thelinuxchoice |
恶意Android apk生成器GetDroid v1.3发布(反向Shell),请注意分析和防范。 |
https://github.com/thelinuxchoice/getdroid |
http://twitter.com/linux_choice |
Twitter: @linux_choice |
None |
None |
112 |
0 |
38 |
4200 |
5 |
Python,Shell,HTML |
1600 |
626 |
vanhauser-thc |
为 libfuzzer 生成一个直观的 HTML 格式的覆盖率报告 |
https://github.com/vanhauser-thc/libfuzzer-coverage// |
https://www.mh-sec.de/ |
Security researcher since 1994 https://www.mh-sec.de/ https://www.thc.org/ https://twitter.com/hackerschoice |
Berlin |
The Hackers Choice , mh-sec , me , myself |
27 |
0 |
64 |
932 |
22 |
C,Shell,HTML,Python,C++,Batchfile |
3700 |
1000 |
tandasat |
在 Hyper-V 环境中测试 UEFI |
https://github.com/tandasat/MiniVisorPkg/blob/master/Docs/Testing_UEFI_on_Hyper-V.md |
http://standa-note.blogspot.ca/ |
Engineer @standa_t |
Vancouver, Canada |
None |
58 |
0 |
19 |
668 |
3 |
C,C++ |
777 |
245 |
qazbnm456 |
awesome-web-security: List of Web Security materials and resources |
https://github.com/qazbnm456/awesome-web-security |
https://www.patreon.com/boik |
https://www.boik.com.tw/ |
Taiwan |
None |
109 |
0 |
1100 |
550 |
20 |
Python,JavaScript |
4700 |
907 |
djhohnstein |
SharpChromium - 用于从 Chromium 系列浏览器中获取 Cookie、访问历史、网站登录凭据等敏感信息的工具 |
https://github.com/djhohnstein/SharpChromium |
https://github.com/specterops |
Operator at SpecterOps. Kali Contributor. |
Seattle, WA |
@specterops |
123 |
0 |
10 |
288 |
6 |
C#,VBScript,C++ |
104 |
23 |
haidragon |
haidragon/KiwiVM-1: virtualization encryption software for mobile applications |
https://github.com/haidragon/KiwiVM-1 |
http://weibo.com/haidragon |
QQ交流群 : 826038086 |
中国 北京 |
None |
1200 |
0 |
57 |
227 |
532 |
C,JavaScript,C++ |
87 |
31 |
Wenzel |
awesome-virtualization: Collection of resources about Virtualization |
https://github.com/Wenzel/awesome-virtualization |
None |
Security Researcher , VMI hypervisor-level debugger |
Paris, France |
None |
110 |
0 |
363 |
192 |
104 |
Python,Ruby,Rust |
517 |
103 |
citronneur |
rdp-rs: Remote Desktop Protocol in RUST |
https://github.com/citronneur/rdp-rs |
https://github.com/airbus-cert |
|
Toulouse, France |
@airbus-cert |
24 |
0 |
284 |
159 |
102 |
Python,C#,JavaScript,Rust |
1200 |
305 |
wcventure |
MemLock: Memory Usage Guided Fuzzing |
https://github.com/wcventure/MemLock-Fuzz |
https://wcventure.github.io/ |
Computer Software and Theory, Software Engineering, Machine Learning, Formal Method, Program Analysis, Software Verification, Cyber Security. |
Shenzhen, Guangdong Province, China, 518060 |
Shenzhen University |
15 |
0 |
98 |
138 |
14 |
Python,C,Batchfile |
244 |
36 |
gobysec |
Goby新一代安全测试工具 |
https://github.com/gobysec/Goby |
http://gobies.org |
Goby - Make Cybersecurity More Effective The new generation of network security technology |
None |
Goby |
7 |
0 |
1 |
128 |
0 |
Python,Go |
73 |
9 |
brompwnie |
A HTTP PoC Endpoint for cve-2020-5260 |
https://github.com/brompwnie/cve-2020-5260/ |
https://twitter.com/brompwnie |
Keyboard wrangler ⌨️ |
None |
None |
29 |
0 |
16 |
91 |
169 |
Go,Shell |
269 |
25 |
NoorQureshi |
Kali Linux 渗透测试手册 |
https://github.com/NoorQureshi/kali-linux-cheatsheet |
https://github.com/RocketChat |
#Hackers Are Real, Monsters are real too. They live inside us, and sometimes, They Win. |
None |
@RocketChat |
187 |
0 |
106 |
81 |
37 |
Python,Shell |
288 |
116 |
DimitriFourny |
macOS/iOS CVE-2019-6207 内核信息泄漏的 PoC 代码 |
https://github.com/DimitriFourny/cve-2019-6207 |
https://dimitrifourny.github.io |
French security researcher. |
None |
None |
17 |
0 |
70 |
69 |
6 |
Python,C,C++ |
62 |
13 |
bohops |
GhostBuild - MSBuild launchers for various GhostPack/.NET projects |
https://github.com/bohops/GhostBuild |
http://bohops.com |
|
None |
None |
9 |
0 |
31 |
59 |
2 |
Python,PowerShell |
105 |
17 |
smodnix |
This challenge is Inon Shkedys 31 days API Security Tips. |
https://github.com/smodnix/31-days-of-API-Security-Tips |
https://smodnix.codes |
Experienced in Web related technologies and interested in security aspects as well. |
None |
None |
30 |
0 |
450 |
58 |
582 |
|
801 |
106 |
pventuzelo |
WARF - WebAssembly Runtimes Fuzzing project |
https://github.com/pventuzelo/wasm_runtimes_fuzzing |
https://webassembly-security.com/ |
Independent Security Researcher, Trainer of WebAssembly & Rust Security, mainly focused on Fuzzing, Vulnerability Research, Reversing & Binary analysis |
Paris, France |
Independent Security Researcher |
40 |
0 |
254 |
53 |
55 |
Python,WebAssembly,JavaScript,HTML,Rust |
230 |
38 |
vavkamil |
Damn Vulnerable WordPress - 用于研究 Wordpress 漏洞的一个项目 |
https://github.com/vavkamil/dvwp |
https://vavkamil.cz |
|
Czechia |
None |
13 |
0 |
1100 |
51 |
22 |
Python,PHP,TSQL |
56 |
9 |
nafod |
nafod 公开了自己 VMware UHCI ZDI-19-421 漏洞的 Exploit |
https://github.com/nafod/advent-vmpwn// |
None |
|
None |
None |
15 |
0 |
117 |
44 |
24 |
C,JavaScript |
5 |
1 |
0xricksanchez |
HITB 2020 Lockdown 会议 《Fuzz 文件系统的实现》议题的代码与 PPT |
https://github.com/0xricksanchez/fs-fuzzer |
http://0x434b.dev |
Trying to advance in the areas of IT-Sec, reversing and hacking. Also doing administrative jobs @ www.0x00sec.org |
@0xricksanchez |
None |
14 |
0 |
395 |
44 |
46 |
Python,Shell,CSS |
10 |
4 |
assafmo |
joincap: Merge multiple pcap files together, gracefully. |
https://github.com/assafmo/joincap |
https://github.com/enigmampc |
|
Israel |
@enigmampc |
25 |
0 |
270 |
35 |
18 |
Go,JavaScript |
140 |
12 |
Qftm |
Handbook of information collection for penetration testing and src |
https://github.com/Qftm/Information_Collection_Handbook |
https://qftm.github.io/ |
CTFer,Pentester,BugBountyHunter,Security Researcher,Mobile Security and Development |
Internet |
None |
7 |
0 |
53 |
35 |
35 |
Python,HTML,JavaScript,PHP,C++ |
254 |
56 |
yusufqk |
SystemToken: Steal privileged token to obtain SYSTEM shell |
https://github.com/yusufqk/SystemToken |
None |
Twitter: @ZupOctopus |
None |
None |
5 |
0 |
6 |
26 |
37 |
Python,C,JavaScript |
112 |
24 |
S1lkys |
XAMPP 本地提权漏洞分析(CVE-2020-11107) |
https://github.com/S1lkys/CVE-2020-11107/ |
None |
|
None |
None |
27 |
0 |
1 |
23 |
0 |
Python,Shell |
12 |
3 |
yardenshafir |
KernelDataStructureFinder - 在内核 lookaside 链表中搜索数据结构的工具 |
https://github.com/yardenshafir/KernelDataStructureFinder |
None |
|
None |
None |
5 |
0 |
2 |
22 |
0 |
C,C++ |
40 |
20 |
mrlnc |
禁用LTE网络安全性-商业网络中的配置错误安全研究分享。 |
https://github.com/mrlnc/LTE-ciphercheck |
None |
Research Assistant & PhD student. Mobile Network Security at Ruhr-Universität Bochum. |
Bochum, Germany |
Ruhr-Universität Bochum |
15 |
0 |
26 |
18 |
30 |
C++ |
36 |
13 |
xscorp |
pingfisher: A ping detection tool for linux |
https://github.com/xscorp/pingfisher |
None |
I am a computer science noob who loves programming and cyber security stuff. I believe in self learning and hard work rather than miracles :-) |
None |
None |
10 |
0 |
3 |
13 |
0 |
Python,PHP,Hack |
18 |
2 |
chrivers |
三星SSD固件文件解密工具Samsung Firmware Magic发布 |
https://github.com/chrivers/samsung-firmware-magic |
http://christianiversenit.dk |
|
Denmark |
Iversen IT |
23 |
0 |
15 |
13 |
6 |
Python,HTML,Smarty |
135 |
20 |
chompie1337 |
有研究员公开了一个三星 S8 手机利用 CVE-2019-2215 漏洞 Bypass DAC + SELinux + Knox/RKP 保护机制的完整 Exploit |
https://github.com/chompie1337/s8_2019_2215_poc |
None |
|
None |
None |
1 |
0 |
1 |
7 |
0 |
C |
28 |
10 |
afilipovich |
用于 Google Safe Browsing API 交互的 Python 库 |
https://github.com/afilipovich/gglsbl |
None |
|
Olomouc |
None |
10 |
0 |
31 |
7 |
4 |
Python,JavaScript |
66 |
30 |
Tera0017 |
APT组织TA505所使用的SDBbot RAT解包工具发布,支持x86和x64 |
https://github.com/Tera0017/SDBbot-Unpacker |
None |
I dont get it. |
None |
None |
3 |
0 |
0 |
6 |
0 |
Python |
38 |
4 |
Martyx00 |
Assistant plugin for vulnerability research |
https://github.com/Martyx00/VulnFanatic |
None |
|
None |
None |
4 |
0 |
2 |
5 |
0 |
Python,Objective-C,Shell |
26 |
4 |
weizman |
WhatsApp Desktop 0.3.9309 之前版本 XSS 漏洞分析 |
https://github.com/weizman/CVE-2019-18426 |
http://www.weizmangal.com |
javascript expert and web security enthusiastic :) |
Israel |
https://www.perimeterx.com |
8 |
0 |
3 |
4 |
1 |
JavaScript |
5 |
1 |
zj1244 |
beholder:一款监控端口变化的系统 |
https://github.com/zj1244/beholder_scanner |
None |
|
|
None |
10 |
0 |
60 |
3 |
3 |
Python,C,HTML,Java |
6 |
5 |
sibears |
用于修改 IDA HexRays AST 的工具 |
https://github.com/sibears/HRAST |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,JavaScript,HTML,CSS |
0 |
0 |
seemoo-lab |
Frankenstein - 用于为无线设备固件提供模拟执行和 Fuzz 环境的框架 |
https://github.com/seemoo-lab/frankenstein/ |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,Shell,Jupyter,Python,JavaScript,TeX,Objective-C,HTML,MATLAB,Java |
4100 |
296 |
mitre-attack |
Joystick :transform the ATT&CK Evaluations data into concise views |
https://github.com/mitre-attack/joystick |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
TypeScript,HTML,Python,JavaScript,Zeek,PowerShell |
0 |
0 |
fofapro |
基于 Docker 镜像的漏洞靶场平台 |
https://github.com/fofapro/vulfocus |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,Vue,Java,Python,Go,CSS |
169 |
19 |
ffffffff0x |
Dork-Admin: 盘点近年来的数据泄露、供应链污染事件 |
https://github.com/ffffffff0x/Dork-Admin |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
HTML,Java |
0 |
0 |
appsecco |
Attacking and Auditing Docker Containers and Kubernetes Clusters |
https://github.com/appsecco/attacking-and-auditing-docker-containers-and-kubernetes-clusters |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Shell,Java,Python,JavaScript,C#,Visual,HTML,ActionScript,PHP,CSS |
540 |
150 |
aind-containers |
AinD: Android (Anbox) in Docker,在 Docker 中运行 Android apps |
https://github.com/aind-containers/aind |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Dockerfile |
0 |
0 |
ail-project |
AIL framework - Analysis Information Leak framework |
https://github.com/ail-project/ail-framework |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python |
6 |
0 |
QAX-A-Team |
sharpwmi: 基于RPC的横向移动工具 |
https://github.com/QAX-A-Team/sharpwmi |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,Shell,Java,C#,C++,Python,Go,PowerShell |
0 |
0 |
CERT-Polska |
DRAKVUF - Hypervisor 层面的恶意软件自动化分析系统 |
https://github.com/CERT-Polska/drakvuf-sandbox |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,Java,Python,JavaScript,C++,PHP |
189 |
35 |