zodiacon |
基于 Event Tracing for Windows (ETW) 而不再依赖驱动实现的 Process Monitor |
https://github.com/zodiacon/ProcMonXv2 |
http://scorpiosoftware.net |
|
Israel |
None |
68 |
0 |
0 |
0 |
0 |
C#,C,C++ |
1100 |
296 |
yardenshafir |
Windows 进程 Mitigation 策略枚举工具 |
https://github.com/yardenshafir/MitigationFlagsCliTool |
https://medium.com/@yardenshafir2 |
A circus artist with a visual studio license |
None |
None |
8 |
0 |
0 |
0 |
0 |
C,C++ |
76 |
34 |
uknowsec |
SharpSQLDump:内网渗透中快速获取数据库所有库名,表名,列名功能。 |
https://github.com/uknowsec/SharpSQLDump |
http://uknowsec.cn |
不忘初心,方得始终 |
Nanjing |
None |
38 |
0 |
0 |
0 |
0 |
C# |
936 |
211 |
tomer8007 |
Chromium IPC Sniffer - 有研究员开发了一个监控 Chromium 浏览器命名管道通信消息的工具 |
https://github.com/tomer8007/chromium-ipc-sniffer |
None |
|
None |
None |
6 |
0 |
0 |
0 |
0 |
Python,Lua,Objective-C,JavaScript,C# |
81 |
44 |
synacktiv |
用于优化 IDA Hex-Rays 反编译器处理 VMX 指令的插件 |
https://github.com/synacktiv/vmx_intrinsics |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,C,PHP,Rust |
0 |
0 |
spyre-project |
基于Yara的简单IOC扫描器Spyre |
https://github.com/spyre-project/spyre |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Go |
0 |
0 |
sbousseaden |
Windows 系统各类攻击和渗透行为的 Events 样本收集 |
https://github.com/sbousseaden/EVTX-ATTACK-SAMPLES |
http://@SBousseaden |
Threat Hunting & DFIR |
None |
None |
63 |
0 |
0 |
0 |
0 |
Python,YARA,PowerShell |
974 |
195 |
samsonpianofingers |
RTTIDumper - 注入目标进程 Dump 虚函数表的工具 |
https://github.com/samsonpianofingers/RTTIDumper |
None |
A Man-Geek Interested in reverse engineering, software and web development, computer architecture and computer security. |
None |
None |
15 |
0 |
0 |
0 |
0 |
Python,Java,C++ |
3 |
1 |
saaramar |
Google Quals CTF 2020 Echo PWN Challenge Writeup |
https://github.com/saaramar/echo_googlequals2020 |
https://twitter.com/AmarSaar |
@AmarSaar in twitter, known as amarsa |
None |
None |
9 |
0 |
0 |
0 |
0 |
Python,C,Rust,C++ |
203 |
41 |
r4j0x00 |
为 v8 FixedArray 85bc1b0cab31cc064efc65e05adb81fee814261b 编写的 Exploit |
https://github.com/r4j0x00/exploits/blob/master/chrome-exploit/exploit.js |
https://github.com/r4j0x00 |
I make exploits |
None |
None |
14 |
0 |
0 |
0 |
0 |
Python,C,JavaScript,Ruby,C++ |
86 |
39 |
nccgroup |
NCC Group 为 Zerologon CVE-2020-1472 漏洞编写的 .NET 版本的 Exploit |
https://github.com/nccgroup/nccfsas/tree/main/Tools/SharpZeroLogon |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,TypeScript,Java,Python,JavaScript,C++,C#,Haskell,Shell,HCL,Elixir,Ruby,PowerShell,Rust |
2200 |
336 |
moonD4rk |
HackBrowserData: 全平台运行的浏览器数据导出解密工具 |
https://github.com/moonD4rk/HackBrowserData |
None |
There is no dark side in the moon. really, matter of fact its all dark. |
Pyongyang |
None |
5 |
0 |
0 |
0 |
0 |
Go,Python |
8400 |
1200 |
momosecurity |
bombus: 合规审计平台 |
https://github.com/momosecurity/bombus |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,TypeScript,Vue,Java,PHP |
0 |
0 |
microsoft |
上周推送的微软的 OneFuzz 平台的源码公开了 |
https://github.com/microsoft/onefuzz |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
TypeScript,Jupyter,C#,JavaScript,C++,Python,Q#,F#,Java,CSS |
0 |
0 |
mdsecresearch |
Post-Exploitation 工具如何躲避终端安全产品的检测 |
https://github.com/mdsecresearch/Publications/blob/master/presentations/Offensive%20Development%20-%20Post-Exploitation%20Tradecraft%20in%20an%20EDR%20World%20-%20x33fcon%202020.pdf |
https://www.mdsec.co.uk |
Public research and tools from MDSec Consulting |
UK |
MDSec |
10 |
0 |
0 |
0 |
0 |
Python,C,Objective-C,PowerShell,Arduino |
262 |
53 |
google |
今年 Google CTF 所有赛题源码 |
https://github.com/google/google-ctf/tree/master/2020/quals |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
TypeScript,Java,Python,Kotlin,JavaScript,C++,Vim,Objective-C,Shell,Starlark,Go,Jupyter,Dart,Rust |
0 |
0 |
gloxec |
CrossC2 framework - 生成 CobaltStrike 的跨平台 beacon |
https://github.com/gloxec/CrossC2 |
None |
|
None |
None |
46 |
0 |
0 |
0 |
0 |
Python,C,PLpgSQL |
586 |
127 |
firmianay |
IoT-vulhub: IoT 固件漏洞复现环境 |
https://github.com/firmianay/IoT-vulhub |
https://firmianay.github.io |
Information Security Student & CTF Player & member of @XDSEC, @xdlinux |
China |
Xidian University |
16 |
0 |
0 |
0 |
0 |
Python,C,Shell |
2000 |
414 |
dwisiswant0 |
CRLFuzz - 用于扫描 CRLF 漏洞的工具 |
https://github.com/dwisiswant0/crlfuzz |
https://github.com/kitabisa |
2>&1 |
id_ID |
@kitabisa |
227 |
0 |
0 |
0 |
0 |
Go,Python,Shell,Ruby,HCL |
198 |
71 |
dirkjanm |
Zerologon - Netlogon 被发现高危漏洞,成功利用可以攻破 Windows 域控服务器。PoC 代码已被公开 |
https://github.com/dirkjanm/CVE-2020-1472 |
http://dirkjanm.io |
|
The Netherlands |
None |
24 |
0 |
0 |
0 |
0 |
Python |
804 |
144 |
crowdsecurity |
Crowdsec - 一款开源的、轻量级的异常行为检测 Agent,适用于容器和虚拟机环境 |
https://github.com/crowdsecurity/crowdsec/ |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Go,Lua,Shell,PHP |
153 |
14 |
blacklanternsecurity |
TREVORspray - 微软 Office 365 密码爆破工具 |
https://github.com/blacklanternsecurity/TREVORspray |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Shell,Python,JavaScript,Visual,Go,Ruby,PowerShell,CSS |
0 |
0 |
autoguard |
汽车安全研究方向的 Paper 收集 |
https://github.com/autoguard/awesome-vehicle-security-and-safety |
http://autoguard-sec.com |
|
china |
autoguard |
11 |
0 |
0 |
0 |
0 |
JavaScript |
24 |
7 |
adulau |
ssldump - SSLv3/TLS 网络协议 Analyzer |
https://github.com/adulau/ssldump |
https://github.com/MISP |
Enjoy when human are using machines in unexpected ways. I break stuff and I do stuff. |
Europe |
@MISP @CIRCL @cve-search and many others |
113 |
1 |
0 |
0 |
0 |
Python,C,HTML |
127 |
54 |
TophantTechnology |
ARL: 资产侦察灯塔系统 |
https://github.com/TophantTechnology/ARL |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python |
0 |
0 |
PLSysSec |
haybale - 一款 Rust 语言编写的 LLVM IR 级别的符号执行引擎 |
https://github.com/PLSysSec/haybale |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,LLVM,Assembly,HTML,Python,JavaScript,Makefile,C++,Haskell,Swift,Rust |
0 |
0 |
NLP-LOVE |
《自然语言处理入门》详细笔记 |
https://github.com/NLP-LOVE/Introduction-NLP |
http://mantchs.com/ |
邮箱:[email protected] 博客:http://mantchs.com/ |
None |
None |
6 |
0 |
0 |
0 |
0 |
Python,HTML,Jupyter |
6200 |
2000 |
MisakiKata |
基于inotify的Linux文件实时监控扫描 |
https://github.com/MisakiKata/watchfile |
https://misakikata.github.io |
在菜的路上一路狂奔,从不复返 |
Shanghai |
None |
19 |
0 |
0 |
0 |
0 |
Python,Shell,Java,JavaScript |
92 |
24 |
DasSecurity-Labs |
AoiAWD: 专为比赛设计,便携性好,低权限运行的EDR系统 |
https://github.com/DasSecurity-Labs/AoiAWD |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,PHP,HTML |
0 |
0 |
DTolm |
VkFFT-Vulkan快速傅立叶变换库 |
https://github.com/DTolm/VkFFT |
None |
|
None |
None |
2 |
0 |
0 |
0 |
0 |
C,C++ |
213 |
6 |
ChiChou |
IDA-ObjCExplorer - 用于实现 Objective C classdump 的 IDA Pro 插件 |
https://github.com/ChiChou/IDA-ObjCExplorer |
https://github.com/alipay |
我要卖掉我的代码 浪迹天涯 |
Beijing, China |
@alipay |
68 |
0 |
0 |
0 |
0 |
TypeScript,Objective-C,Vue,JavaScript,C |
489 |
109 |
0vercl0k |
Symbolizer - 为进程执行 Trace、Crash Dump 提供调试符号的工具 |
https://github.com/0vercl0k/symbolizer |
https://doar-e.github.com/ |
|
US/FR |
None |
18 |
0 |
0 |
0 |
0 |
Python,JavaScript,C++ |
928 |
192 |