CHEF-KOCH |
KMS-activator - 关于 Windows 激活机制研究的一个项目 |
https://github.com/CHEF-KOCH/KMS-activator |
https://github.com/microsoft |
Former @microsoft and @NVIDIA employee. Since 2018 NTT-Security. Interested in privacy/security, gaming & demoscene related topics. |
Lausanne |
CKs Technology News |
125 |
0 |
4100 |
1400 |
127 |
Python,C,Batchfile,JavaScript,Pascal |
590 |
145 |
alephsecurity |
QEMU 的 Aleph Research fork 版本,用于运行 iOS 系统 |
https://github.com/alephsecurity/xnu-qemu-arm64 |
https://alephsecurity.com/ |
Security Research |
None |
HCL Technologies |
14 |
0 |
0 |
292 |
0 |
Python,C,Shell,Java |
419 |
49 |
Kelvinhack |
ThreadSpy - 基于硬件实现的 Thread Hijacker |
https://github.com/Kelvinhack/ThreadSpy |
https://github.com/Tencent |
@Tencent Ex Anti-Cheat Researcher @microsoft Security Researcher II |
Vancouver |
Microsoft |
40 |
0 |
18 |
176 |
1 |
C,C++ |
229 |
85 |
guimaizi |
testing_wave: 被动式web扫描器 |
https://github.com/guimaizi/testing_wave |
http://www.guimaizi.com/ |
|
None |
None |
5 |
0 |
31 |
125 |
2 |
Python,HTML |
313 |
81 |
Captainarash |
X86架构圣经指南手册。 |
https://github.com/Captainarash/The_Holy_Book_of_X86 |
https://twitter.com/H4UL4 |
Computing Offsets \x00 |
Helsinki, Finland |
None |
6 |
0 |
19 |
80 |
6 |
JavaScript,C++ |
492 |
101 |
wooyunwang |
Fortify: 源代码漏洞の审计 |
https://github.com/wooyunwang/Fortify |
http://www.52pwn.club/ |
A strange guy who will make the world a better place! |
California |
Google Inc. |
27 |
0 |
15 |
60 |
14 |
Python,C#,Java,PowerShell |
322 |
104 |
BeetleChunks |
ManageEngine OpManger 任意文件读漏洞 PoC(CVE-2020-12116) |
https://github.com/BeetleChunks/CVE-2020-12116 |
None |
OSCP, Red Teamer, Pentester, Developer, Hacker |
None |
None |
11 |
0 |
62 |
58 |
3 |
Python,C,PowerShell |
277 |
73 |
maxpl0it |
IE 浏览器 JS 脚本引擎 CVE-2020-0674 漏洞的 Exploit |
https://github.com/maxpl0it/CVE-2020-0674-Exploit |
https://twitter.com/maxpl0it |
Security researcher from the South East of England. |
South East, England |
None |
10 |
0 |
0 |
55 |
0 |
Python,C,HTML |
84 |
24 |
zrax |
Decompyle++ - Python 字节码反编译工具 |
https://github.com/zrax/pycdc |
None |
|
None |
None |
45 |
0 |
24 |
48 |
7 |
C++ |
736 |
164 |
gerhart01 |
Hyper-V internals researches (2006-2019) |
https://github.com/gerhart01/Hyper-V-Internals/blob/master/HyperResearchesHistory.md |
https://hvinternals.blogspot.com/ |
|
None |
None |
6 |
0 |
124 |
45 |
0 |
Python,C,HTML,C++ |
80 |
17 |
lilang-wu |
p-joker - 用于分析 iOS/macOS 内核 Kernelcache 与扩展的工具 |
https://github.com/lilang-wu/p-joker |
None |
|
None |
None |
32 |
0 |
11 |
29 |
13 |
Python,C |
40 |
19 |
Wangpeiyi9979 |
IE-Bert-CNN: 百度2019语言与智能技术竞赛信息抽取模型 |
https://github.com/Wangpeiyi9979/IE-Bert-CNN |
None |
我可以做到,我必须做到,我做的最好。 |
ChengDu,SiChuan,China |
TianJin University |
22 |
0 |
27 |
29 |
18 |
Python,Jupyter |
101 |
28 |
kabeor |
有研究员总结的 Unicorn CPU 模拟器的非官方 API 文档 |
https://github.com/kabeor/Micro-Unicorn-Engine-API-Documentation |
https://kabeor.cn |
Hello,Computers ! |
SiChuan,China |
SWUST |
11 |
0 |
79 |
27 |
0 |
HTML,C++ |
41 |
16 |
guibacellar |
DNCI - 将 .NET 代码远程注入到非托管进程中 |
https://github.com/guibacellar/DNCI |
https://theobservator.net |
Security Researcher and Machine Learning Specialist, researching in fraud detection, cyber espionage and artificial intelligence areas. |
Brazil |
None |
11 |
0 |
10 |
20 |
0 |
C#,Python,CSS |
74 |
30 |
chip-red-pill |
有研究员利用 Intel Atom CPU 的 Local Direct Access Test (LDAT) DFT 特性 Dump Microcode Sequencer ROM |
https://github.com/chip-red-pill/glm-ucode |
https://github.com/h0t |
Research Team Members: Dmitry Sklyarov (@Dmit), Mark Ermolov (@markel_), Maxim Goryachy (@h0t) |
Moscow |
None |
2 |
0 |
0 |
5 |
0 |
Python |
12 |
1 |
trailofbits |
Sienna Locomotive - 为缺乏安全经验的 Windows 开发者写的 Fuzzer |
https://github.com/trailofbits/sienna-locomotive |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,Shell,CMake,Python,Ruby,JavaScript,C++,Go,Swift,Rust |
18300 |
1600 |
rabobank-cdc |
DeTTECT: Detect Tactics, Techniques & Combat Threats |
https://github.com/rabobank-cdc/DeTTECT |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,CSS |
0 |
0 |
hardenedlinux |
hardenedlinux 关于固件安全的一个开源项目 |
https://github.com/hardenedlinux/firmware-anatomy |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,Shell,Assembly,Roff,Zeek,C++,Nix,HTML,Verilog,Go |
244 |
60 |
ProjectorBUg |
Double-Free BUG in WhatsApp exploit poc.[CVE-2020-11932] |
https://github.com/ProjectorBUg/CVE-2020-11932 |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,Shell,Jupyter,Python,Visual,HTML,Go,PHP,Ruby,Prolog |
0 |
0 |
NetSPI |
Evil SQL Client (ESC) - 为渗透测试设计的交互式的 SQL Server Client,支持发现数据库、访问数据、提取数据 |
https://github.com/NetSPI/ESC |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Java,C#,Python,HTML,Go,Ruby,PowerShell |
1100 |
282 |