hfiref0x |
TDL - 一款用于绕过 Windows x64 驱动签名强制(Driver Signature Enforcement)的驱动加载器: |
https://github.com/hfiref0x/TDL |
None |
|
None |
None |
23 |
0 |
24 |
1500 |
15 |
C |
0 |
0 |
riusksk |
secbook: 信息安全从业者书单推荐 |
https://github.com/riusksk/secbook |
http://riusksk.me |
《漏洞战争》作者 |
China |
Tencent |
174 |
0 |
790 |
1300 |
1000 |
Python,Objective-C,BlitzBasic,ActionScript |
952 |
148 |
ajinabraham |
Droid-Application-Fuzz-Framework - 在真实 Android 设备上 Fuzzing Android 浏览器和 PDF 阅读器内存破坏漏洞的框架: |
https://github.com/ajinabraham/Droid-Application-Fuzz-Framework |
https://github.com/OpenSecurityIN |
Security Research & Engineering https://opensecurity.in https://ajinabraham.com |
Montreal, Canada |
@OpenSecurityIN |
125 |
0 |
50 |
893 |
13 |
Python,HTML,CSS |
0 |
0 |
m4ll0k |
WAScan - 一款 Web 应用扫描器: |
https://github.com/m4ll0k/WAScan |
https://twitter.com/m4ll0k2 |
104,97,99,107,101,114,97,110,100&&112,114,111,103,114,97,109,109,101,114 |
127.0.0.1, Italy - Morocco |
localhost |
14 |
0 |
13 |
743 |
20 |
Python,Shell |
0 |
0 |
tyranid |
Windows Desktop Bridge 的工作原理与漏洞利用,来自 Zer0Con 2018 : |
https://github.com/tyranid/Zer0Con_2018/blob/master/A%20Bridge%20too%20Far.pdf |
None |
|
None |
None |
32 |
0 |
0 |
700 |
2 |
C#,Python,C |
0 |
0 |
Cryptogenic |
昨天研究员 Cryptogenic 公开了一个 PS4 4.55 Kernel Exploit,今天他写了一篇 Writeup 介绍其中的 WebKit setAttributeNodeNS UAF 漏洞的利用过程: |
https://github.com/Cryptogenic/Exploit-Writeups/blob/master/WebKit/setAttributeNodeNS%20UAF%20Write-up.md |
https://twitter.com/SpecterDev |
PHP/C++ developer with an interest in user-land and web exploitation. |
None |
None |
28 |
0 |
38 |
642 |
5 |
Go,C,JavaScript |
0 |
0 |
lcatro |
XSS-hunter: 收集Webview 页面上存在的反射,储存型XSS |
https://github.com/lcatro/XSS-hunter |
https://github.com/lcatro/my-blog |
Binary ,WEB vulnerability and Fuzzing Research .. |
China |
WeBank ,Tencent |
51 |
0 |
171 |
596 |
20 |
Python,PHP,Mask,C++ |
391 |
101 |
tandasat |
DdiMon - 使用 EPT 通过隐形钩子监视和控制内核 API 调用: |
https://github.com/tandasat/DdiMon |
http://standa-note.blogspot.ca/ |
Engineer @standa_t |
Vancouver, Canada |
None |
56 |
0 |
16 |
524 |
3 |
C#,C++ |
0 |
0 |
elfmaster |
skeksi_virus - 一款 Linux X86_64 ELF 病毒,目前处于开发中: |
https://github.com/elfmaster/skeksi_virus |
http://www.bitlackeys.org |
Order of operation: Consciousness/Meditation Family Creativity, coding, hacking, reversing, security |
Seattle |
Leviathan |
25 |
0 |
19 |
483 |
15 |
C,Objective-C,C++ |
192 |
45 |
bazad |
ida_kernelcache - 用于分析 iOS kernelcaches 的 IDAPython 模块: |
https://github.com/bazad/ida_kernelcache |
https://bazad.github.io |
iOS security research |
None |
None |
28 |
0 |
1 |
474 |
0 |
Python,C |
194 |
31 |
danielbohannon |
Invoke-CradleCrafter - PowerShell 远程 Download Cradle 生成器和混淆器: |
https://github.com/danielbohannon/Invoke-CradleCrafter |
http://danielbohannon.com |
Principal Applied Security Researcher (prev IR Consultant) |
Washington, D.C. |
Mandiant |
7 |
0 |
0 |
472 |
5 |
PowerShell |
0 |
0 |
Tamicer |
SkyMonitoring: Android Static FrameWork, 埋点统计SDK |
https://github.com/Tamicer/SkyMonitoring |
http://www.tamicer.com/ |
。。。。。。。。。。。 |
shanghai |
meituan |
69 |
0 |
111 |
470 |
32 |
Java |
1400 |
271 |
zodiacon |
使用 CoGetInterceptor 进行 COM 拦截 - Part 2: |
https://github.com/zodiacon/Blog/blob/master/COM%20Interception%20with%20CoGetInterceptor-Part%202.pdf |
http://scorpiosoftware.net |
|
None |
None |
50 |
0 |
99 |
448 |
8 |
C#,C |
0 |
0 |
nahamsec |
lazyrecon - 渗透测试前期情报自动化收集工具: |
https://github.com/nahamsec/lazyrecon |
http://nahamsec.com |
|
None |
None |
12 |
0 |
0 |
407 |
0 |
Python,Shell,Ruby |
449 |
123 |
az0ne |
MongoDB_AutoDump: 快速探测未授权MongoDB数据库结构 |
https://github.com/az0ne/MongoDB_AutoDump |
http://az0ne.lofter.com |
|
China |
ANTIY |
321 |
0 |
967 |
379 |
32 |
Python,JavaScript,Lua,HTML,Go,PowerShell |
377 |
171 |
CoolerVoid |
rootstealer - 检测 Linux 中的 root 用户终端并注入自定义命令: |
https://github.com/CoolerVoid/rootstealer |
http://funguscodes.blogspot.com.br/ |
Just another computer programmer, twitter: @Cooler_freenode |
brazil - sao paulo |
None |
67 |
0 |
177 |
378 |
101 |
C,C++ |
0 |
0 |
0x09AL |
Go-deliver - Go 语言编写的 Payload 分发工具: |
https://github.com/0x09AL/go-deliver |
https://twitter.com/0x09AL |
|
None |
None |
94 |
0 |
114 |
372 |
19 |
Go,Python,Ruby,C++ |
0 |
0 |
owenliang |
PHP-FPM源码分析 |
https://github.com/owenliang/php-fpm-code-analysis |
None |
精神>思想>技术 |
china |
www.baidu.com |
98 |
0 |
38 |
351 |
4 |
Go,C |
0 |
0 |
Moham3dRiahi |
XBruteForcer - 自动化暴力破解 WordPress, Joomla, DruPal, OpenCart, Magento 等站点账户密码的脚本: |
https://github.com/Moham3dRiahi/XBruteForcer |
None |
G33k 👤, programmer 💻, Pentester ⚠ , Defacer 👨💻, Crypto fan 🔒, Malware lover ☢, security researcher 🔎, open source fan ❤, AGE: 22 📧 ICQ : 712653075 |
Tunisia |
None |
4 |
0 |
0 |
349 |
0 |
Perl |
0 |
0 |
phil-opp |
用 Rust 来写一个 OS: |
https://github.com/phil-opp/blog_os |
http://phil-opp.com |
|
Karlsruhe, Germany |
None |
85 |
0 |
206 |
333 |
19 |
HTML,Rust |
0 |
0 |
xtr4nge |
FruityWifi - 无线网络安全审计工具,适用于多个 Linux 发行版系统: |
https://github.com/xtr4nge/FruityWifi |
None |
|
None |
None |
78 |
0 |
2 |
311 |
0 |
Python,PHP,JavaScript,PowerShell,Perl |
1600 |
428 |
berzerk0 |
Probable-Wordlists 2.0 发布,一个通用密码字典收集仓库: |
https://github.com/berzerk0/Probable-Wordlists |
https://berzerk0.github.io/GitPage/ |
Cyber/Infosec - Aspiring Red Teamer - EE - Convincing people password is not a good password - Iced Tea Expert - occasional blogger |
New York City |
Open to new Cybersec/Infosec/Hardware Opportunities |
11 |
0 |
149 |
301 |
6 |
Python |
0 |
0 |
BigNerd95 |
Chimay-Red - Vault 7 CIA 泄漏的 Mikrotik 漏洞利用 POC: |
https://github.com/BigNerd95/Chimay-Red |
https://bignerd95.blogspot.it/ |
Computer Science Student at UniTo (University of Turin). I love reverse engineering of embedded systems. |
Italy |
None |
40 |
0 |
225 |
294 |
16 |
Python,C,Shell |
0 |
0 |
ZephrFish |
DockerAttack - 渗透测试用的 Docker 镜像: |
https://github.com/ZephrFish/DockerAttack |
https://blog.zsec.uk |
I hack things, write things and break things. So my life is full of things. |
None |
None |
92 |
0 |
12 |
290 |
6 |
Python,Shell,PowerShell |
0 |
0 |
CyberMonitor |
APT_CyberCriminal_Campagin_Collections - 2006 年至今的几乎所有公开的 APT 攻击分析报告收集: |
https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections |
None |
|
None |
None |
238 |
0 |
40 |
286 |
5 |
C,Shell,C#,JavaScript,C++,HTML,Go,PowerShell |
1000 |
305 |
scanfsec |
Drcomdecoder: Drcom 数据库账号密码加解密 |
https://github.com/scanfsec/Drcomdecoder |
http://www.scanfsec.com |
Web Security Engineer |
None |
Nu1L & Symbo1 |
175 |
0 |
3200 |
259 |
899 |
Python,C#,C,JavaScript,C++ |
21 |
11 |
anhkgg |
PyRat: PyRat,a rat by python xmlrpc |
https://github.com/anhkgg/PyRat |
https://anhkgg.github.io |
微信公众号: 汉客儿 |
USA |
TY |
75 |
0 |
137 |
255 |
13 |
Python,C,C++ |
0 |
0 |
ScottyBauer |
Android bluetooth remote heap disclosure PoC(CVE-2017-13259) : |
https://github.com/ScottyBauer/Android_Kernel_CVE_POCs/commit/7c164cca56aae19edd417f597f92423965415f50 |
https://plzdonthack.me |
|
Indiana |
Qualcomm |
15 |
0 |
8 |
254 |
8 |
TeX,C |
594 |
201 |
UnaPibaGeek |
ctfr - 滥用证书透明度日志获取HTTPS网站子域名的工具: |
https://github.com/UnaPibaGeek/ctfr |
https://github.com/UnaPibaGeek |
Security Researcher / Reverse engineer / Exploit Writer / Im @UnaPibaGeek on Twitter. |
None |
http://www.semecayounexploit.com |
5 |
0 |
0 |
229 |
0 |
Python,Ruby,C++ |
1200 |
177 |
nh2 |
使用 strace 调试管道与套接字之间的通信: |
https://github.com/nh2/strace-pipes-presentation/blob/master/presentation/Debugging%20across%20pipes%20and%20sockets%20with%20strace.pdf |
https://github.com/tsurucapital |
Bio: Imperial College London, @tsurucapital @google @fpco |
Zürich |
My own consultancy |
342 |
0 |
105 |
229 |
24 |
Python,Nix,Haskell,C++ |
323 |
20 |
Viralmaniar |
Passhunt - 用于搜索网络设备,Web 应用程序等的默认凭证的工具: |
https://github.com/Viralmaniar/Passhunt |
https://twitter.com/maniarviral |
|
Melbourne, Victoria, Australia |
None |
36 |
0 |
221 |
219 |
93 |
Python,Shell |
725 |
110 |
hc0d3r |
Sudohulk - 替换 sudo,利用 ptrace Hook execve 系统调用实现劫持: |
https://github.com/hc0d3r/sudohulk |
http://hc0d3r.github.io |
|
Brasil |
None |
20 |
0 |
261 |
218 |
31 |
C |
0 |
0 |
caffix |
amass - Go 语言编写的子域名收集工具: |
https://github.com/caffix/amass |
https://twitter.com/jeff_foley |
Security Researcher, Red Team Manager, Gopher and Project Leader of OWASP Amass |
New York, United States |
None |
23 |
0 |
400 |
216 |
39 |
Go,Ruby |
0 |
0 |
0xdea |
tactical-exploitation - 战术型渗透测试工具包: |
https://github.com/0xdea/tactical-exploitation |
https://0xdeadbeef.info/ |
You cant argue with a root shell. |
Italy |
None |
11 |
0 |
81 |
214 |
0 |
Python,C,JavaScript,Assembly,PowerShell |
506 |
84 |
Proteas |
带有调试符号的 iOS 11 内核,作者为 Proteas: |
https://github.com/Proteas/unstripped-ios-kernels |
None |
Geek |
China |
None |
35 |
0 |
194 |
203 |
61 |
C,Shell,C++ |
193 |
44 |
NytroRST |
NetRipper - 一款针对 Windows 系统的后渗透工具,通过 API Hook 拦截网络流量: |
https://github.com/NytroRST/NetRipper |
None |
Interested in C/C++, ASM, Windows internals, reverse engineering, exploit and shellcode development |
Romania |
None |
7 |
0 |
0 |
202 |
0 |
HTML,PowerShell,C++ |
0 |
0 |
cobbr |
PSAmsi - 一款审核和击败 AMSI 签名的工具: |
https://github.com/cobbr/PSAmsi |
https://cobbr.io |
|
Dallas, TX |
SpecterOps |
17 |
0 |
48 |
198 |
1 |
C#,PowerShell |
503 |
79 |
Metnew |
uxss-db - UXSS 漏洞搜集仓库: |
https://github.com/Metnew/uxss-db |
https://twitter.com/vladimir_metnew |
|
Ukraine, Kiev |
None |
34 |
0 |
296 |
192 |
11 |
Go,HTML,JavaScript |
0 |
0 |
euske |
pyrexecd - Windows 系统上的独立 SSH 服务: |
https://github.com/euske/pyrexecd |
https://tabesugi.net/ |
m33p. |
Nagano, Japan |
None |
88 |
0 |
12 |
181 |
4 |
Python,TypeScript,Java |
0 |
0 |
incredibleindishell |
利用 Apache Tomcat text interface 部署 war 包的利用脚本: |
https://github.com/incredibleindishell/exploit-code-by-me/tree/master/Apache-Tomcat-Text_interface-shell-upload |
https://twitter.com/IndiShell1046 |
Security enthusiast Love to learn Linux, PHP and exploit development |
IndiShell Lab |
None |
115 |
0 |
7 |
168 |
10 |
PHP,Java |
0 |
0 |
0xSobky |
Regaxor 正则表达式模糊测试工具介绍: |
https://github.com/0xSobky/HackVault/wiki/Regaxor:-Fuzzing-Regexes-for-Fun-and-Not%E2%80%90So%E2%80%90Much-Profit |
https://0xsobky.github.io |
([].map+0)[9]+([].keys+0)[9]+(top+0)[7]+(typeof!1)[0]+(!0+)[1]+(!1+)[4]+(-{}+)[1]+([].keys+0)[9]+(top+0)[7]+(.fixed+0).slice(9,12) |
None |
None |
12 |
0 |
9 |
167 |
13 |
Python,JavaScript |
0 |
0 |
JLospinoso |
memcachedump - 调用 Shodan API 快速导出暴露在公网的 memcached 服务器缓存的所有内容的脚本: |
https://github.com/JLospinoso/memcachedump |
https://lospi.net |
entrepreneur, technologist |
Washington, DC |
None |
58 |
0 |
180 |
158 |
58 |
C#,Python,C,C++ |
0 |
0 |
initstring |
linkedin2username - 通过 LinkedIn 获取一个公司的人员用户名列表 |
https://github.com/initstring/linkedin2username |
https://initblog.com |
Security researcher. |
Melbourne, Australia |
None |
9 |
0 |
54 |
153 |
3 |
Python |
0 |
0 |
quentinhardy |
msdat - Microsoft SQL Server 数据库攻击工具: |
https://github.com/quentinhardy/msdat |
None |
|
None |
None |
10 |
0 |
27 |
148 |
0 |
Python,C++ |
0 |
0 |
jiangsir404 |
S7scan: 集七种功能的漏洞综合检测利用工具 |
https://github.com/jiangsir404/S7scan |
http://blog.s7star.cn |
Talk is cheap, show me the code. |
None |
None |
15 |
0 |
225 |
137 |
116 |
Python |
517 |
109 |
rezasp |
joomscan - OWASP Joomla 漏洞扫描器: |
https://github.com/rezasp/joomscan |
https://github.com/OWASP |
@OWASP Leader |
Iran |
@OWASP |
9 |
0 |
18 |
131 |
5 |
Python,Perl |
0 |
0 |
sashs |
Exploitation on arm based systems, ARM 系统的漏洞利用开发: |
https://github.com/sashs/arm_exploitation/blob/master/exploitation_on_arm_based_systems.pdf |
https://scoding.de |
|
None |
None |
6 |
0 |
78 |
127 |
6 |
Python,Ruby |
782 |
140 |
se55i0n |
DBScanner: 自动扫描内网常数据库脚本未授权访问及常规弱口令检测 |
https://github.com/se55i0n/DBScanner |
None |
web security |
None |
None |
10 |
0 |
12 |
119 |
12 |
Python |
0 |
0 |
0xbadjuju |
Tokenvator - 操作 Windows Tokens 进行提权的工具: |
https://github.com/0xbadjuju/Tokenvator |
None |
|
None |
None |
22 |
0 |
28 |
118 |
0 |
C#,PowerShell |
509 |
118 |
harleyQu1nn |
AggressorScripts - Cobalt Strike 3.0+ 的 Aggressor 脚本收集仓库: |
https://github.com/harleyQu1nn/AggressorScripts |
http://harleyqu1nn.com |
Red Teamer/Penetration Tester @r3dQu1nn |
None |
None |
26 |
0 |
66 |
112 |
11 |
C#,Python,PowerShell |
0 |
0 |
convisoappsec |
firefox_tunnel - 使用 Firefox 做隐藏通信隧道绕过防火墙限制的POC : |
https://github.com/convisoappsec/firefox_tunnel |
https://www.conviso.com.br |
|
Brazil, Curitiba-PR |
Conviso Application Security S/A |
27 |
0 |
3 |
106 |
0 |
C,Python,JavaScript,Perl,PHP,Ruby |
60 |
13 |
blacknbunny |
peanalyzer - 便携式可执行文件分析和反汇编工具: |
https://github.com/blacknbunny/peanalyzer |
https://blacknbunny.github.io/ |
筑路工人 17 y/o Youtube : http://tiny.cc/2y944y https://twitter.com/0DAYanc |
None |
None |
20 |
0 |
15 |
103 |
3 |
Python,HTML |
0 |
0 |
HanseSecure |
如何使用 ExploitDev 进行网络应用的模糊测试: https://hansesecure.de/howto-exploitdev-fuzzing/ GitHub: |
https://github.com/HanseSecure/ExploitDev |
https://github.com/HanseSecure |
Father, Hacker, Consultant, Pentester, Researcher, Student, Exploits, OffsecDev, InfoSec & CyberCyber - https://hansesecure.de/impressum/ |
Germany |
@HanseSecure |
27 |
0 |
7 |
101 |
4 |
Shell,Assembly,Python,C++,Go,PowerShell |
133 |
36 |
alevchuk |
vim-clutch - 为提升 Vim 编码速度而生的 USB 电子脚踏板改造之旅: |
https://github.com/alevchuk/vim-clutch |
https://twitter.com/alevchuk |
|
Menlo Park, CA |
Facebook |
32 |
0 |
43 |
98 |
6 |
Python,Shell,Ruby,Perl |
2800 |
55 |
agustingianni |
symrepl - 读取二进制文件符号信息的工具: |
https://github.com/agustingianni/symrepl |
https://gruba.blogspot.com |
Programmer, vulnerability researcher, and what not. |
San Marino |
None |
27 |
0 |
376 |
92 |
201 |
Python,C++ |
56 |
14 |
trufae |
forkless - 为 iOS 编写的第三方 fork 库: |
https://github.com/trufae/forkless/ |
http://www.radare.org/ |
|
None |
None |
55 |
0 |
19 |
88 |
2 |
Objective-C,JavaScript,Makefile,C |
106 |
7 |
rand0m1ze |
ezsploit - Metasploit 的 Linux 自动化脚本: |
https://github.com/rand0m1ze/ezsploit |
None |
|
None |
None |
9 |
0 |
3 |
85 |
2 |
C#,Visual,Shell |
168 |
71 |
vincentcox |
StaCoAn - 跨平台的移动端应用静态代码审计工具: |
https://github.com/vincentcox/StaCoAn |
https://www.linkedin.com/in/ivincentcox/ |
vincentcox.com |
Belgium |
None |
7 |
0 |
145 |
80 |
15 |
Shell,JavaScript,PowerShell |
0 |
0 |
dschadow |
Java-Web-Security 安全书籍 |
https://github.com/dschadow/Java-Web-Security |
https://github.com/bridgingIT |
Senior Consultant @bridgingIT, author (Java-Web-Security book, articles), speaker, secure development advocate, @jcryptool project lead. |
Stuttgart, Germany |
@bridgingIT |
13 |
0 |
10 |
75 |
1 |
Java |
0 |
0 |
nezza |
SDQAnalyzer - Saleae Logic 分析器的 SDQ 协议分析插件: |
https://github.com/nezza/SDQAnalyzer |
http://stacksmashing.net/ |
|
Germany |
None |
33 |
0 |
25 |
74 |
9 |
Python,JavaScript,C++ |
0 |
0 |
findneo |
tombkeeper 教主微博语录 |
https://github.com/findneo/TKposts |
http://findneo.github.io |
|
None |
None |
16 |
0 |
653 |
73 |
108 |
Python |
0 |
0 |
omergunal |
CryptoPot:Simple cryptocurrency mining honeypot |
https://github.com/omergunal/CryptoPot |
https://ogunal.com |
|
Turkey |
None |
16 |
0 |
50 |
72 |
13 |
Python,HTML |
0 |
0 |
abhi-r3v0 |
Adhrit - Android APK 逆向分析工具: |
https://github.com/abhi-r3v0/Adhrit/ |
https://github.com/NeonSecOfficial |
HawkSpawn |
Android Security Enthusiast |
Indian |
Co-Founder @NeonSecOfficial |
CTF @teambi0s |
Amrita Viswa Vidyapeetham |
Mysuru |
@NeonSecOfficial @teambi0s |
66 |
0 |
212 |
erpscanteam |
SAP NetWeaver AS JAVA CRM 的日志注入远程命令执行漏洞 PoC(CVE-2018-2380): |
https://github.com/erpscanteam/CVE-2018-2380 |
https://github.com/erpscan |
|
None |
@erpscan |
6 |
0 |
0 |
65 |
0 |
Python,C |
44 |
16 |
felixgr |
secure-ios-app-dev - iOS 应用安全开发指南: |
https://github.com/felixgr/secure-ios-app-dev |
https://github.com/google |
information security engineer |
Switzerland |
@google |
3 |
0 |
142 |
64 |
2 |
Python |
0 |
0 |
anatolikalysch |
VMAttack - 通过动静态分析,反混淆基于虚拟化实现的二进制加壳,papaer: https://www1.cs.fau.de/filepool/publications/unpacking-dynamic-static.pdfGitHub: |
https://github.com/anatolikalysch/VMAttack |
https://cs1.cms.rrze.uni-erlangen.de/person/anatoli-kalysch/ |
|
Nuremberg |
Friedrich-Alexander-Universität Erlangen-Nürnberg |
11 |
0 |
9 |
60 |
4 |
Python,Java |
0 |
0 |
gyoisamurai |
GyoiThon - 基于机器学习的渗透测试工具: |
https://github.com/gyoisamurai/GyoiThon |
None |
Were Black Hat Arsenal presenter. |
None |
None |
2 |
0 |
4 |
59 |
0 |
Python |
449 |
176 |
eladshamir |
Internal-Monologue - 在不触碰 LSASS 的情况下抓取 NTLM Hashes 的攻击方式: |
https://github.com/eladshamir/Internal-Monologue |
https://eladshamir.com |
Managing Security Consultant at The Missing Link |
Co-founder of Shenanigans Labs |
Sydney, Australia |
The Missing Link Security |
3 |
0 |
1 |
56 |
2 |
C#,Python |
666 |
HA71 |
WhatCMS - 依据 Whatcms.org 提供的 API 编写的 CMS 检测与利用工具: |
https://github.com/HA71/WhatCMS |
http://underc0de.org |
|
Hagakure |
None |
5 |
0 |
1100 |
55 |
103 |
Python,Shell |
0 |
0 |
abaykan |
CrawlBox - Web 目录暴力破解工具: |
https://github.com/abaykan/crawlbox |
https://github.com/c0delatte |
Mukhammad Akbar |
Indonesia |
Indonesia |
@c0delatte |
27 |
0 |
45 |
54 |
11 |
Python,PHP,HTML |
0 |
Dviros |
RAT-via-Telegram - 利用 Telegram 进行 C&C 通信的 Windows 远程控制工具: |
https://github.com/Dviros/RAT-via-Telegram |
https://www.linkedin.com/in/dviros/ |
alert(bio) |
None |
None |
122 |
0 |
108 |
53 |
31 |
Shell,Python,JavaScript,C#,Go,PowerShell |
0 |
0 |
axt |
angr-utils - angr 二进制分析框架的辅助程序,包含 CFG 可视化: |
https://github.com/axt/angr-utils |
None |
|
None |
None |
8 |
0 |
123 |
49 |
66 |
Python,JavaScript,Java |
108 |
23 |
UltimateHackers |
Arjun - 暴力破解 GET/POST 参数的 Python 脚本: |
https://github.com/UltimateHackers/Arjun |
None |
This profile has been moved to: https://github.com/s0md3v |
None |
None |
0 |
0 |
0 |
47 |
0 |
|
0 |
0 |
brompwnie |
uitkyk - 自定义 Android Frida 库,用于分析 Android 应用程序的恶意行为: |
https://github.com/brompwnie/uitkyk |
https://twitter.com/brompwnie |
Keyboard wrangler ⌨️ |
None |
None |
16 |
0 |
9 |
46 |
10 |
Shell,Java,C++,Go,Smali,CSS |
0 |
0 |
crsftw |
list of useful commands, shells and notes related to OSCP |
https://github.com/crsftw/OSCP-cheat-sheet |
None |
|
None |
None |
22 |
0 |
5 |
45 |
3 |
Python,C,Shell,PHP |
8 |
8 |
dchrastil |
ScrapedIn:A tool to scrape LinkedIn without API restrictions for data reconnaiss |
https://github.com/dchrastil/ScrapedIn |
None |
red-team hacker |
None |
None |
6 |
0 |
11 |
45 |
1 |
Python,JavaScript,PowerShell |
428 |
62 |
ssl |
ezXSS - 跨站漏洞辅助测试工具: |
https://github.com/ssl/ezXSS |
https://github.com/zaax |
|
Netherlands |
@zaax |
2 |
0 |
95 |
43 |
7 |
HTML |
0 |
0 |
dsopas |
assessment-mindset - 网络安全评估思维导图: |
https://github.com/dsopas/assessment-mindset |
https://www.davidsopas.com |
/me hacks! the webz |
Portugal |
Char49 |
10 |
0 |
34 |
41 |
1 |
Go,Python |
299 |
36 |
yehgdotnet |
S3Scanner - 扫描开放的 AWS S3 Buckets 并转储所有数据的工具: |
https://github.com/yehgdotnet/S3Scanner |
https://cybersecurityassessor.ninja |
A Cyber Security Ninja |
Yangon, Myanmar |
None |
330 |
0 |
259 |
41 |
71 |
Python,Java,Ruby |
0 |
0 |
jcesarstef |
dotdotslash - 目录穿越漏洞辅助测试工具: |
https://github.com/jcesarstef/dotdotslash |
https://www.inseguro.com.br |
|
São Paulo, Brazil |
None |
19 |
0 |
364 |
39 |
31 |
Python |
0 |
0 |
rh0dev |
From Assembly to JavaScript:从汇编到 JavaScript 与基于 ASM.JS JIT-Spray 的漏洞利用: |
https://github.com/rh0dev/slides/blob/master/OffensiveCon2018_From_Assembly_to_JavaScript_and_back.pdf |
https://rh0dev.github.io |
|
None |
None |
4 |
0 |
0 |
38 |
0 |
HTML |
37 |
21 |
lclevy |
firepwd.py, an open source tool to decrypt Mozilla protected passwords |
https://github.com/lclevy/firepwd |
https://twitter.com/lorenzo2472 |
interested in file formats, crypto and reverse engineering |
France |
None |
12 |
0 |
14 |
34 |
8 |
Python,C,HTML |
160 |
49 |
vessial |
大疆无人机解密固件: |
https://github.com/vessial/fw_decrypt |
None |
|
None |
None |
11 |
0 |
3 |
34 |
5 |
C,C++ |
25 |
11 |
JonCooperWorks |
judas - 钓鱼工具,可克隆网站和配置上级代理: |
https://github.com/JonCooperWorks/judas |
None |
|
None |
None |
35 |
0 |
8 |
31 |
5 |
Go,Kotlin,JavaScript,Python,CSS |
204 |
50 |
gdedrouas |
Exchange-AD-Privesc - 利用 Microsoft Exchange 的 DACL 问题提升域内权限: |
https://github.com/gdedrouas/Exchange-AD-Privesc |
http://www.elysee.fr/ |
|
None |
Présidence de la République |
6 |
0 |
18 |
29 |
2 |
C,JavaScript,PowerShell |
268 |
52 |
Abdulraheem30042 |
Cl0neMast3r - 协助 penetration tester 和 bug hunter 更轻松的管理来自 Github 的工具: |
https://github.com/Abdulraheem30042/Cl0neMast3r |
https://twitter.com/abdulrah33mk |
Python programmer && Bug hunter |
Egypt |
None |
1 |
0 |
0 |
28 |
0 |
Python |
163 |
56 |
shellster |
DCSYNCMonitor -部署在域控上用于监视 DCSYNC 和 DCSHADOW 攻击的工具: |
https://github.com/shellster/DCSYNCMonitor |
None |
|
None |
None |
30 |
0 |
172 |
27 |
8 |
Python,C,C++ |
126 |
23 |
therealsaumil |
static-arm-bins - 静态编译好的用于调试分析的 ARM 常用逆向工具: |
https://github.com/therealsaumil/static-arm-bins/ |
None |
|
None |
None |
7 |
0 |
0 |
27 |
0 |
C,JavaScript,Assembly,Arduino |
0 |
0 |
TonyPhipps |
THRecon - 威胁狩猎侦察工具包: |
https://github.com/TonyPhipps/THRecon |
None |
[email protected] |
None |
None |
6 |
0 |
158 |
23 |
4 |
Lua,C,PowerShell |
174 |
40 |
0xcl |
Clang 控制流程完整性(CFI)绕过技术: |
https://github.com/0xcl/clang-cfi-bypass-techniques |
https://www.trust.informatik.tu-darmstadt.de/people/christopher-liebchen/ |
|
None |
None |
2 |
0 |
0 |
22 |
0 |
HTML,JavaScript |
85 |
20 |
Gh05ter |
Bank: 工控安全资料共享库 |
https://github.com/Gh05ter/Bank |
None |
<%eval request(lubr)%> |
China |
None |
36 |
0 |
104 |
22 |
25 |
Python,Lua,Java |
54 |
26 |
beaujeant |
逆向 MMORPG 游戏 Pwn Adventure 3: |
https://github.com/beaujeant/PwnAdventure3/blob/master/Workshop/re-mmorpg-troopers18.pdf |
https://twitter.com/beaujeant |
IT Security |
Pentester |
Researcher |
None |
None |
6 |
0 |
1 |
20 |
0 |
Python,Lua,HTML,CSS |
franccesco |
Getaltname - 从 SSL 证书收集子域名的工具: |
https://github.com/franccesco/getaltname |
https://codingdose.info |
Author of CodingDose a programming blog about snippets, testing and coding horror. A committed fan of learning and self improvement. Python and Ruby programmer. |
Managua, Nicaragua |
None |
16 |
0 |
39 |
20 |
5 |
Python,HTML,CSS |
0 |
0 |
liulilittle |
PaperAirplane: 一个类似于Proxifier的SOCKS5代理工具 |
https://github.com/liulilittle/PaperAirplane |
None |
hope that one day in the meet. |
None |
None |
10 |
0 |
1 |
19 |
0 |
C#,C++ |
69 |
39 |
matthastings |
DSCompromised:利用 Windows DSC 进行横向渗透的利用脚本: |
https://github.com/matthastings/DSCompromised |
None |
|
None |
None |
4 |
0 |
0 |
17 |
0 |
Python,PowerShell |
84 |
22 |
k0retux |
fuddly - 模糊测试和数据操作框架: |
https://github.com/k0retux/fuddly |
None |
|
None |
None |
1 |
0 |
4 |
14 |
0 |
Python |
145 |
41 |
alex91ar |
Diamorphine - 适用于 Linux Kernels 2.6.x/3.x/4.x 内核的 LKM rootkit: |
https://github.com/alex91ar/Diamorphine |
None |
Pentester. Currently working at Immunity Inc. |
Ciudad Autonoma de Buenos Aires, Argentina |
Immunity Inc. |
4 |
0 |
1 |
11 |
0 |
Python,C,C++ |
30 |
9 |
scrapbird |
sarlacc - 用于收集恶意垃圾邮件的 SMTP 服务器: |
https://github.com/scrapbird/sarlacc |
https://github.com/Roamltd |
DevOps guy who enjoys malware analysis. @_scrapbird |
New Zealand |
@Roamltd |
22 |
0 |
42 |
11 |
6 |
Python,Dockerfile,Perl |
0 |
0 |
Quikko |
BuQuikker - 快速寻找错误配置的 AWS S3 Buckets 的工具: |
https://github.com/Quikko/BuQuikker |
None |
|
None |
None |
17 |
0 |
56 |
10 |
2 |
Python,Go,PHP |
22 |
3 |
phdphuc |
mac-a-mal - 基于 Cuckoo 沙盒的 macOS 恶意软件分析工具的内核监控模块: |
https://github.com/phdphuc/mac-a-mal/ |
https://twitter.com/phd_phuc |
|
None |
None |
2 |
0 |
5 |
10 |
0 |
Python,C |
49 |
13 |