
0 |
0 |
0 |
Python |
535 |
60 |
rootclay |
NTLM-SSP: NTLM中高级进阶进阶 |
https://github.com/rootclay/NTLM-SSP |
None |
A man who wants to be a ... |
beijing |
Syclover |
40 |
0 |
0 |
0 |
0 |
VBScript,HTML |
460 |
135 |
ray-cp |
JSC JS 引擎 CVE-2020-9802 漏洞的 Exploit 代码 |
https://github.com/ray-cp/browser_pwn/tree/master/jsc_pwn/cve-2020-9802 |
https://ray-cp.github.io |
DONT STOP UNTIL YOURE PROUD |
None |
None |
18 |
0 |
0 |
0 |
0 |
Python,C,C++ |
263 |
73 |
rapid7 |
hackazon: A modern vulnerable web app |
https://github.com/rapid7/hackazon |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,Java,Python,TSQL,JavaScript,C#,Puppet,Ruby |
0 |
0 |
radareorg |
二进制逆向分析工具 radare2 更新 4.5.0 版本 |
https://github.com/radareorg/radare2/releases/tag/4.5.0 |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,Shell,C#,JavaScript,Makefile,C++,TeX,Python,Rust,V,Go,PowerShell,CSS |
12800 |
2200 |
rabobank-cdc |
DeTTECT: Detect Tactics, Techniques & Combat Threats |
https://github.com/rabobank-cdc/DeTTECT |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,CSS |
0 |
0 |
r4j0x00 |
为 v8 FixedArray 85bc1b0cab31cc064efc65e05adb81fee814261b 编写的 Exploit |
https://github.com/r4j0x00/exploits/blob/master/chrome-exploit/exploit.js |
https://github.com/r4j0x00 |
I make exploits |
None |
None |
14 |
0 |
0 |
0 |
0 |
Python,C,JavaScript,Ruby,C++ |
86 |
39 |
r3nhat |
GRAT2 C2 - 支持 DNS Listener,HTTPS Listener |
https://github.com/r3nhat/GRAT2 |
https://medium.com/@r3n_hat |
Cyber Security Addicted. OSCE, OSCP, OSWP, eCPTX, eWPTX, CRTE, PACES, CEH Certified. |
None |
None |
7 |
0 |
0 |
0 |
0 |
C#,Shell |
211 |
52 |
r0eXpeR |
红队中易被攻击的一些重点系统漏洞整理 |
https://github.com/r0eXpeR/redteam_vul |
None |
Unomi@棱角 |
China,ShangHai |
None |
4 |
0 |
0 |
0 |
0 |
|
657 |
96 |
r00tSe7en |
Mail-Probe: 邮箱探针后台管理系统 |
https://github.com/r00tSe7en/Mail-Probe |
https://www.se7ensec.cn/ |
One China |
China |
NULL |
27 |
0 |
0 |
0 |
0 |
Shell,HTML,PowerShell |
5 |
3 |
qq4108863 |
hihttps: 一款完整源码的高性能Web应用防火墙 |
https://github.com/qq4108863/hihttps |
None |
|
None |
None |
0 |
0 |
0 |
0 |
0 |
C |
92 |
31 |
pyppeteer |
pyppeteer2 - 用于控制 Headless Chrome 的 puppeteer 的 Python 移植版 |
https://github.com/pyppeteer/pyppeteer2 |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python |
0 |
0 |
pikvm |
基于Raspberry Pi的开源性廉价DIY IP-KVM系统。 |
https://github.com/pikvm/pikvm |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,C,Shell,Makefile,Batchfile |
538 |
21 |
pedrib |
Netgear R6700v3 LAN RCE write-up and exploit |
https://github.com/pedrib/PoC/blob/master/advisories/Pwn2Own/Tokyo_2019/tokyo_drift/tokyo_drift.md |
https://www.agileinfosec.co.uk |
1337 |
London, United Kingdom |
Agile Information Security |
0 |
0 |
0 |
0 |
0 |
HTML,Ruby,CSS,C++ |
260 |
79 |
pacman128 |
PC汇编语言书籍资源包。 |
https://github.com/pacman128/pcasm |
None |
|
None |
None |
4 |
0 |
0 |
0 |
0 |
TeX,Python,C++,CSS |
90 |
20 |
osixia |
运行 OpenLDAP 的 Docker 镜像环境 |
https://github.com/osixia/docker-openldap |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Shell,Dockerfile,JavaScript,Smarty,HTML,Go,PHP,Ruby,CSS |
2500 |
692 |
openitsystem |
anonymousmail: 临时邮箱搭建解决方案 |
https://github.com/openitsystem/anonymousmail |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,Shell,JavaScript,HTML,Vue |
0 |
0 |
opencve |
opencve: CVE Alerting Platform |
https://github.com/opencve/opencve |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python |
0 |
0 |
odedshimon |
BruteShark: Network Analysis Tool |
https://github.com/odedshimon/BruteShark |
http://www.linkedin.com/in/oded-shimon-6ba6721a8 |
Software & Cyber Engineer |
None |
None |
3 |
0 |
0 |
0 |
0 |
C#,Python |
992 |
126 |
nowsecure |
NowSecure 开源的基于 Frida 的 API Trace 工具 |
https://github.com/nowsecure/frida-trace |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,TypeScript,Java,Python,JavaScript,Smarty,Dockerfile,CSS |
541 |
112 |
nomi-sec |
PoC auto collect from GitHub |
https://github.com/nomi-sec/PoC-in-GitHub |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
|
0 |
0 |
nghiadt1098 |
Windows 内核 CVE-2020-16889 漏洞的 PoC |
https://github.com/nghiadt1098/MyResearch/tree/main/CVE-2020-16889 |
https://www.facebook.com/nghiadt1098 |
Viettel Cyber Security |
Ha Noi, Viet Nam |
None |
31 |
0 |
0 |
0 |
0 |
Java,Python,JavaScript,C++,Pascal,HTML |
0 |
2 |
netzob |
Netzob:用于协议逆向工程,建模与模糊测试项目脚本工具。 |
https://github.com/netzob/netzob |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python |
0 |
0 |
nccgroup |
NCC Group 为 Zerologon CVE-2020-1472 漏洞编写的 .NET 版本的 Exploit |
https://github.com/nccgroup/nccfsas/tree/main/Tools/SharpZeroLogon |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,TypeScript,Java,Python,JavaScript,C++,C#,Haskell,Shell,HCL,Elixir,Ruby,PowerShell,Rust |
2200 |
336 |
nautilus-fuzz |
基于 NDSS 2019 一篇 Paper 实现的一个基于 Grammar、Coverage Guided 的 Fuzzer |
https://github.com/nautilus-fuzz/nautilus |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python |
0 |
0 |
napocahv |
Napoca - Bitdefender 开源的 Hypervisor,提供多个安全相关的功能 |
https://github.com/napocahv/napoca |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C |
87 |
22 |
nahamsec |
为 Bug Bounty Hunters 入门整理的资料 |
https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters |
http://nahamsec.com |
|
None |
None |
16 |
0 |
0 |
0 |
0 |
Python,Shell |
3500 |
645 |
mytechnotalent |
Reverse Engineering For Everyone! |
https://github.com/mytechnotalent/Reverse-Engineering-Tutorial |
http://mytechnotalent.com |
Senior Software Engineer in Test |
Washington, DC |
BluVector, A Comcast Company |
67 |
0 |
0 |
0 |
0 |
Python,C,Zeek,C++ |
2500 |
181 |
mq1n |
一个可以借助有物理内存读写权限的驱动实现调用任意内核函数的库。 |
https://github.com/mq1n/VDM// |
None |
|
Turkey |
None |
1200 |
0 |
0 |
0 |
0 |
C++ |
178 |
100 |
moonD4rk |
HackBrowserData: 全平台运行的浏览器数据导出解密工具 |
https://github.com/moonD4rk/HackBrowserData |
None |
There is no dark side in the moon. really, matter of fact its all dark. |
Pyongyang |
None |
5 |
0 |
0 |
0 |
0 |
Go,Python |
8400 |
1200 |
momosecurity |
bombus: 合规审计平台 |
https://github.com/momosecurity/bombus |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,TypeScript,Vue,Java,PHP |
0 |
0 |
mitre-attack |
Joystick :transform the ATT&CK Evaluations data into concise views |
https://github.com/mitre-attack/joystick |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
TypeScript,HTML,Python,JavaScript,Zeek,PowerShell |
0 |
0 |
microsoft |
Memory Tagging 技术的安全性分析,来自 MSRC |
https://github.com/microsoft/MSRC-Security-Research/blob/master/papers/2020/Security%20analysis%20of%20memory%20tagging.pdf |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,TypeScript,Jupyter,C#,JavaScript,C++,Python,Go,CMake,Swift |
0 |
0 |
mdsecresearch |
Post-Exploitation 工具如何躲避终端安全产品的检测 |
https://github.com/mdsecresearch/Publications/blob/master/presentations/Offensive%20Development%20-%20Post-Exploitation%20Tradecraft%20in%20an%20EDR%20World%20-%20x33fcon%202020.pdf |
https://www.mdsec.co.uk |
Public research and tools from MDSec Consulting |
UK |
MDSec |
10 |
0 |
0 |
0 |
0 |
Python,C,Objective-C,PowerShell,Arduino |
262 |
53 |
maubot |
适用于maubot的GitLab客户端和Webhook接收器。 |
https://github.com/maubot/gitlab |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,HTML |
129 |
27 |
marcinguy |
Chrome 浏览器 Freetype 字体处理溢出漏洞 PoC(CVE-2020-15999) |
https://github.com/marcinguy/CVE-2020-15999// |
https://twitter.com/marcinguy |
IT |
Berlin, Germany |
None |
58 |
0 |
0 |
0 |
0 |
Python,C |
310 |
97 |
m-y-mo |
利用 libprotobuf-mutator Fuzz Android 设备的 NFC 模块 |
https://github.com/m-y-mo/android_nfc_fuzzer |
None |
|
None |
None |
20 |
0 |
0 |
0 |
0 |
JavaScript,Java,HTML,C++ |
28 |
4 |
lpereira |
HardInfos是Linux操作系统检测到大多数软件与硬件的开源项目。 |
https://github.com/lpereira/hardinfo |
https://github.com/microsoft |
|
Seattle, WA |
@microsoft |
74 |
0 |
0 |
0 |
0 |
Go,C |
5300 |
2300 |
lostindark |
Driver Store Explorer - 从 Driver Store 中枚举、安装、删除 Driver Package 的工具 |
https://github.com/lostindark/DriverStoreExplorer |
None |
None |
None |
None |
3 |
0 |
0 |
0 |
0 |
C# |
2000 |
173 |
light8lee |
2019 BDCI互联网金融新实体发现 |
https://github.com/light8lee/2019-BDCI-FinancialEntityDiscovery |
None |
|
HITSZ |
None |
16 |
0 |
0 |
0 |
0 |
Python,QML,Vim |
15 |
1 |
lgandx |
LLMNR/NBT-NS/mDNS 协议攻击工具 Responder 更新 3.0.2.0 版本 |
https://github.com/lgandx/Responder/releases/tag/v3.0.2.0 |
https://g-laurent.blogspot.com |
|
None |
None |
5 |
0 |
0 |
0 |
0 |
Python |
2300 |
382 |
latentgod |
OpenSA: 运维自动化平台 |
https://github.com/latentgod/OpenSA |
None |
|
None |
None |
38 |
0 |
0 |
0 |
0 |
Python,PHP,JavaScript,Vim |
6 |
10 |
kwart |
jd-cli:是对Java Decompiler反编译器项目命令软件包,可在win与Linux运行使用。 |
https://github.com/kwart/jd-cli |
http://javlog.cacek.cz/ |
|
Czech Republic |
Contractor |
73 |
0 |
0 |
0 |
0 |
Shell,Java |
318 |
80 |
kov4l3nko |
MEDUZA - 基于 Frida,针对越狱 iOS 系统编写的 SSL unpinning 工具 |
https://github.com/kov4l3nko/MEDUZA |
https://kov4l3nko.github.io/about/ |
iOS/Android reverse engineer and security researcher |
The country where cyberpunk won |
None |
7 |
0 |
0 |
0 |
0 |
Python,JavaScript,Java,HTML |
99 |
14 |
knownsec |
ksubdomain: 无状态子域名爆破工具 |
https://github.com/knownsec/ksubdomain |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Go,Python,JavaScript |
0 |
0 |
kisec |
Kibana CVE-2019-7609 RCE Exploit 代码 |
https://github.com/kisec/CVE-2019-7609?fbclid=IwAR02m1XrcGDleYn8KzrjBRuIFNXzwJumhrYi2n7zSFeq9fvPk39FxPyAyWY |
http://www.kisec.com |
Korea Information Security Education Center |
None |
한국정보보호교육센터 |
25 |
0 |
0 |
0 |
0 |
Python,Go,Shell |
13 |
2 |
kevoreilly |
CAPEv2: Malware Configuration And Payload Extraction |
https://github.com/kevoreilly/CAPEv2 |
https://twitter.com/CapeSandbox |
CAPE developer |
None |
None |
8 |
0 |
0 |
0 |
0 |
Python,C |
318 |
90 |
joinsec |
BadDNS: 使用公共 DNS 服务器进行多层子域名探测的极速工具 |
https://github.com/joinsec/BadDNS |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Go,Python,Rust |
0 |
0 |
jfmaes |
SharpZipRunner - 利用 D/Invokes 在内存中解密 ZIP 加密压缩的 bin 并提取 Shellcode 执行 |
https://github.com/jfmaes/SharpZipRunner |
None |
|
None |
None |
27 |
0 |
0 |
0 |
0 |
C#,Python,C++ |
118 |
17 |
hslatman |
一些恶意软件分析会用到的工具和资源集合 |
https://github.com/hslatman/awesome-malware-analysis |
https://hermanslatman.nl |
|
None |
DistributIT |
116 |
0 |
0 |
0 |
0 |
Python,Go,HTML,JavaScript |
46100 |
11600 |
hi-KK |
ICS-Protocol-identify: 使用nmap的nse脚本对常见工控协议进行... |
https://github.com/hi-KK/ICS-Protocol-identify |
https://www.key1.top |
Are you OK? :D |
US |
None |
0 |
0 |
0 |
0 |
0 |
Python,Lua,Shell |
26 |
10 |
hayasec |
一键辅助抓取 360 安全浏览器密码的 CobaltStrike 脚本 |
https://github.com/hayasec/360SafeBrowsergetpass |
http://hayasec.me |
Network Security Engineer |
None |
None |
72 |
0 |
0 |
0 |
0 |
Python,C#,Java,C++ |
110 |
13 |
hardenedlinux |
srcinv: source code audit tool 代码审计工具 |
https://github.com/hardenedlinux/srcinv |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
HTML,C,Shell,Assembly,Roff,C++,Nix,Zeek,Go |
243 |
56 |
grimm-co |
为 Ghidra 二进制分析工具编写脚本,辅助还原 stripped 二进制内的结构体 |
https://github.com/grimm-co/GEARSHIFT |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,Shell,Java,Python,C++,Go |
0 |
0 |
googleprojectzero |
ProjectZero 开源的一款动态插桩库,支持对进程内的指定模块进行插桩 |
https://github.com/googleprojectzero/TinyInst |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,C#,C++,Python,HTML,Swift |
0 |
0 |
google |
FuzzBench - Fuzzer benchmarking as a service |
https://github.com/google/FuzzBench |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,Shell,Java,Python,Kotlin,JavaScript,C++,TypeScript,HTML,Go,Rust |
0 |
0 |
gloxec |
CrossC2 framework - 生成 CobaltStrike 的跨平台 beacon |
https://github.com/gloxec/CrossC2 |
None |
|
None |
None |
46 |
0 |
0 |
0 |
0 |
Python,C,PLpgSQL |
586 |
127 |
github |
Github Security Lab 关于 CodeQL 的分享《Bug hunting with CodeQL》 |
https://github.com/github/security-lab/blob/master/Meetup/2019-11/presentations/Bug%20hunting%20with%20CodeQL.pdf |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,TypeScript,Python,JavaScript,C++,Haskell,CoffeeScript,HTML,Shell,Go,Ruby,C# |
23100 |
3500 |
ggerganov |
Keytap2 - 通过机器学习训练键盘击键声音,通过侧信道的方式实现 Keylogger |
ggerganov/kbd-audio#31 |
https://github.com/viewray-inc |
|
Sofia, Bulgaria |
@viewray-inc |
34 |
0 |
0 |
0 |
0 |
HTML,C++ |
3100 |
277 |
forest0 |
微信聊天记录导出工具 |
https://github.com/forest0/wechat_history_export |
None |
|
None |
None |
5 |
0 |
0 |
0 |
0 |
Python,C,HTML,Jupyter,Vim |
28 |
7 |
fofapro |
基于 Docker 镜像的漏洞靶场平台 |
https://github.com/fofapro/vulfocus |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,Vue,Java,Python,Go,CSS |
169 |
19 |
firmianay |
IoT-vulhub: IoT 固件漏洞复现环境 |
https://github.com/firmianay/IoT-vulhub |
https://firmianay.github.io |
Information Security Student & CTF Player & member of @XDSEC, @xdlinux |
China |
Xidian University |
16 |
0 |
0 |
0 |
0 |
Python,C,Shell |
2000 |
414 |
fireeye |
FireEye FLARE VM 开源的面向恶意软件分析和应急响应的 Windows 虚拟机 |
https://github.com/fireeye/flare-vm |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,Vue,Python,JavaScript,C++,C#,Shell,Go,Swift,PowerShell,CSS |
0 |
0 |
ffffffff0x |
Dork-Admin: 盘点近年来的数据泄露、供应链污染事件 |
https://github.com/ffffffff0x/Dork-Admin |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
HTML,Java |
0 |
0 |
fanglingsu |
Vimb- 一款Vim的web浏览器项目 |
https://github.com/fanglingsu/vimb |
https://fanglingsu.github.io/ |
|
Jena, Germany |
None |
9 |
0 |
0 |
0 |
0 |
C,Shell |
911 |
82 |
fabacab |
蓝队最好的学习资源项目。 |
https://github.com/fabacab/awesome-cybersecurity-blueteam |
None |
⚑ Ⓐnti-capitalist Free Software developer, Black Lives Matter, abolish all prisons, 0xACAB ⚑ |
None |
Code signing GPG key: 0x15FC01926CB6D75614790893B0303BF6BA36A560 |
197 |
0 |
0 |
0 |
0 |
Shell,HTML,PHP |
1100 |
248 |
eugeneyan |
面向产品的机器学习/数据科学相关资源 |
https://github.com/eugeneyan/applied-ml#anomaly-detection |
http://eugeneyan.com |
Applied Machine Learning |
Seattle x Singapore |
None |
39 |
0 |
0 |
0 |
0 |
Python,Jupyter |
819 |
85 |
eronnen |
用于解析 Procmon 内部文件格式(日志文件、配置文件)的 Python 库 |
https://github.com/eronnen/procmon-parser |
None |
|
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,JavaScript,C++ |
31 |
4 |
dushixiang |
Next Terminal:由Golang与React语言开发的一款HTML5的远程桌面网关终端项目,支持RDP、SSH、VNC和Telnet协议的连接和管理。 |
https://github.com/dushixiang/next-terminal |
https://www.typesafe.cn |
|
beijing |
None |
3 |
0 |
0 |
0 |
0 |
Go,JavaScript |
490 |
43 |
duffelhq |
Elixir Ecto Paginator 刚刚修复了一个 RCE 漏洞 |
https://github.com/duffelhq/paginator/security/advisories/GHSA-w98m-2xqg-9cvj |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Shell,Python,JavaScript,HTML,Elixir,Go,Erlang |
0 |
0 |
doyensec |
Electron.js Hacking 相关的资料收集整理 |
https://github.com/doyensec/awesome-electronjs-hacking |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,C,JavaScript,Java,C++ |
0 |
0 |
dirkjanm |
Zerologon - Netlogon 被发现高危漏洞,成功利用可以攻破 Windows 域控服务器。PoC 代码已被公开 |
https://github.com/dirkjanm/CVE-2020-1472 |
http://dirkjanm.io |
|
The Netherlands |
None |
24 |
0 |
0 |
0 |
0 |
Python |
804 |
144 |
didi |
Sharingan是一个基于go语言编写的流量录制回放工具,合项目重构、回归测试等。 |
https://github.com/didi/sharingan |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,Vue,Java,Python,Kotlin,JavaScript,C++,TypeScript,Objective-C,HTML,Go,CSS |
15800 |
2200 |
ddzy |
前端开发者学习资源。 |
https://github.com/ddzy/fe-necessary-book |
https://yyge.top |
Working |
Neusoft |
FE |
87 |
0 |
0 |
0 |
0 |
TypeScript,JavaScript |
1200 |
176 |
darvincisec |
无需 root 和重打包,将 App 安装到克隆 App 内实现动态分析 |
https://github.com/darvincisec/VirtualDynamicAnalysis |
https://darvincitech.wordpress.com |
Security Researcher |
Singapore |
None |
10 |
0 |
0 |
0 |
0 |
C,Java,Smali |
93 |
25 |
danieleperera |
用于在网络上收集,抓取和监视洋葱站点的扩展工具 |
https://github.com/danieleperera/OnionIngestor |
None |
|
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,JavaScript |
25 |
5 |
dafthack |
CloudPentestCheatsheets: 云渗透的一些参考命令 |
https://github.com/dafthack/CloudPentestCheatsheets |
http://www.twitter.com/dafthack |
|
None |
None |
30 |
0 |
0 |
0 |
0 |
Python,Go,PowerShell |
1500 |
333 |
d4rk-d4nph3 |
勒索软件相关的报告收集 |
https://github.com/d4rk-d4nph3/Ransomware-Reports |
https://twitter.com/bh4b3sh |
Turing Complete |
CVE-2020-9000+ |
NT AUTHORITY\SYSTEM |
25 |
0 |
0 |
0 |
0 |
C#,Python,Shell |
31 |
6 |
cyber-research |
5个国家的APT恶意软件数据集。 |
https://github.com/cyber-research/APTMalware |
None |
|
None |
None |
2 |
0 |
0 |
0 |
0 |
Python |
52 |
10 |
crowdsecurity |
Crowdsec - 一款开源的、轻量级的异常行为检测 Agent,适用于容器和虚拟机环境 |
https://github.com/crowdsecurity/crowdsec/ |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Go,Lua,Shell,PHP |
153 |
14 |
cpandya2909 |
OpenSSH 8.3p1 CVE-2020-15778 eval 注入漏洞分析 |
https://github.com/cpandya2909/CVE-2020-15778 |
None |
|
None |
None |
4 |
0 |
0 |
0 |
0 |
Python,Shell,HTML |
15 |
0 |
coreruleset |
OWASP ModSecurity核心规则集(CRS)资源合集。 |
https://github.com/coreruleset/coreruleset |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,Shell,Dockerfile,Perl |
0 |
0 |
codeplutos |
MySQL客户端jdbc反序列化漏洞payload |
https://github.com/codeplutos/MySQL-JDBC-Deserialization-Payload |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Java,C++ |
107 |
20 |
cobbr |
.NET 编写的一款 C&C 渗透框架 |
https://github.com/cobbr/Covenant |
https://cobbr.io |
|
Dallas, TX |
SpecterOps |
20 |
0 |
0 |
0 |
0 |
C#,PowerShell |
1600 |
307 |
cn0xroot |
3G 版本的 Osmocom 蜂窝网络实现 |
https://github.com/cn0xroot/osmocom_3G |
https://twitter.com/cn0Xroot |
null |
127.0.0.1 |
null |
261 |
0 |
0 |
0 |
0 |
Python,C,HTML,C++ |
1000 |
252 |
chriskaliX |
AD-Pentest-Notes: 用于记录内网渗透(域渗透)学习 |
https://github.com/chriskaliX/AD-Pentest-Notes |
https://github.com/Acmesec |
Astray |
Fin |
@Acmesec |
10 |
0 |
0 |
0 |
0 |
Python,Go |
318 |
25 |
checkra1n |
基于 checkra1n 越狱实现的 Pre-Boot 执行环境 |
https://github.com/checkra1n/pongoOS |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Objective-C |
0 |
0 |
charles2gan |
一款全新的 Android 反编译工具,支持 APK、DEX、ODEX、OAT、JAR、AAR、CLASS 文件格式的反编译 |
https://github.com/charles2gan/GDA-android-reversing-Tool |
https://www.zhihu.com/people/gjden |
Leader of a Research Team, Senior security researcher. Malware Analysis, Vulnerability Analysis, Threat Intelligence etc. |
None |
adlab |
25 |
0 |
0 |
0 |
0 |
Python,Makefile,Java,Ruby,C |
1100 |
152 |
certego |
PcapMonkey - 用于分析 pcap 网络数据包并从中检测威胁的工具 |
https://github.com/certego/PcapMonkey |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,Zeek,Java,Python,Dockerfile,JavaScript,Perl,Shell,Go,PHP,Ruby,PowerShell |
0 |
0 |
can1357 |
在 Windows 内核中运行 Lua Coroutines |
https://github.com/can1357/NtLua |
https://can.ac/ |
Security researcher and reverse engineer; mostly interested in Windows kernel development and low-level programming. |
None |
Verilave Inc. |
0 |
0 |
0 |
0 |
0 |
C,C++ |
388 |
125 |
bsauce |
Linux 内核多个漏洞的 Exploit 与 Writeup |
https://github.com/bsauce/kernel_exploit_factory// |
https://www.jianshu.com/u/a12c5b882be2 |
2nd year Ph.D. student majoring in binary analysis. |
None |
None |
25 |
0 |
0 |
0 |
0 |
Python,C |
156 |
23 |
bobfuzzer |
Linux kernel 5.0.0-rc7 f2fs 文件系统溢出漏洞 PoC |
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19927 |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C |
21 |
13 |
blacklanternsecurity |
TREVORspray - 微软 Office 365 密码爆破工具 |
https://github.com/blacklanternsecurity/TREVORspray |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Shell,Python,JavaScript,Visual,Go,Ruby,PowerShell,CSS |
0 |
0 |
blackberry |
使用python解析PE文件的开源工具PE Tree发布 |
https://github.com/blackberry/pe_tree |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,TypeScript,Java,Python,JavaScript,C++,Objective-C,Go,Ruby |
22 |
24 |
beurtschipper |
Depix - 从截屏马赛克处理后的图片中还原原始密码 |
https://github.com/beurtschipper/Depix |
https://www.graa.nl/ |
|
None |
None |
26 |
0 |
0 |
0 |
0 |
Python,C |
5300 |
262 |
bb1nfosec |
Windows漏洞利用资源以及漏洞利用的网站参考列表总结。 |
https://github.com/bb1nfosec/Information-Security-Tasks/blob/master/Post%20Exploitation/Windows%20Exploitation%2C%20post%20exploitation%20sites%20for%20reference |
None |
Just another guy whom loves to play 0 and 1 . |
India |
None |
0 |
0 |
0 |
0 |
0 |
Python,Shell,HTML,CSS |
49 |
16 |
avast |
Radare2 插件,用于将 RetDec 反汇编工具集成进 Radare2 |
https://github.com/avast/retdec-r2plugin |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Groovy,LLVM,Java,Scala,Python,Kotlin,JavaScript,C++,HTML,Go |
5500 |
657 |
autoguard |
汽车安全研究方向的 Paper 收集 |
https://github.com/autoguard/awesome-vehicle-security-and-safety |
http://autoguard-sec.com |
|
china |
autoguard |
11 |
0 |
0 |
0 |
0 |
JavaScript |
24 |
7 |
ashishb |
Android Security Awesome,Android 安全方向的资料整理 |
https://github.com/ashishb/android-security-awesome |
https://ashishb.net |
Software Engineer - SF Bay area https://ashishb.net/about/ |
United States |
None |
94 |
0 |
0 |
0 |
0 |
Python,Go,Shell,Makefile |
4800 |
1200 |
arieljt |
VT Code Similarity Yara Generator |
https://github.com/arieljt/VTCodeSimilarity-YaraGen |
https://twitter.com/arieljt |
|
None |
None |
3 |
0 |
0 |
0 |
0 |
Python |
34 |
6 |
appsecco |
DVNA – Damn Vulnerable NodeJS Application |
https://github.com/appsecco/dvna |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Shell,Java,Python,JavaScript,C#,Visual,HTML,ActionScript,PHP,CSS |
439 |
129 |
antonio-morales |
Hackfest - Advanced Fuzzing Workshop 的资料 |
https://github.com/antonio-morales/Hackfest_Advanced_Fuzzing_Workshop |
https://twitter.com/Nosoynadiemas |
|
None |
None |
6 |
0 |
0 |
0 |
0 |
C,JavaScript,Rich |
106 |
20 |
airbus-seclab |
Diffware - 文件、目录 Diff 工具,支持多种配置参数 |
https://github.com/airbus-seclab/diffware |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,Python,OCaml,C++,Ruby,PowerShell |
1000 |
137 |
airbus-cert |
一款用于处理 Event Tracing for Windows(ETW)的IDA插件 |
https://github.com/airbus-cert/etwbreaker |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,Lua,Python,C#,Go,PHP |
104 |
9 |
aind-containers |
AinD: Android (Anbox) in Docker,在 Docker 中运行 Android apps |
https://github.com/aind-containers/aind |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Dockerfile |
0 |
0 |
ail-project |
AIL framework - Analysis Information Leak framework |
https://github.com/ail-project/ail-framework |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python |
6 |
0 |
adulau |
ssldump - SSLv3/TLS 网络协议 Analyzer |
https://github.com/adulau/ssldump |
https://github.com/MISP |
Enjoy when human are using machines in unexpected ways. I break stuff and I do stuff. |
Europe |
@MISP @CIRCL @cve-search and many others |
113 |
1 |
0 |
0 |
0 |
Python,C,HTML |
127 |
54 |
WebKit |
WebKit 引入 JIT-Caging 特性实现细粒度的 PAC 保护机制 |
https://github.com/WebKit/webkit/commit/2ffeeff4dfb86a74ae695dea8671fccc423559ad |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Makefile |
0 |
0 |
TralahM |
Go语言黑帽子系列教程资源。 |
https://github.com/TralahM/blackhat-go |
https://github.com/tralahtek |
Math & C.S Major, Programmer(Lisp, Python), Data scientist, Cloud Solutions Architect, Sys Integration, Devops. Writer & Scholar, Pan-African. |
Nairobi, KE |
@tralahtek |
100 |
1 |
0 |
0 |
0 |
Go,Python,Shell,Common |
13 |
6 |
TophantTechnology |
ARL: 资产侦察灯塔系统 |
https://github.com/TophantTechnology/ARL |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python |
0 |
0 |
T0pCyber |
HAWK 工具项目。该工具为安全人员快速分析收集数据工具。 |
https://github.com/T0pCyber/hawk |
https://twitter.com/T0p_Cyber |
Microsoft Cyber Security Consultant Cloud Forensics |
Wake Forest NC |
None |
3 |
0 |
0 |
0 |
0 |
PowerShell |
203 |
42 |
ShiHuang-ESec |
EHole: (棱洞)-红队重点攻击系统指纹探测工具 |
https://github.com/ShiHuang-ESec/EHole |
None |
|
None |
None |
2 |
0 |
0 |
0 |
0 |
|
113 |
17 |
Sentinel-One |
基于 Qiling 框架实现的 UEFI NVRAM 变量 Fuzzer |
https://github.com/Sentinel-One/efi_fuzz |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,TypeScript,Java,Python,JavaScript,C++,C#,Objective-C,HTML,Shell |
0 |
0 |
SecurityRiskAdvisors |
PDBlaster - 批量从可执行文件中提取 PDB 文件路径的工具 |
https://github.com/SecurityRiskAdvisors/PDBlaster |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Shell,Java,Python,JavaScript,Perl,HTML,Ruby,PowerShell |
0 |
0 |
SecureAuthCorp |
RCE in any MS Exchange via Exchange Trusted Subsystem |
fortra/impacket#857 |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,Java,Python,JavaScript,C#,HTML,Go |
0 |
0 |
SafeGroceryStore |
MDAT - 综合数据库攻击利用工具 |
https://github.com/SafeGroceryStore/MDAT |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Java |
0 |
0 |
Rvn0xsy |
BadCode: 恶意代码逃逸源代码 |
https://github.com/Rvn0xsy/BadCode |
https://payloads.online |
知者不惑,仁者不忧,勇者不惧。 |
None |
None |
11 |
0 |
0 |
0 |
0 |
Lua,C,C++ |
282 |
88 |
RedTeamPentesting |
Apache Tomcat WebSocket 漏洞 (CVE-2020-13935) Exploit |
https://github.com/RedTeamPentesting/CVE-2020-13935 |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Go |
0 |
0 |
QAX-A-Team |
PandaSniper: Linux C2 框架demo |
https://github.com/QAX-A-Team/PandaSniper?from=timeline |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,Shell,Java,C#,C++,Python,Go,PowerShell |
0 |
0 |
Q4n |
Windows WalletService 本地提权漏洞分析及利用(CVE-2020-1362) |
https://github.com/Q4n/CVE-2020-1362 |
None |
Professional bug writer |
None |
None |
18 |
0 |
0 |
0 |
0 |
Python,C,C++ |
144 |
28 |
ProjectorBUg |
Double-Free BUG in WhatsApp exploit poc.[CVE-2020-11932] |
https://github.com/ProjectorBUg/CVE-2020-11932 |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,Shell,Jupyter,Python,Visual,HTML,Go,PHP,Ruby,Prolog |
0 |
0 |
PaloAltoNetworks |
Palo Alto 安全团队的公开 Papers 与会议 PPT |
https://github.com/PaloAltoNetworks/research-notes |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,TypeScript,Python,JavaScript,Shell,HTML,Go,PowerShell,HCL |
182 |
87 |
PLSysSec |
haybale - 一款 Rust 语言编写的 LLVM IR 级别的符号执行引擎 |
https://github.com/PLSysSec/haybale |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,LLVM,Assembly,HTML,Python,JavaScript,Makefile,C++,Haskell,Swift,Rust |
0 |
0 |
OWASP |
OWASP NodeGoat项目资源,了解OWASP十大安全风险,如何使用Node.js开发的Web应用程序安全问题、 |
https://github.com/OWASP/NodeGoat |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Shell,Java,Python,JavaScript,Perl,HTML,Go,Ruby,CSS |
0 |
0 |
NiuTrans |
机器翻译:统计建模与深度学习方法 |
https://github.com/NiuTrans/MTBook |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
TeX,C++ |
1500 |
565 |
NetSPI |
Evil SQL Client (ESC) - 为渗透测试设计的交互式的 SQL Server Client,支持发现数据库、访问数据、提取数据 |
https://github.com/NetSPI/ESC |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Java,C#,Python,HTML,Go,Ruby,PowerShell |
1100 |
282 |
NeatMonster |
SlabDbg - 用于辅助调试 Linux 内核 SLUB 内存管理的脚本 |
https://github.com/NeatMonster/slabdbg |
https://neat.sh/ |
well now I am not doing it https://twitter.com/NeatMonster_ |
Toulouse, France |
None |
17 |
0 |
0 |
0 |
0 |
Python,Java |
558 |
81 |
NVISO-BE |
Windows OS Hardening with PowerShell DSC |
https://github.com/NVISO-BE/posh-dsc-windowsserver-hardening |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,Shell,JavaScript,PowerShell,C++ |
0 |
0 |
NLP-LOVE |
《自然语言处理入门》详细笔记 |
https://github.com/NLP-LOVE/Introduction-NLP |
http://mantchs.com/ |
邮箱:[email protected] 博客:http://mantchs.com/ |
None |
None |
6 |
0 |
0 |
0 |
0 |
Python,HTML,Jupyter |
6200 |
2000 |
MythicAgents |
A Visual Studio Code Extension agent for Mythic C2 |
https://github.com/MythicAgents/venus |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,C |
0 |
0 |
Microsoft |
ApplicationInspector - 微软开源的源码分析工具 |
https://github.com/Microsoft/ApplicationInspector |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
TypeScript,Jupyter,C#,JavaScript,C++,Python,Objective-C,Rich,CMake,PowerShell,CSS |
0 |
0 |
MalPhobic |
Abbadon 远控工具使用 Discord 作为 C&C |
https://github.com/MalPhobic/MalwareReports/blob/main/AbbadonRAT/Abbadon_RAT.pdf |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
|
0 |
0 |
LennyLeng |
SOC_Sankey_Generator: 从SOC日志中进行数据ETL与数据可视化的工具 |
https://github.com/LennyLeng/SOC_Sankey_Generator |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
None |
0 |
0 |
LandGrey |
domainNamePredictor: 公司域名使用规律预测及生成工具 |
https://github.com/LandGrey/domainNamePredictor |
https://landgrey.me |
I learn cyber sec |
Shanghai |
None |
18 |
0 |
0 |
0 |
0 |
Python,Java,Classic |
1600 |
415 |
LIJI32 |
SnatchBox - macOS 沙箱逃逸漏洞的分析(CVE-2020-27935) |
https://github.com/LIJI32/SnatchBox |
None |
I fiddle with macOS, iOS, and Nintendo consoles. |
Israel |
None |
21 |
0 |
0 |
0 |
0 |
Python,C,Assembly,Objective-C |
657 |
91 |
KasperskyLab |
TinyCheck - 卡巴斯基开源的智能手机流量劫持工具 |
https://github.com/KasperskyLab/TinyCheck |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,Shell,Java,Python,Kotlin,C++,C#,PHP |
0 |
0 |
Jewel591 |
XSSMAP-一款快速检测Web应用程序中的XSS漏洞的开源工具 |
https://github.com/Jewel591/xssmap |
http://Jewel591.fun |
Security operations engineer |
United Kingdom |
A security consulting firm |
15 |
0 |
0 |
0 |
0 |
Python,C,Perl |
30 |
5 |
Integration-IT |
Active Directory Exploitation Cheat Sheet |
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet |
None |
|
None |
None |
0 |
0 |
0 |
0 |
0 |
Ruby,PowerShell |
308 |
55 |
HexHive |
FuzzGen: Automatic Fuzzer Generation |
https://github.com/HexHive/FuzzGen |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,Python,C++,TeX,HTML,Brainfuck |
0 |
0 |
HerrSpace |
CCNA学习总结目录表。 |
https://github.com/HerrSpace/CCNA-Cheat-Sheet |
https://noot.geheim.org |
|
Hamburg, Germany, Earth |
None |
34 |
0 |
0 |
0 |
0 |
Python,Ruby,HTML,JavaScript,Shell |
59 |
25 |
FlameOfIgnis |
PWDB - New generation of Password Mass-Analysis |
https://github.com/FlameOfIgnis/Pwdb-Public |
https://github.com/EpicGames |
Junior year computer engineering student at METU/NCC. |
Turkey |
@EpicGames @NVIDIAGameWorks |
0 |
0 |
0 |
0 |
0 |
Python,TypeScript,JavaScript,Cuda |
835 |
325 |
FSecureLABS |
Physmem2profit 工具用于在可物理访问内存的情况下创建 LSASS 进程的 minidump |
https://github.com/FSecureLABS/physmem2profit |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,Shell,Java,Python,JavaScript,C++,C#,PowerShell |
2200 |
584 |
Droidzzzio |
用于枚举子域wordlist,php文件路径,html文件路径和js文件路径的开源工具 |
https://github.com/Droidzzzio/EnumerationList |
https://twitter.com/ShMalav |
Security Researcher Bug Bounty Hunter |
INDIA |
None |
44 |
0 |
0 |
0 |
0 |
Python |
32 |
8 |
DependencyTrack |
DependencyTrack: 开源软件成分分析平台 |
https://github.com/DependencyTrack/dependency-track |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Vue,Java,JavaScript,CSS |
595 |
192 |
DasSecurity-Labs |
AoiAWD: 专为比赛设计,便携性好,低权限运行的EDR系统 |
https://github.com/DasSecurity-Labs/AoiAWD |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,PHP,HTML |
0 |
0 |
DTolm |
VkFFT-Vulkan快速傅立叶变换库 |
https://github.com/DTolm/VkFFT |
None |
|
None |
None |
2 |
0 |
0 |
0 |
0 |
C,C++ |
213 |
6 |
D3VI5H4 |
ANTIVURUS ARTIFACTS - 有研究员对杀软检测及其 Hook 点的分析 |
https://github.com/D3VI5H4/Antivirus-Artifacts/blob/main/ANTIVURUS_ARTIFACTS.pdf |
https://twitter.com/devisharochlani |
ICAI , Malware , OSINT , INFJ , NERD @AXI4L , |
None |
None |
1 |
0 |
0 |
0 |
0 |
|
23 |
7 |
D00MFist |
与 JXA 有关的用于实现 macOS 系统攻击常驻的方法收集 |
https://github.com/D00MFist/PersistentJXA |
https://medium.com/@D00MFist |
|
None |
None |
30 |
0 |
0 |
0 |
0 |
Shell,Jupyter,JavaScript,Visual,Go,CSS |
109 |
10 |
CymaticsCC |
恶意ELF二进制文件相似度比较及可视化 |
https://github.com/CymaticsCC/elf_similarity |
None |
|
None |
None |
55 |
0 |
0 |
0 |
0 |
Python,HTML,Jupyter |
2 |
2 |
ChiChou |
IDA-ObjCExplorer - 用于实现 Objective C classdump 的 IDA Pro 插件 |
https://github.com/ChiChou/IDA-ObjCExplorer |
https://github.com/alipay |
我要卖掉我的代码 浪迹天涯 |
Beijing, China |
@alipay |
68 |
0 |
0 |
0 |
0 |
TypeScript,Objective-C,Vue,JavaScript,C |
489 |
109 |
Charmve |
Bluetooth-LE安全性:方法,工具和堆栈视频会议学习资源。 |
https://github.com/Charmve/BLE-Security-Attack-Defence |
https://charmve.github.io/ |
Research SDE at the Future Security Labs in Qihoo 360, B.E. in Electronic Engineering & B.A. in Business English at Yangzhou University |
Suzhou, Beijing, Shanghai, Hongkong |
Qihoo 360 |
33 |
0 |
0 |
0 |
0 |
Python,C,Java,C++ |
6 |
2 |
Ch1ngg |
JCE - JSP/JPSX CodeEncode - 用于 Webshell 逃避静态查杀的辅... |
https://github.com/Ch1ngg/JCE |
https://www.ch1ng.com/ |
|
no |
no |
24 |
0 |
0 |
0 |
0 |
Python,C#,ASP,Java |
97 |
20 |
CERT-Polska |
DRAKVUF - Hypervisor 层面的恶意软件自动化分析系统 |
https://github.com/CERT-Polska/drakvuf-sandbox |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,Java,Python,JavaScript,C++,PHP |
189 |
35 |
Anemone95 |
MLDetectVuln: AI算法解决大规模二进制程序函数相似性分析 |
https://github.com/Anemone95/MLDetectVuln |
http://anemone.top |
Im very vegetable. |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,JavaScript,PHP,Vim |
8 |
5 |
AdaLogics |
Software security paper list |
https://github.com/AdaLogics/software-security-paper-list |
https://adalogics.com |
We do advanced software security. |
Oxford, UK |
Ada Logics |
3 |
0 |
0 |
0 |
0 |
Python |
41 |
5 |
7Hxz233 |
Lilac 2020 暑期pwn培训课件 |
https://github.com/7Hxz233/Lilac_2020_summer_pwn |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
PostScript,C,HTML,Ruby,PHP |
0 |
0 |
4x99 |
码小六 - GitHub 代码泄露监控系统 |
https://github.com/4x99/code6 |
None |
|
None |
None |
2 |
0 |
1 |
0 |
0 |
PHP |
73 |
14 |
3v4Si0N |
HTTP-revshell: 用于Red team练习和渗透测试者的Powershell脚本工具,通过HTTP/S协议反向链接。 |
https://github.com/3v4Si0N/HTTP-revshell |
None |
Security Analyst at @Deloitte |
Spain |
https://twitter.com/3v4Si0N |
10 |
0 |
0 |
0 |
0 |
Python,C,PowerShell |
205 |
29 |
360-Linton-Lab |
WMIHACKER:免杀横向移动命令执行测试工具(无需445端口) |
https://github.com/360-Linton-Lab/WMIHACKER/blob/master/README_zh.md |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C#,VBScript |
0 |
0 |
2freeman |
POC 会议议题 《Three Dark clouds over the Android kernel》 |
https://github.com/2freeman/Slides/blob/main/PoC-2020-Three%20Dark%20clouds%20over%20the%20Android%20kernel.pdf |
None |
|
None |
None |
1 |
0 |
0 |
0 |
0 |
|
7 |
1 |
1d8 |
用于分析移动应用程序的Android VM |
https://github.com/1d8/Android-Analysis |
None |
|
None |
None |
25 |
0 |
0 |
0 |
0 |
Python,C |
27 |
8 |
0x36 |
kernel exploit for Apple iOS 13.X |
https://github.com/0x36/oob_events |
https://twitter.com/_simo36 |
|
None |
None |
7 |
0 |
0 |
0 |
0 |
Python,C,Makefile |
171 |
46 |
0vercl0k |
Symbolizer - 为进程执行 Trace、Crash Dump 提供调试符号的工具 |
https://github.com/0vercl0k/symbolizer |
https://doar-e.github.com/ |
|
US/FR |
None |
18 |
0 |
0 |
0 |
0 |
Python,JavaScript,C++ |
928 |
192 |
0neb1n |
PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility) |
https://github.com/0neb1n/CVE-2020-16947 |
None |
I wanner be the pwner. |
None |
None |
11 |
0 |
0 |
0 |
0 |
Lua,CSS |
23 |
14 |