ruanyf |
document-style-guide: 中文技术文档的写作规范 |
https://github.com/ruanyf/document-style-guide |
https://twitter.com/ruanyf |
|
Shanghai, China |
None |
56 |
0 |
234 |
52000 |
0 |
JavaScript |
0 |
0 |
justjavac |
免费的计算机编程类中文书籍 |
https://github.com/justjavac/free-programming-books-zh_CN |
https://github.com/denoland |
Creator of vscode-deno. Currently a contributor to Deno @denoland and author of @denodev. |
Tianjin, China |
None |
64 |
0 |
810 |
11800 |
128 |
TypeScript,JavaScript,HTML |
0 |
0 |
evilsocket |
evilsocket 开源的一个利用深度学习技术辅助攻击 WiFi 的工具 |
https://github.com/evilsocket/pwnagotchi/releases/tag/v1.0.0RC4 |
https://www.evilsocket.net |
|
Italy |
Zimperium |
118 |
0 |
14 |
4100 |
0 |
Go,Python,JavaScript,CSS |
6000 |
573 |
nikic |
PHP-Fuzzer - 基于代码覆盖反馈信息 Fuzz PHP libraries |
https://github.com/nikic/PHP-Fuzzer |
https://nikic.github.io/ |
|
Berlin, Germany |
JetBrains |
71 |
0 |
72 |
4000 |
24 |
C,PHP |
26100 |
5900 |
byt3bl33d3r |
利用脚本语言处理 .NET Payloads,实现 BYOI Payloads |
https://github.com/byt3bl33d3r/Slides/blob/master/RT%20Level%209000%2B%2B_BsidesPR.pdf |
https://byt3bl33d3r.github.io |
C Y B E R |
Error: Unable to resolve |
BlackHills InfoSec |
98 |
0 |
1100 |
3000 |
120 |
Python,PowerShell,HCL,Boo |
3000 |
795 |
s0md3v |
goop: Google Search Scraper |
https://github.com/s0md3v/goop |
https://github.com/s0md3v |
I make things, I break things and I make things that break things. Twitter: @s0md3v |
None |
None |
31 |
0 |
0 |
2600 |
0 |
Python,JavaScript |
6900 |
868 |
openbilibili |
哔哩哔哩(bilibili)站的源码疑似泄漏 |
https://github.com/openbilibili/go-common |
None |
|
None |
None |
0 |
0 |
0 |
2200 |
0 |
|
0 |
0 |
thelinuxchoice |
Phishing Tool for 18 social media |
https://github.com/thelinuxchoice/shellphish |
http://twitter.com/linux_choice |
Twitter: @linux_choice |
None |
None |
103 |
0 |
38 |
2200 |
5 |
Python,Shell,HTML |
890 |
403 |
xdite |
互联网资安风控实战 |
https://github.com/xdite/internet-security |
http://blog.xdite.net |
CEO of OTCBTC |
Taipei, Taiwan |
OTCBTC |
177 |
0 |
214 |
1600 |
13 |
Makefile,Ruby |
315 |
82 |
taviso |
Tavis Ormandy 开源了一个用于与 CEF Debugger 交互的工具 |
https://github.com/taviso/cefdebug |
None |
|
None |
None |
12 |
0 |
16 |
1500 |
1 |
C |
2700 |
225 |
Micropoor |
Micro8: PHP安全新闻早8点全部文档 |
https://github.com/Micropoor/Micro8 |
None |
|
None |
None |
2 |
0 |
60 |
1400 |
20 |
|
14500 |
5700 |
k8gege |
Ladon: 大型内网渗透扫描器&Cobalt Strike |
https://github.com/k8gege/Ladon |
https://k8gege.org |
|
USA |
FBI |
24 |
0 |
17 |
1400 |
1 |
C#,Python,PowerShell |
2300 |
1100 |
trimstray |
Linux 安全加固配置手册 |
https://github.com/trimstray/linux-hardening-checklist |
https://trimstray.github.io/ |
BIO_read(wbio, buf, 4096) |
Poland |
None |
15 |
0 |
892 |
1400 |
265 |
Shell |
21500 |
2100 |
skeeto |
endlessh - 一个伪造的 SSH 服务端,当攻击者连上后会不断收到 SSH Banner 信息以耗费时间 |
https://github.com/skeeto/endlessh |
https://nullprogram.com/ |
|
Maryland |
None |
217 |
0 |
175 |
1300 |
15 |
C,Emacs,C++ |
864 |
60 |
3gstudent |
A collection of pentest and development tips |
https://github.com/3gstudent/Pentest-and-Development-Tips |
https://3gstudent.github.io/ |
good in study,attitude and health |
None |
None |
99 |
0 |
159 |
1200 |
11 |
Python,C#,Batchfile,PowerShell,C++ |
431 |
158 |
jas502n |
CVE-2019-8451 JIRA未授权SSRF漏洞POC。 |
https://github.com/jas502n/CVE-2019-8451 |
https://twitter.com/jas502n |
1.misc 2.crypto 3. web 4. reverse 5. android 6. pwn 7. elf |
Hong Kong |
jas502n |
194 |
0 |
250 |
1200 |
149 |
C,Shell,Java,Objective-C++,Python,C#,PHP |
301 |
114 |
robertdavidgraham |
研究员 robertdavidgraham 基于 zerosum0x0 CVE-2019-0708 扫描器的代码和开源 rdesktop 项目,移植了一个可以在 macOS 和 Windows 编译的 CVE-2019-0708 扫描器 |
https://github.com/robertdavidgraham/rdpscan |
http://robertgraham.com |
|
@ErrataRob |
None |
37 |
0 |
0 |
1200 |
4 |
C |
9900 |
1600 |
smealum |
butthax: lovense hush buttplug exploit chain |
https://github.com/smealum/butthax |
http://smealum.net |
|
None |
None |
38 |
0 |
15 |
1200 |
2 |
C,Assembly |
468 |
137 |
mandatoryprogrammer |
tarnish - 针对 Chrome 扩展程序的静态分析工具: |
https://github.com/mandatoryprogrammer/tarnish |
https://thehackerblog.com/ |
><script src=https://y.vg></script> |
><script src=https://y.vg></script> |
><script src=https://y.vg></script> |
41 |
0 |
97 |
1100 |
18 |
Python,JavaScript,Dockerfile |
1400 |
208 |
Xyntax |
污染 TensorFlow模型: XCTF 2019 Final tfboys 命题思路 |
https://github.com/Xyntax/XCTF-2019-tfboys// |
https://www.cdxy.me |
Data Mining / Threat Hunting / Blue Team / CTF🧐 |
Hangzhou,China |
Alibaba Cloud |
53 |
0 |
320 |
1000 |
93 |
Python,HTML,JavaScript,PowerShell |
1300 |
647 |
jgamblin |
CarHackingTools: Install and Configure Common Car Hacking Tools. |
https://github.com/jgamblin/CarHackingTools |
https://www.jerrygamblin.com |
Researcher. Builder. Hacker. Traveler. Cedere Nescio. |
United States |
None |
65 |
0 |
0 |
1000 |
2 |
C,Shell |
0 |
0 |
unixpickle |
一款针对 Go 二进制和包的混淆工具 |
https://github.com/unixpickle/gobfuscate |
https://aqnichol.com |
Web developer, math geek, and AI enthusiast. |
San Francisco, CA |
None |
544 |
0 |
147 |
994 |
50 |
Python,Go,Objective-C,JavaScript |
590 |
175 |
fs0c131y |
CVE-2018-20555 - WordPress 插件 Social Network Tabs 泄漏 Twitter 账户配置的漏洞利用工具: |
https://github.com/fs0c131y/CVE-2018-20555 |
https://twitter.com/fs0c131y |
French security researcher. Worst nightmare of Oneplus, Wiko, UIDAI, Kimbho, Donald Daters and others. Not completely schizophrenic. Not related to USANetwork. |
None |
None |
11 |
0 |
0 |
960 |
0 |
Python,Kotlin |
543 |
118 |
Ridter |
CVE-2019-1040 从普通域账号到域管理员权限的利用脚本,利用的是Exchange账号进行 NTLM Relay 到 LDAP 然后给普通权限账号添加DCSYNC权限。 |
https://github.com/Ridter/CVE-2019-1040 |
https://evi1cg.me |
|
None |
None |
106 |
0 |
425 |
944 |
20 |
Python,C,C++ |
1900 |
404 |
vysecurity |
DomainFrontingLists: A list of Domain Frontable Domains by CDN |
https://github.com/vysecurity/DomainFrontingLists |
https://github.com/vysecurity |
@vysecurity |
Hong Kong |
SYON |
646 |
0 |
581 |
892 |
56 |
Python,C#,PowerShell |
761 |
194 |
Urinx |
browspy: 浏览器用户全部信息收集JavaScript |
https://github.com/Urinx/browspy |
https://urinx.github.io |
ペットの元気子犬 |
Wuhan, China |
Huazhong Univ of Sci & Tech |
40 |
0 |
61 |
866 |
11 |
Python,Swift |
0 |
0 |
EtherDream |
jsproxy: 一个基于浏览器端 JS 实现的在线代理 |
https://github.com/EtherDream/jsproxy |
None |
[Geeker, Hacker) |
Hangzhou, China |
0xA11BABA |
25 |
0 |
172 |
864 |
5 |
Shell,JavaScript |
3400 |
614 |
PaulSec |
Shodan.io Android版官方应用程序 |
https://github.com/PaulSec/Shodan.io-mobile-app/issues |
https://paulsec.github.io/ |
I cant promise anything but Ill do my best. |
France |
None |
93 |
0 |
503 |
811 |
26 |
Python |
2800 |
361 |
boy-hack |
w13scan: 被动扫描器 |
https://github.com/boy-hack/w13scan?from=timeline |
https://www.hacking8.com/ |
Hacking tools just for fun ~ |
china |
None |
29 |
0 |
118 |
809 |
15 |
Python,CSS |
797 |
287 |
tyranid |
James Forshaw 开源了一个攻击存在 CVE-2014-1806 / CVE-2014-4149 漏洞的 .NET Remoting Services 的工具 |
https://github.com/tyranid/ExploitRemotingService |
None |
|
None |
None |
32 |
0 |
0 |
806 |
2 |
C#,Python,C |
851 |
227 |
shmilylty |
OneForAll 一款功能强大的子域收集工具 |
https://github.com/shmilylty/OneForAll |
https://github.com/Qihoo360 |
Information security researcher, CTF enthusiast. |
Beijing, China |
@Qihoo360 |
108 |
0 |
992 |
753 |
116 |
Python,Go,JavaScript,HTML |
747 |
216 |
ismailtasdelen |
Red Team Hardware Toolkit |
https://github.com/ismailtasdelen/redteam-hardware-toolkit |
http://ismailtasdelen.com |
Hi, My name is Ismail Tasdelen. As a security researcher. Im working Penetration Tester at Ernst & Young. Remember to follow and support. Have a great day. 😇 |
Istanbul |
Ernst & Young |
97 |
0 |
783 |
733 |
467 |
Python,Shell,HTML |
591 |
164 |
xairy |
VMware 虚拟机逃逸相关的资料整理 |
https://github.com/xairy/vmware-exploitation |
https://andreyknvl.com/ |
|
None |
None |
29 |
0 |
0 |
727 |
14 |
Python,C |
2600 |
621 |
TideSec |
Web指纹识别技术研究与优化实现 |
https://github.com/TideSec/TideFinger/blob/master/Web%E6%8C%87%E7%BA%B9%E8%AF%86%E5%88%AB%E6%8A%80%E6%9C%AF%E7%A0%94%E7%A9%B6%E4%B8%8E%E4%BC%98%E5%8C%96%E5%AE%9E%E7%8E%B0.md |
http://www.TideSec.com |
一心不动,大巧不工。 |
China |
Tide |
21 |
0 |
207 |
726 |
23 |
C,Shell,Java,Python,PHP,Ruby |
947 |
341 |
0vercl0k |
一个对 Hyper-V WinHv API 的 python binding |
https://github.com/0vercl0k/pywinhv |
https://doar-e.github.com/ |
|
US/FR |
None |
16 |
0 |
7 |
719 |
0 |
Python,JavaScript,C++ |
773 |
160 |
zerosum0x0 |
研究员 zerosum0x0 公开 Windows RDP RCE CVE-2019-0708 漏洞的扫描器 |
https://github.com/zerosum0x0/CVE-2019-0708 |
https://zerosum0x0.blogspot.com |
|
USSA |
None |
83 |
0 |
23 |
697 |
2 |
Python,C#,C,C++ |
1300 |
362 |
SandboxEscaper |
SandboxEscaper公开了一个task scheduler服务未正确模拟client令牌导致LPE的0day。 |
https://github.com/SandboxEscaper/polarbearrepo |
None |
|
None |
None |
1 |
0 |
0 |
692 |
0 |
C++ |
157 |
88 |
clone95 |
Virgilio: Your new Mentor for Data Science E-Learning |
https://github.com/clone95/Virgilio |
None |
I graduated in Italy in IT Engineering, and im currently having my internship in a shiny AI startup. |
Bologna, Italy |
None |
22 |
0 |
35 |
685 |
29 |
Python,Jupyter,PowerShell |
0 |
0 |
lcatro |
一些阅读源码和 Fuzzing 的经验,涵盖黑盒与白盒测试 |
https://github.com/lcatro/Source-and-Fuzzing |
https://github.com/lcatro/my-blog |
Binary ,WEB vulnerability and Fuzzing Research .. |
China |
WeBank ,Tencent |
52 |
0 |
181 |
677 |
21 |
Python,PHP,Mask,C++ |
405 |
107 |
ChiChou |
RealWorldCTF 2019 Dezhou Insrumentz macOS 比赛题的源码 |
https://github.com/ChiChou/DezhouInstrumenz |
https://github.com/alipay |
我要卖掉我的代码 浪迹天涯 |
Beijing, China |
@alipay |
57 |
0 |
1500 |
665 |
252 |
Objective-C,Vue,JavaScript,C |
1200 |
170 |
infosecn1nja |
SharpDoor - Patch termsrv.dll 实现 RDP (Remote Desktop) Multi-Session 的支持 |
https://github.com/infosecn1nja/SharpDoor |
None |
Security Researcher/Red/Purple Teaming/Adversary Simulation/Threat Hunter. Contributors of Atomic Red Team, PS Empire, Mitre ATT&CK Framework, LOLBas, and more. |
Jakarta, Indonesia |
None |
32 |
0 |
656 |
643 |
71 |
Python,C#,Shell |
2600 |
739 |
vstinner |
Python Security - 记录 Python 历史漏洞及补丁版本信息的 Repo |
https://github.com/vstinner/python-security |
https://github.com/python |
I am paid by Red Hat to maintain Python upstream (python.org) and downstream (RHEL, Fedora). @python core-dev. |
France |
Red Hat |
32 |
0 |
7 |
642 |
0 |
Python |
299 |
34 |
Cyb3rWard0g |
OSSEM - 开源安全事件元数据,旨在定义和共享公共信息模型以改进安全事件日志的数据标准化: |
https://github.com/Cyb3rWard0g/OSSEM |
https://github.com/Cyb3rWard0g |
@Cyb3rWard0g |
None |
None |
10 |
0 |
19 |
636 |
2 |
Jupyter,PowerShell |
1400 |
336 |
vanhauser-thc |
AFL 的社区维护版 afl++ 发布 2.53c 版本 |
https://github.com/vanhauser-thc/AFLplusplus/releases/tag/2.53c |
https://www.mh-sec.de/ |
Security researcher since 1994 https://www.thc.org/ https://twitter.com/hackerschoice |
Berlin |
The Hackers Choice , mh-sec , me , myself |
22 |
0 |
33 |
630 |
19 |
C,HTML,C++ |
2900 |
841 |
Cryptogenic |
在 PS4 6.20 上的 WebKit 远程代码执行漏洞(CVE-2018-4441)利用 |
https://github.com/Cryptogenic/PS4-6.20-WebKit-Code-Execution-Exploit |
https://twitter.com/SpecterDev |
PHP/C++ developer with an interest in user-land and web exploitation. |
None |
None |
28 |
0 |
38 |
613 |
5 |
Go,C,JavaScript,HTML |
591 |
153 |
travisgoodspeed |
利用 GHIDRA 逆向 Tytera MD380 的固件 |
https://github.com/travisgoodspeed/md380tools/wiki/GHIDRA |
None |
|
None |
None |
31 |
0 |
35 |
593 |
24 |
Python,C,C++ |
593 |
190 |
c0ny1 |
xxe-lab: 各种语言版本的XXE漏洞Demo |
https://github.com/c0ny1/xxe-lab |
http://gv7.me |
漏洞在牛角尖上 |
None |
None |
13 |
0 |
271 |
583 |
12 |
Python,Shell,PHP,Java |
1200 |
307 |
dxa4481 |
结合 Oauth 进行 XSS 的高级利用以实现对目标的持久化访问: |
https://github.com/dxa4481/XSSOauthPersistence |
https://security.love |
Full stack hacker |
USA |
None |
83 |
0 |
22 |
550 |
4 |
Python,HTML,JavaScript |
3600 |
444 |
fdiskyou |
用于枚举进程 Mitigation 状态的 WinDbg 调试器插件 |
https://github.com/fdiskyou/iris |
http://deniable.org |
Shut Up and Hack. |
London, UK |
None |
65 |
0 |
125 |
547 |
28 |
Python,C,C++ |
862 |
258 |
danielbohannon |
Revoke-Obfuscation: PowerShell Obfuscation Detection Framework |
https://github.com/danielbohannon/Revoke-Obfuscation |
http://danielbohannon.com |
Principal Applied Security Researcher (prev IR Consultant) |
Washington, D.C. |
Mandiant |
7 |
0 |
0 |
533 |
5 |
PowerShell |
1300 |
345 |
zodiacon |
Windows 系统查看 Job 对象的工具 |
https://github.com/zodiacon/JobExplorer |
http://scorpiosoftware.net |
|
Israel |
None |
58 |
0 |
107 |
528 |
9 |
C#,C,C++ |
733 |
218 |
mame82 |
Logitech Unifying Vulnerabilities |
https://github.com/mame82/UnifyingVulnsDisclosureRepo/tree/master/vulnerability_reports |
https://www.twitter.com/mame82 |
|
None |
None |
69 |
0 |
44 |
509 |
17 |
Python,Go,C,JavaScript |
2500 |
517 |
Ekultek |
BlueKeep - Ekultek 研究员公开 Windows RDP CVE-2019-0708 RCE PoC |
https://github.com/Ekultek/BlueKeep |
None |
U3VjY2VzcyBpcyBpbiB0aGUgZXllIG9mIHRoZSBiZWhvbGRlci4= |
None |
None |
89 |
0 |
122 |
497 |
11 |
Python,C++ |
3700 |
952 |
elfmaster |
dsym_obfuscate - 一款加密动态符号表,并在运行时恢复的工具 : |
https://github.com/elfmaster/dsym_obfuscate |
http://www.bitlackeys.org |
Order of operation: Consciousness/Meditation Family Creativity, coding, hacking, reversing, security |
Seattle |
Leviathan |
25 |
0 |
19 |
483 |
15 |
C,Objective-C,C++ |
192 |
45 |
0x27 |
Cisco RV320 的 Dump 配置和远程 RCE 的漏洞利用: |
https://github.com/0x27/CiscoRV320Dump |
http://0x27.me/ |
|
EIP |
None |
77 |
0 |
3000 |
475 |
34 |
Python,Go,C |
397 |
220 |
tanjiti |
sec_profile: 分析安全信息站点、安全趋势、安全工作者账号 |
https://github.com/tanjiti/sec_profile |
http://tanjiti.com/ |
#Network Security Monitor #threat intelligence #waf #ids #iOS App Security #Android App Security #game security |
shanghai |
baidu |
16 |
0 |
4 |
470 |
166 |
Python,PHP,HTML,Perl |
0 |
0 |
xerub |
voucher_swap - Exploit for P0 issue 1731 on iOS 12.1.2 |
https://github.com/xerub/voucher_swap |
None |
|
None |
None |
29 |
0 |
0 |
447 |
0 |
Python,C |
191 |
86 |
Lucifer1993 |
cmsprint: CMS和中间件指纹库 |
https://github.com/Lucifer1993/cmsprint |
None |
安全圈职业炮灰 |
None |
None |
25 |
0 |
315 |
444 |
25 |
Python,Ruby |
897 |
403 |
jakeajames |
Patchfinders for offsets used in bazads PAC bypass |
https://github.com/jakeajames/jelbrekLib/blob/master/patchfinder64.m |
None |
A random guy on the internet. |
Antartica |
None |
68 |
0 |
4 |
439 |
7 |
Logos,C |
291 |
133 |
We5ter |
开源powershell CMD bash命令混淆检测工具 |
https://github.com/We5ter/Flerken |
https://lightrains.org |
You are being watched. Anywhere. Anytime. |
Chengdu,China |
None |
11 |
0 |
1200 |
426 |
108 |
Python,CSS |
0 |
0 |
LandGrey |
Kibana CVE-2019-7609 RCE Exploit |
https://github.com/LandGrey/CVE-2019-7609/ |
https://landgrey.me |
I learn cyber sec |
Earth |
None |
15 |
0 |
1100 |
425 |
44 |
Python,ASP |
1000 |
285 |
secrary |
Dr.Semu - Malware Detection and Classification Tool Based on Dynamic Behavior |
https://github.com/secrary/DrSemu |
https://secrary.com |
@_qaz_qaz |
https://keybase.io/khasaia |
None |
19 |
0 |
200 |
393 |
20 |
Python,C++ |
871 |
186 |
sebastienros |
Jint - Javascript interpreter for .NET,在 Javascript 中运行 .NET 平台的代码 |
https://github.com/sebastienros/jint |
http://about.me/sebastienros |
|
Bellevue, WA |
Microsoft |
61 |
0 |
10 |
378 |
0 |
C# |
2600 |
902 |
rasta-mouse |
Watson - 用于探测 Windows 环境缺失补丁枚举可利用本地提权漏洞的工具 |
https://github.com/rasta-mouse/Watson/tree/2.0 |
https://github.com/ZeroPointSecurity |
|
None |
@ZeroPointSecurity |
20 |
0 |
58 |
373 |
7 |
C#,PowerShell |
0 |
0 |
Kevin-Robertson |
Windows网络协议层攻击套件包括 SMB LLMNR NBNS mDNS DNS |
https://github.com/Kevin-Robertson/InveighZero |
https://github.com/NetSPI |
|
None |
@NetSPI |
7 |
0 |
226 |
364 |
8 |
C#,PowerShell |
929 |
231 |
xorrior |
CobaltStrike 基于 WebSockets 的 C2 远控组件 |
https://github.com/xorrior/raven |
https://www.xorrior.com |
PowerShell, C#, Obj-C, macOS Security, Red Team Operator |
None |
SpecterOps |
53 |
0 |
93 |
363 |
9 |
C#,Objective-C,PowerShell,C++ |
358 |
82 |
mjg59 |
mjg59 为 Linux 内核提交了一个 Patch,支持用户态请求内核清空引用计数为 0 的内存页,防止重要密钥信息在进程崩溃、内存换页等场景下被泄漏。 |
https://github.com/mjg59/linux/commit/cd2bb1eb23ededafc2f301f8bc5561523daa96e6 |
https://github.com/google |
|
Oakland |
@google |
73 |
0 |
2 |
356 |
0 |
Python,C |
632 |
250 |
404notf0und |
2018-2020青年安全圈-活跃技术博主/博客 |
https://github.com/404notf0und/Security-Data-Analysis-and-Visualization |
https://www.4o4notfound.org |
欢迎关注公众号:404 Not F0und,专注于Cyber-Security-Data-Analysis |
Hangzhou,China |
Ant Financial |
14 |
0 |
72 |
350 |
16 |
TSQL,Jupyter |
520 |
121 |
Dliv3 |
Venom - A Multi-hop Proxy for Penetration Testers |
https://github.com/Dliv3/Venom |
https://twitter.com/D1iv3 |
BUPT , CTF , 天枢(Dubhe) , Tencent Security Xuanwu Lab |
China, Beijing |
BUPT |
59 |
0 |
1200 |
348 |
176 |
Go,C,JavaScript,Java,PowerShell |
3200 |
1200 |
leebaird |
基于 Metasploit 写的一款自动化渗透测试工具 |
https://github.com/leebaird/discover |
None |
|
None |
None |
3 |
0 |
49 |
344 |
2 |
Python,Shell,PHP |
1700 |
515 |
xoofx |
基于 .NET 写的一个 C/C++ Parser 工具,可以得到 full AST、macros 信息 |
https://github.com/xoofx/CppAst |
https://github.com/Unity-Technologies |
|
Grenoble - France |
@Unity-Technologies |
58 |
0 |
209 |
339 |
19 |
C# |
1500 |
417 |
tunz |
JavaScript Engine (V8、ChakraCore、JavaScriptCore、SpiderMonkey、JScript) 多个漏洞的 POC 合集: |
https://github.com/tunz/js-vuln-db |
http://tunz.kr |
|
South Korea |
None |
11 |
0 |
68 |
331 |
61 |
Python,Haskell,Rust |
0 |
0 |
caseysmithrc |
在 Windows Script Hosts 的上下文中执行任意 .NET 汇编代码,来自 DerbyCon2019 |
https://github.com/caseysmithrc/DerbyCon2019 |
None |
|
None |
None |
234 |
0 |
7 |
330 |
0 |
C,C#,C++,F#,Go,PHP,Ruby,PowerShell |
55 |
25 |
grayddq |
GScan: Linux主机侧Checklist的自动全面化检测 |
https://github.com/grayddq/GScan |
None |
一位喜欢原创的安全工作者! |
None |
None |
14 |
0 |
0 |
327 |
0 |
Python |
305 |
99 |
hannob |
Apache 不准备修复的 UAF 漏洞公开: |
https://github.com/hannob/apache-uaf/ |
https://hboeck.de/ |
|
Berlin |
None |
79 |
0 |
2 |
318 |
2 |
Python,Shell,PHP |
1400 |
150 |
Tuhinshubhra |
ExtAnalysis: Browser Extension Analysis Framework |
https://github.com/Tuhinshubhra/ExtAnalysis |
https://twitter.com/r3dhax0r |
I code and hack for fun! |
... |
None |
13 |
0 |
2 |
316 |
0 |
Python,PHP,JavaScript,CSS |
0 |
0 |
0x4D31 |
大规模网络指纹探测与数据聚类分析,作者利用网络指纹信息追踪攻击者及攻击工具,同时发布了一个工具 FATT。来自 AusCERT 2019 会议 |
https://github.com/0x4D31/Presentations |
https://github.com/salesforce |
Lead Threat Detection Engineer @salesforce |
Sydney, Australia |
None |
21 |
0 |
1100 |
307 |
77 |
Python,Go |
793 |
164 |
piglei |
Python 工匠 |
https://github.com/piglei/one-python-craftsman |
http://www.zlovezl.cn |
A Python programmer who enjoys writing and reading beautiful codes. Also coding in Go, JavaScript. |
ShenZhen, China |
Tencent |
24 |
0 |
1400 |
301 |
93 |
Python,Go,JavaScript |
730 |
106 |
rvrsh3ll |
将 shellcode 隐藏在资源文件中再通过 CPL 加载执行的POC |
https://github.com/rvrsh3ll/CPLResourceRunner |
None |
I hack code together and hope it works. |
NOVA |
None |
118 |
0 |
19 |
299 |
9 |
Python,C#,HTML,PowerShell |
377 |
114 |
ExpLife0011 |
CVE-2019-0803: Win32k Elevation of Privilege Poc |
https://github.com/ExpLife0011/CVE-2019-0803 |
None |
|
None |
None |
2800 |
0 |
3000 |
288 |
489 |
Python,C#,C,Assembly,C++ |
672 |
227 |
dirkjanm |
Kerberos unconstrained delegation abuse toolkit |
https://github.com/dirkjanm/krbrelayx |
None |
|
The Netherlands |
None |
19 |
0 |
11 |
281 |
1 |
Python |
0 |
0 |
phantom0301 |
PTEye: 代理黑盒漏洞审计工具 |
https://github.com/phantom0301/PTEye |
http://phantom0301.github.io/ |
Free and Share |
Chengdu |
None |
80 |
0 |
32 |
279 |
10 |
Python,JavaScript,PowerShell |
81 |
9 |
mpgn |
Apache Solr RCE POC(CVE-2019-0192) |
https://github.com/mpgn/CVE-2019-0192/ |
https://github.com/QuokkaLight |
̿ ̿̿̿\̵͇̿̿=(•̪●)=/̵͇̿̿/̿̿ ̿ ̿ ̿ |
Paris |
@QuokkaLight |
38 |
0 |
154 |
278 |
14 |
Python,HTML,Ruby |
0 |
0 |
al0ne |
Suricata安装部署&丢包优化&性能调优&规则调整&Pfring设置 |
https://github.com/al0ne/suricata_optimize |
None |
Emergency response, security analysis |
United States |
None |
13 |
0 |
613 |
272 |
225 |
Python,Dockerfile,Shell,Makefile |
793 |
230 |
zer0yu |
Berserker-针对Pentest或者CTF的一个fuzz payload项目 |
https://github.com/zer0yu/Berserker |
http://zeroyu.xyz/ |
Red Team@PolarisLab / CTFer->Web@LZ |
None |
None |
34 |
0 |
2300 |
268 |
1300 |
Python,HTML,CSS |
292 |
43 |
pasta-auto |
丰田公司开发了一套汽车ECU系统的测试工具,包含软件和硬件,repo里面有这套工具的相关介绍,目前应该是在售的状态。 |
https://github.com/pasta-auto/PASTA1.0 |
None |
|
None |
None |
1 |
0 |
0 |
262 |
0 |
C |
49 |
11 |
7kbstorm |
7kbscan-WebPathBrute Web路径暴力探测工具 |
https://github.com/7kbstorm/7kbscan-WebPathBrute |
https://www.7kb.org |
Red Team |
None |
None |
27 |
0 |
2 |
261 |
0 |
C++,XSLT |
220 |
67 |
bettenW |
2019腾讯广告算法大赛完整代码(冠军) |
https://github.com/bettenW/Tencent2019_Finals_Rank1st |
http://zhuanlan.zhihu.com/DataAI |
鱼遇雨欲语与余 |
China, Beijing |
京东集团,算法工程师 |
12 |
0 |
46 |
260 |
6 |
Python,Jupyter |
235 |
83 |
RUB-SysSec |
Fuzz中一个常见问题是Checksum或者Magic Value,以前的方法大多是通过符号执行的方法去求解约束,但这样的方法比较复杂。Redqueen这篇文章提出了一种更为简单的思路,即基于VMI来获取比较指令或者函数调用指令的参数,用这个参数来指导变异。具体实现依赖Intel PT。 |
https://github.com/RUB-SysSec/redqueen |
https://syssec.rub.de |
|
Bochum, Germany |
Ruhr-University Bochum |
25 |
0 |
0 |
254 |
0 |
Python,C,Rust |
390 |
105 |
WyAtu |
Perun: 网络资产漏洞扫描器/扫描框架 |
https://github.com/WyAtu/Perun |
None |
Security Researcher |
None |
None |
12 |
0 |
14 |
251 |
8 |
Python,C |
343 |
155 |
rk700 |
之前推过AFL-Unicorn项目可以让AFL fuzz能用Unicorn模拟的闭源binary,这个uniFuzzer项目很类似,是要把libfuzzer应用在闭源binary上 |
https://github.com/rk700/uniFuzzer// |
http://rk700.github.io |
|
None |
None |
18 |
0 |
57 |
248 |
2 |
Python,C,Java |
606 |
161 |
maddiestone |
Maddie Stone 在 Jailbreak Security Summit 会议关于 Whats App 0Day 漏洞分析的 PPT |
https://github.com/maddiestone/ConPresentations/blob/master/Jailbreak2019.WhatsUpWithWhatsApp.pdf |
http://twitter.com/maddiestone |
|
None |
None |
4 |
0 |
2 |
242 |
1 |
Python |
524 |
105 |
meitar |
Awesome Cybersecurity Blue Team - 蓝队防御相关的工具、文章资料收集 |
https://github.com/meitar/awesome-cybersecurity-blueteam |
https://web.archive.org/web/20190206200948/https://maymay.net/blog/2019/02/06/why-i-am-publicly-disassociating-myself-from-the-recurse-center/ |
⚑ Ⓐnti-capitalist Free Software developer, pro white genocide, abolish all prisons, 0xACAB ⚑ |
https://cyberbusking.org/ |
Code signing GPG key: C42F 2F04 C42D 489E 23DD 71CE 07EF AA28 AB94 BC85 |
196 |
0 |
48 |
240 |
0 |
Shell,PHP,HTML |
398 |
44 |
staaldraad |
Git Fetch 相关的漏洞利用研究(CVE-2018-11235 & CVE-2018-16873) |
https://github.com/staaldraad/troopers19/ |
https://github.com/heroku |
|
None |
@heroku |
38 |
0 |
5 |
236 |
4 |
Go,Python,HTML |
1200 |
473 |
cobbr |
SharpSploit - C# 语言编写的基于 .NET 的后渗透测试工具 |
https://github.com/cobbr/SharpSploit |
https://cobbr.io |
|
Dallas, TX |
SpecterOps |
17 |
0 |
48 |
230 |
1 |
C#,PowerShell |
570 |
89 |
gh0stkey |
PoCBox - 漏洞测试验证辅助平台 |
https://github.com/gh0stkey/PoCBox |
https://gh0st.cn |
天行健,君子以自强不息;地势坤,君子以厚德载物。 |
China |
米斯特安全团队 |
13 |
0 |
103 |
229 |
13 |
Python,PHP,HTML |
358 |
98 |
Viralmaniar |
PeekABoo - 渗透测试中,利用 PowerShell remoting 开启目标主机远程桌面的工具 |
https://github.com/Viralmaniar/PeekABoo |
https://twitter.com/maniarviral |
|
Melbourne, Victoria, Australia |
None |
37 |
0 |
223 |
228 |
93 |
Python,Shell,JavaScript |
737 |
112 |
mgeeky |
Stracciatella - Bypass AMSI 和 Script Block Logging 加载执行 PowerShell 脚本的工具 |
https://github.com/mgeeky/Stracciatella |
https://www.linkedin.com/in/mariuszban/ |
Sencha-inspired Offensive Security engineer, doing heaps of penetration testings, packet craftings, reverse engineering and exploits/tools development. |
None |
None |
52 |
0 |
1100 |
225 |
77 |
Python,C#,PowerShell,C++ |
225 |
66 |
yeyintminthuhtut |
Browser、Mitigation 、Kernel 等漏洞利用相关研究 |
https://github.com/yeyintminthuhtut/Awesome-Advanced-Windows-Exploitation-References |
http://pentest.space |
Twitter @yeyint_mth |
Singapore |
None |
287 |
0 |
477 |
223 |
19 |
Shell |
0 |
0 |
neal1991 |
2019年针对API安全的4点建议 |
https://github.com/neal1991/articles-translator/blob/master/2019%E5%B9%B4%E9%92%88%E5%AF%B9API%E5%AE%89%E5%85%A8%E7%9A%844%E7%82%B9%E5%BB%BA%E8%AE%AE.md |
https://madneal.com |
Obviously, I am cool. |
Shanghai |
ECNU |
96 |
0 |
514 |
222 |
58 |
Python,Shell,JavaScript,Java,HTML |
0 |
0 |
Bypass007 |
Safety-Project-Collection: 收集一些比较优秀的开源安全项目 |
https://github.com/Bypass007/Safety-Project-Collection |
None |
欢迎关注公众号Bypass--,专注于信息安全。 |
Xiamen, China |
None |
4 |
0 |
4 |
221 |
0 |
Java |
1100 |
274 |
bcoles |
bcoles 收集的 Linux 内核 Exploits |
https://github.com/bcoles/kernel-exploits |
https://itsecuritysolutions.org |
rm -rf /* |
rm -rf /* |
rm -rf /* |
29 |
0 |
62 |
217 |
19 |
Python,C,Shell,Ruby |
17100 |
8400 |
hlldz |
APC-PPID - 通过 APC 注入创建进程并伪造父进程的项目 |
https://github.com/hlldz/APC-PPID |
https://artofpwn.com |
Pwner, Red Teamer |
İstanbul, Türkiye |
None |
5 |
0 |
179 |
214 |
22 |
Python,PowerShell,C++ |
691 |
159 |
pyn3rd |
Apache Tomcat 远程代码执行漏洞(CVE-2019-0232),可以通过 Windows enableCmdLineArguments 触发 |
https://github.com/pyn3rd/CVE-2019-0232/ |
https://twitter.com/pyn3rd |
|
Hangzhou |
Alibaba Group |
7 |
0 |
0 |
210 |
0 |
Python,Batchfile,Java |
118 |
46 |
gamozolabs |
mesos - Windows 下的二进制代码覆盖调试工具: |
https://github.com/gamozolabs/mesos |
None |
|
None |
None |
25 |
0 |
2 |
203 |
0 |
C,Assembly,C++,Rust |
293 |
32 |
h2hconference |
Hackers to Hackers(H2HC) 2019 会议的议题 PPT 公开了 |
https://github.com/h2hconference/2019 |
https://www.h2hc.com.br |
Hackers To Hackers Conference (H2HC) é uma conferência organizada por pessoas que trabalham ou que estão diretamente envolvidas com pesquisas e desenvolvimento |
Brazil |
H2HC |
18 |
0 |
0 |
203 |
0 |
Python,HTML |
50 |
12 |
zjlywjh001 |
披露一种针对W-IFI WPA/WPA2协议的MOTS(Man-On-The-Side)的攻击方式 |
https://github.com/zjlywjh001/CanSecWest19 |
https://www.jarviswang.me/ |
|
None |
None |
52 |
0 |
5 |
202 |
0 |
C,JavaScript,Java |
0 |
0 |
wonderkun |
CTFENV: 为应对CTF比赛而搭建的各种环境 |
https://github.com/wonderkun/CTFENV |
None |
|
None |
None |
70 |
0 |
410 |
199 |
152 |
Python,C,PHP,Dockerfile |
454 |
150 |
1522402210 |
一套 webkit 完整 rce 的详细分析 (render rce+sbx) |
https://github.com/1522402210/Issue-198327 |
None |
BlockChain Fans |
None |
None |
599 |
0 |
3800 |
198 |
1700 |
Python,Go,PowerShell,C++ |
289 |
111 |
drk1wi |
Modlishka - 一款灵活且功能强大的反向代理工具 : |
https://github.com/drk1wi/Modlishka |
https://twitter.com/drk1wi |
|
None |
None |
37 |
0 |
87 |
196 |
3 |
Go,Swift,Makefile |
0 |
0 |
ustayready |
fireprox - AWS API Gateway 管理工具,用于动态创建 HTTP 传递代理以实现唯一的 IP 轮换 |
https://github.com/ustayready/fireprox |
None |
divergent thinker/breaker and researcher of stuff |
None |
None |
39 |
0 |
7 |
194 |
7 |
Python,C#,HTML |
702 |
147 |
bkerler |
OPPO和一加手机的.ozip固件解密工具 |
https://github.com/bkerler/oppo_ozip_decrypt |
https://twitter.com/viperbjk |
Reverse Engineer and Data/Crypto Analyst |
Germany |
RevSkills |
313 |
0 |
2 |
193 |
13 |
Python,C,Shell,CSS,C++ |
526 |
94 |
ouqiang |
gocron: 定时任务管理系统 |
https://github.com/ouqiang/gocron |
None |
to be a better man |
Xiamen, China |
None |
12 |
0 |
106 |
186 |
1 |
Go,PHP |
1900 |
433 |
13o-bbr-bbq |
机器学习与安全相关的一些资料汇总 |
https://github.com/13o-bbr-bbq/machine_learning_security |
None |
Im an engineer, Machine Learning hacker and CISSP. Speaker at Black Hat Arsenal, DEFCON Demo Labs/AI Village, Pycon, CODE BLUE etc., |
Tokyo, Japan. |
None |
9 |
0 |
25 |
185 |
1 |
Python |
875 |
319 |
kpcyrd |
Sn0int - 半自动 OSINT 框架和包管理器: |
https://github.com/kpcyrd/sn0int |
None |
/waɪrd/ |
Hamburg, Germany |
None |
220 |
0 |
660 |
185 |
180 |
Ruby,Assembly,Rust |
0 |
0 |
matteyeux |
用于加载 Apple SecureROM 的 IDA 插件 |
https://github.com/matteyeux/srom64helper |
https://github.com/alterway |
Sysadmin. Sometimes I write code |
Paris |
@alterway |
107 |
0 |
115 |
184 |
136 |
Python,C |
10 |
4 |
JohnLaTwC |
Malware PowerShell shellcode analysis |
https://github.com/JohnLaTwC/Shared/blob/master/notebooks/Malware%20PowerShell%20shellcode%20analysis.ipynb |
https://github.com/JohnLaTwC |
@JohnLaTwC Distinguished Engineer and General Manager, Microsoft Threat Intelligence Center |
None |
Microsoft Corporation |
16 |
0 |
3 |
182 |
1 |
Python,Visual,HTML,Jupyter |
172 |
37 |
DrDonk |
Patch VMware ESXi 以支持 VMware 安装 macOS 系统的工具,支持 VMware ESXi 6.5 and 6.7 |
https://github.com/DrDonk/esxi-unlocker |
None |
|
None |
None |
14 |
0 |
0 |
180 |
0 |
Python,C,Shell,JavaScript |
902 |
179 |
olafhartong |
Sysmon 监控手册,用一张图介绍了各个 Event ID 及其附属字段的含义 |
https://github.com/olafhartong/sysmon-cheatsheet |
http://olafhartong.nl |
|
The Netherlands |
None |
51 |
0 |
61 |
164 |
4 |
Python,Shell,Batchfile,PowerShell,C# |
489 |
73 |
m1ghtym0 |
browser-pwn - 针对浏览器漏洞利用的资源合集 : |
https://github.com/m1ghtym0/browser-pwn |
None |
|
None |
None |
17 |
0 |
85 |
159 |
12 |
Python,C |
0 |
0 |
rockbruno |
swiftshield - Swift/OBJ-C 代码混淆工具 |
https://github.com/rockbruno/swiftshield |
https://github.com/ifood |
Software Engineer (iOS) at @ifood, Writer https://swiftrocks.com |
Brazil |
@ifood |
41 |
0 |
15 |
159 |
0 |
Java,Ruby,Swift,C++ |
48700 |
7800 |
secgroundzero |
tetanus: Helper script for mangling CS payloads |
https://github.com/secgroundzero/tetanus |
None |
|
None |
None |
10 |
0 |
4 |
157 |
7 |
Python,C#,JavaScript,Shell |
2100 |
285 |
woj-ciech |
woj-ciech/LeakLooker: Find open databases with Shodan |
https://github.com/woj-ciech/LeakLooker |
None |
|
None |
None |
11 |
0 |
0 |
156 |
0 |
Python,Go |
747 |
101 |
TheKingOfDuck |
MySQLMonitor: MySQL实时监控工具(黑盒测试辅助工具) |
https://github.com/TheKingOfDuck/MySQLMonitor |
https://xz.aliyun.com/u/12470 |
贵州白马汇会所头牌,服务热线:https://xz.aliyun.com/u/12470 |
None |
GIT |
34 |
0 |
7 |
151 |
4 |
Python,JavaScript |
261 |
86 |
exodusintel |
CVE-2019-5786 FileReader Exploit |
https://github.com/exodusintel/CVE-2019-5786/ |
http://www.exodusintel.com |
|
Austin, TX |
Exodus Intelligence |
6 |
0 |
0 |
151 |
0 |
Python,JavaScript |
220 |
65 |
vngkv123 |
Chrome V8 中类型错误导致的越界读写漏洞(CVE-2019-5782)与利用介绍: |
https://github.com/vngkv123/aSiagaming/tree/master/Chrome-v8-906043 |
https://twitter.com/vngkv123 |
Browser Exploitation, iOS Jailbreak, Linux Kernel Exploitation :-) @@ Jusun-Lee in Korea, Republic of |
None |
ReverseLab, Aegis |
71 |
0 |
245 |
151 |
22 |
Python,C,JavaScript |
0 |
0 |
jesusprubio |
Awesome Node.js for penetration testers |
https://github.com/jesusprubio/awesome-nodejs-pentest |
https://github.com/IBMResearch |
|
A Coruña |
@IBMResearch |
37 |
0 |
2500 |
148 |
75 |
TypeScript,JavaScript,Rust |
0 |
0 |
v-p-b |
卡巴斯基本地提权 Exploit 代码 |
https://github.com/v-p-b/kaspy_toolz/blob/master/virsli.py |
http://blog.silentsignal.eu |
|
None |
Silent Signal |
49 |
0 |
123 |
148 |
43 |
Python,Java,Ruby |
84 |
35 |
monoxgas |
BlackHat USA 会议上有一个关于 C&C(命令控制)技术的议题,作者最近将相关的工具也公开了 |
https://github.com/monoxgas/FlyingAFalseFlag |
None |
|
Utah, United States |
Silent Break Security |
16 |
0 |
31 |
145 |
1 |
C#,Python,PowerShell,C++ |
488 |
143 |
LinusHenze |
KeySteal是一个针对macOS<=10.14.3 Keychain漏洞利用程序,允许在没有用户提示的情况下访问Keychain中的密码。 |
https://github.com/LinusHenze/Keysteal |
None |
|
Germany |
None |
5 |
0 |
0 |
143 |
0 |
C,JavaScript,Objective-C,C++ |
321 |
86 |
alphaSeclab |
Awesome Forensics Resources - 安全取证分析相关的工具和资料收集 |
https://github.com/alphaSeclab/awesome-forensics |
None |
|
None |
None |
11 |
0 |
23 |
141 |
0 |
|
1300 |
185 |
bkth |
bkth在SSTIC 2019上演讲《A tale of Chakra bugs through the years》,详细讲解了微软Edge浏览器脚本引擎ChakraCore的各种漏洞。 |
https://github.com/bkth/Tale-Of-Chakra-Bugs |
https://twitter.com/bkth_ |
Security Researcher, CTF player, I like JavaScript but probably not in the same way as most people ;) |
France |
None |
14 |
0 |
15 |
138 |
3 |
Python,C,JavaScript |
76 |
14 |
houjingyi233 |
houjingyi233/CPU-vulnerabiility-collections |
https://github.com/houjingyi233/CPU-vulnerabiility-collections |
http://houjingyi233.com |
security researcher wechat:aG91amluZ3lpMTU5 |
None |
None |
20 |
0 |
713 |
135 |
1 |
Visual,Java,C++ |
124 |
56 |
xuechiyaobai |
Pwn2Own 2019 Firefox 远程代码执行漏洞(CVE-2019-9810)的 POC |
https://github.com/xuechiyaobai/CVE-2019-9810-PoC/ |
None |
|
None |
None |
22 |
0 |
143 |
135 |
25 |
C,HTML,JavaScript,C++ |
108 |
30 |
lazyparser |
SpiderMonkey Internals - SpiderMonkey JavaScript 引擎学习相关的笔记 |
https://github.com/lazyparser/spidermonkey-internals |
http://lazyparser.com |
|
None |
None |
48 |
0 |
199 |
134 |
62 |
HTML |
93 |
53 |
citronneur |
volatility-wnf - 浏览并 Dump Windows Notification Facilities 的工具: |
https://github.com/citronneur/volatility-wnf |
https://github.com/airbus-cert |
|
Toulouse, France |
@airbus-cert |
21 |
0 |
210 |
131 |
79 |
Python,C#,JavaScript |
1000 |
243 |
djhohnstein |
CSharpSetThreadContext - 由 C# 开发的通过 CreateRemoteThread 和 SetThreadContext 执行shellcode 以逃避 Get-InjectedThread 检测的工具 |
https://github.com/djhohnstein/CSharpSetThreadContext |
https://popeax.io |
Operator at SpecterOps. Kali Contributor. |
Seattle, WA |
None |
48 |
0 |
5 |
130 |
2 |
C# |
154 |
35 |
kkamagui |
Shadow-box - 基于虚拟化技术实现的一个轻量级的 Linux 操作系统监控框架 |
https://github.com/kkamagui/shadow-box-for-x86 |
http://kkamagui.github.io |
Researcher. USENIX Security, HITBSecConf, Black Hat, beVX, KIMCHICON Speaker. Linux Kernel Contributor. Author of 64-bit multicore OS principles and structure. |
South Korea |
National Security Research Institute of South Korea |
34 |
0 |
32 |
128 |
2 |
Python,C |
138 |
34 |
masatokinugawa |
浏览器 XSS Filter 绕过速查表 : |
https://github.com/masatokinugawa/filterbypass/wiki/Browsers-XSS-Filter-Bypass-Cheat-Sheet |
http:///////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////twitter.com/kinugawamasato |
|
None |
None |
6 |
0 |
0 |
122 |
0 |
Python,HTML,JavaScript,C++ |
616 |
120 |
a13xp0p0v |
Linux 内核漏洞利用开发实验项目 |
https://github.com/a13xp0p0v/kernel-hack-drill |
https://twitter.com/a13xp0p0v |
Linux Kernel Developer & Security Researcher |
None |
None |
5 |
0 |
0 |
119 |
3 |
Python,Go,C,HTML |
436 |
44 |
milabs |
awesome-linux-rootkits - Linux 平台 Rootkits 相关的资料收集 |
https://github.com/milabs/awesome-linux-rootkits |
None |
Linux kernel addict, security researcher, reverse engineer |
Russia, Moscow |
None |
27 |
0 |
440 |
119 |
71 |
C |
282 |
48 |
bitsadmin |
Windows 漏洞利用辅助工具 |
https://github.com/bitsadmin/wesng |
None |
|
Netherlands |
None |
9 |
0 |
4 |
118 |
0 |
C#,Python,Visual,Batchfile |
0 |
0 |
ChaitanyaHaritash |
生成畸形debian安装包的工具 |
https://github.com/ChaitanyaHaritash/kimi |
None |
Im just someone, to whom it might take you time to understand :) |
lost |
None |
63 |
0 |
356 |
116 |
105 |
Python,C,C++ |
46 |
27 |
HiddenStrawberry |
中国爬虫违法违规案例汇总 |
https://github.com/HiddenStrawberry/Crawler_Illegal_Cases_In_China |
None |
资深前爬虫行业从业者 合作微信 hiddenstrawberry(备注Github) |
Beijing/Shenyang/Tianjin |
YiduCloud |
22 |
0 |
13 |
116 |
5 |
Python,HTML |
914 |
151 |
4B5F5F4B |
研究员 4B5F5F4B 为 Hyper-V RCE(CVE-2017-007) 漏洞写的 PoC |
https://github.com/4B5F5F4B/HyperV |
None |
|
None |
None |
20 |
0 |
508 |
114 |
80 |
Shell,C,HTML,C++ |
125 |
51 |
imthenachoman |
How-To-Secure-A-Linux-Server |
https://github.com/imthenachoman/How-To-Secure-A-Linux-Server |
None |
|
None |
None |
12 |
0 |
13 |
111 |
11 |
Shell,JavaScript,HTML |
9100 |
492 |
blankwall |
OSX Privileged Helper Tool: |
https://github.com/blankwall/Offensive-Con/blob/master/OffCon.pdf |
None |
|
None |
None |
13 |
0 |
12 |
110 |
0 |
Python,C,Assembly,C++ |
308 |
34 |
kmkz |
渗透测试备忘清单分享: |
https://github.com/kmkz/Pentesting?files=1 |
http://www.linkedin.com/in/jean-marie-bourbon |
|
Grevenmacher (LU) |
None |
11 |
0 |
21 |
110 |
12 |
Python,Assembly,PowerShell,Perl |
0 |
0 |
guedou |
为 Ghidra 逆向框架提供对东芝 MeP-c4 处理器架构的支持,源文件 |
https://github.com/guedou/ghidra-processor-mep |
None |
|
Paris, France |
None |
29 |
0 |
73 |
108 |
0 |
Python,OCaml |
3900 |
881 |
enovella |
APKiD - APK 样本自我防护(加壳、混淆)产品的识别,来自 NowSecure 研究员 Eduardo Novella |
https://github.com/enovella/cve-bio-enovella/blob/master/slides/APKiD-NowSecure-Connect19-enovella.pdf |
https://github.com/nowsecure |
Mobile Security Researcher |
London, UK |
@nowsecure |
140 |
0 |
86 |
106 |
54 |
Python,C,JavaScript,Java |
95 |
19 |
brainsmoke |
ptrace-burrito - 一款基于 ptrace 可以进行进程跟踪的工具: |
https://github.com/brainsmoke/ptrace-burrito |
None |
|
None |
None |
34 |
0 |
7 |
104 |
0 |
Python,Go,C,Assembly |
0 |
0 |
eoftedal |
Istio/Envoy 目录穿越漏洞详情披露(CVE-2019-9901) |
https://github.com/eoftedal/writings/blob/master/published/CVE-2019-9901-path-traversal.md |
http://erlend.oftedal.no/blog |
|
Oslo, Norway |
None |
73 |
0 |
384 |
103 |
67 |
C#,JavaScript,Java |
172 |
11 |
luguanxing |
Cheating-Plugin-Program: 从零开始研究外挂设计原理 |
https://github.com/luguanxing/Cheating-Plugin-Program |
http://luguanxing.online:8080 |
|
None |
None |
17 |
0 |
7 |
102 |
2 |
C,JavaScript,HTML,C++ |
412 |
106 |
wrlu |
SecIoT-Web: IoT漏洞检测平台 |
https://github.com/wrlu/SecIoT-Web |
https://wrlu.cn |
Mobile & IoT Security Researcher; Java & Python Developer. |
Beijing, China |
Huawei |
26 |
0 |
41 |
100 |
33 |
Python,TSQL,JavaScript,Java |
20 |
9 |
j0nathanj |
From Zero to Zero Day ,介绍零基础挖掘 Chakra Core 漏洞的方法,来自 35C3 大会: |
https://github.com/j0nathanj/Publications/tree/master/35C3_From_Zero_to_Zero_Day |
https://twitter.com/j0nathanj |
A teenager interested in computers, maths and physics :) |
None |
None |
3 |
0 |
74 |
99 |
46 |
Python,JavaScript |
68 |
10 |
j3ssie |
IPOsint: Discovery IP Address of the target |
https://github.com/j3ssie/IPOsint |
https://twitter.com/j3ssiejjj |
I like abusing features |
None |
None |
19 |
0 |
7 |
98 |
0 |
Python |
0 |
0 |
xmendez |
模糊测试及暴力破解工具收集的分享:https://twitter.com/Alra3ees/status/1103563481641611264 |
https://github.com/xmendez/wfuzz/ |
http://wfuzz.org |
IT Security Consultant , Security Researcher; Twitter: @x4vi_mendez |
None |
None |
4 |
0 |
6 |
98 |
1 |
Python,Ruby |
1700 |
407 |
MatthewPierson |
利用 OTA Blobs 实现 iOS 降级的工具 |
https://github.com/MatthewPierson/Vieux |
https://twitter.com/mosk_i |
I downgrade iPhones =) |
None |
None |
10 |
0 |
0 |
95 |
1 |
Python,Shell,Rich |
95 |
27 |
r35tart |
R3start 总结的一些日常渗透测试项目的案例 |
https://github.com/r35tart/Penetration_Testing_Case |
http://R3start.net |
人若无名,便可潜心练剑。 |
None |
None |
51 |
0 |
130 |
95 |
5 |
Python |
307 |
113 |
iSafeBlue |
一张渗透测试思维导图 |
https://github.com/iSafeBlue/Mind-Map/ |
https://b1ue.cn |
Security Researcher , Java Development Engineer |
None |
None |
9 |
0 |
281 |
92 |
40 |
Java,HTML,JavaScript |
375 |
101 |
0x36 |
iOS atm port UAF 漏洞(CVE-2018-4420)PoC: |
https://github.com/0x36/CVE-pocs/blob/master/CVE-2018-4420-atm-uaf.c |
None |
. |
Morocco |
None |
6 |
0 |
24 |
91 |
0 |
C,Makefile |
140 |
39 |
Mel0day |
BCS 2019 红队行动会议重点内容 |
https://github.com/Mel0day/RedTeam-BCS |
None |
|
None |
None |
116 |
0 |
304 |
91 |
20 |
Python,Ruby |
210 |
56 |
lowleveldesign |
用于 trace .NET 程序网络通信流量的工具 |
https://github.com/lowleveldesign/dotnet-netrace |
https://lowleveldesign.org |
System Engineer • Interested in profiling, security, and OS internals |
Poland |
None |
19 |
0 |
91 |
91 |
0 |
C#,ASP,C++ |
489 |
44 |
ze0r |
cve-2019-0808-poc |
https://github.com/ze0r/cve-2019-0808-poc/ |
None |
|
None |
None |
5 |
0 |
5 |
91 |
5 |
Python,JavaScript,C++ |
97 |
39 |
theLSA |
vbulletin5 rce漏洞检测工具 |
https://github.com/theLSA/vbulletin5-rce |
http://www.lsablog.com |
I like network security,penestration and programming(python,c/c++,php,java,ect),welcome to communicate with me! |
China |
None |
33 |
0 |
19 |
90 |
19 |
Python |
134 |
42 |
Mattiwatti |
EfiGuard - x64 UEFI bootkit,在启动时修补 Windows 启动管理器以禁用 PatchGuard 和驱动程序签名验证(DSE) |
https://github.com/Mattiwatti/EfiGuard |
None |
|
The Netherlands |
None |
19 |
0 |
13 |
87 |
3 |
C,Assembly,C++ |
227 |
61 |
npubird |
东南大学《知识图谱》研究生课程 |
https://github.com/npubird/KnowledgeGraphCourse |
http://npubird.github.io |
|
None |
Southeast University |
68 |
0 |
56 |
87 |
2 |
Python,HTML,Java,JavaScript |
1100 |
376 |
patois |
HRDevHelper - IDA HexRays 反汇编工具的插件,用于支持实时查看反编译后 C 代码的 ctree 信息 |
https://github.com/patois/HRDevHelper |
None |
Yo, was github? |
127.0.0.1 |
None |
32 |
0 |
233 |
86 |
48 |
Python |
184 |
19 |
Ch1ngg |
Cobalt Strike - 使用其他方式抓取密码/dump hash |
https://github.com/Ch1ngg/AggressorScript-RunDumpHash |
https://www.ch1ng.com/ |
|
no |
no |
15 |
0 |
145 |
84 |
18 |
Python,C#,ASP,Java,PowerShell |
44 |
11 |
heibaiying |
BigData-Notes: 大数据入门指南 |
https://github.com/heibaiying/BigData-Notes |
https://blog.csdn.net/m0_37809146 |
博客:https://blog.csdn.net/m0_37809146 |
shanghai |
None |
2 |
0 |
20 |
80 |
0 |
Java |
2900 |
755 |
rootclay |
Powershell攻击指南----黑客后渗透之道 |
https://github.com/rootclay/Powershell-Attack-Guide |
http://rootclay.com |
A man who wants to be a ... |
beijing |
360 |
34 |
0 |
401 |
80 |
81 |
Python,C#,HTML,PowerShell |
298 |
87 |
vincentcox |
bypass-firewalls-by-DNS-history - 通过寻找 DNS 历史来绕过 WAF 直接访问真实 IP 地址的工具: |
https://github.com/vincentcox/bypass-firewalls-by-DNS-history |
https://www.linkedin.com/in/ivincentcox/ |
vincentcox.com |
Belgium |
None |
7 |
0 |
145 |
80 |
15 |
Shell,JavaScript,PowerShell |
0 |
0 |
aleenzz |
MYSQL SQL 注入 Bypass 技巧总结 |
https://github.com/aleenzz/MYSQL_SQL_BYPASS_WIKI |
None |
发现问题,解决问题 |
None |
404 |
11 |
0 |
24 |
78 |
31 |
Python |
288 |
74 |
yadox666 |
硬件黑客的工具箱,里面涵盖了硬件安全各个领域中使用的软件和硬件工具的介绍和推荐。 |
https://github.com/yadox666/The-Hackers-Hardware-Toolkit/blob/master/TheHackersHardwareToolkit.pdf |
https://twitter.com/yadox |
Yago Hansen is a recognized authority in IT security topics. He successfully managed projects related to the design of Security technologies and devices. |
Madrid |
Mundo Hacker |
8 |
0 |
1 |
78 |
1 |
Python |
863 |
103 |
cnlh |
easyProxy: 内网穿透代理服务器 |
https://github.com/cnlh/easyProxy |
None |
|
chengdu |
none |
6 |
0 |
30 |
77 |
0 |
Go |
0 |
0 |
uknowsec |
域渗透学习笔记 |
https://github.com/uknowsec/Active-Directory-Pentest-Notes |
http://uknowsec.cn |
不忘初心,方得始终 |
Nanjing |
None |
90 |
0 |
415 |
77 |
150 |
Python,PHP |
95 |
15 |
mk-fg |
通过 AppArmor Linux 内核安全模块限制应用程序访问权限 |
https://github.com/mk-fg/apparmor-profiles |
http://fraggod.net |
Random foss user, tinkerer, dev and freelancer. Mirror: http://fraggod.net/code/git/ |
Yekaterinburg, RU |
None |
80 |
0 |
22 |
76 |
0 |
Python |
201 |
35 |
d0c-s4vage |
gramfuzz - 通过定义语法规则生成 Fuzz 测试样本数据的工具 |
https://github.com/d0c-s4vage/gramfuzz |
None |
|
None |
None |
56 |
0 |
37 |
75 |
1 |
Python,JavaScript,Vim |
149 |
29 |
tarafans |
XuWen在zer0con上关于js和DOM fuzz的议题,提出了一种Emulation-based generation的fuzz思路。 |
https://github.com/tarafans/collections/blob/master/ZeroCon2019.pdf |
https://gts3.org/~wen |
|
Atlanta |
Georgia Tech |
20 |
0 |
5 |
75 |
10 |
Python,C,HTML |
17 |
4 |
RedDrip7 |
RedDrip7团队收集恶意软件家族样本,帮助安全社区对抗恶意软件和针对性攻击。 |
https://github.com/RedDrip7/APT_Digital_Weapon |
https://ti.qianxin.com/blog/ |
Technical Twitter of QiAnXin Technology, leading Chinese security vendor. It is operated by RedDrip Team which focuses on malware, APT and threat intelligence. |
China |
Qianxin |
3 |
0 |
0 |
74 |
0 |
|
122 |
23 |
husthuke |
awesome-knowledge-graph: 整理知识图谱相关学习资料 |
https://github.com/husthuke/awesome-knowledge-graph |
https://husthuke.github.io/ |
|
beijing |
VIPKID |
31 |
0 |
234 |
74 |
31 |
Jupyter,HTML,Java,CSS |
282 |
62 |
userlandkernel |
如何破解 iPhone 基带的详细介绍: |
https://github.com/userlandkernel/baseband-research?files=1 |
https://github.com/Fontys-Hogeschool-ICT |
Im a Software Engineering and Cybersecurity student at @Fontys-Hogeschool-ICT I research MACH, Darwin and LowLevel System Security. Mainly intrested in iOS. |
Eindhoven, Netherlands |
@UKERN-Developers |
33 |
0 |
48 |
72 |
11 |
HTML,C,Shell,Objective-C |
0 |
0 |
matiskay |
html-similarity: Compare html similarity using structural and style metrics |
https://github.com/matiskay/html-similarity |
http://twitter.com/matiskay |
Doing security things by day and doing things with data and crafty stuff by night. |
Arequipa, Perú |
None |
57 |
0 |
1100 |
71 |
209 |
Python,HTML |
0 |
0 |
86hh |
利用 Control Flow Guard 实现对 PE32 文件 EntryPoint 混淆的恶意代码 PoC |
https://github.com/86hh/POC-viruses/tree/master/Senshi.A |
None |
|
None |
None |
10 |
0 |
1 |
67 |
1 |
Assembly |
94 |
26 |
zMarch |
Orc - Bash 开发的 Linux 后渗透测试框架 |
https://github.com/zMarch/Orc |
https://attribution.party |
Pentester, hacker, forensicator. I write code, and sometimes I even publish it. Find me on twitter: https://twitter.com/_ta0 |
None |
None |
6 |
0 |
2 |
67 |
10 |
Shell,Assembly,JavaScript |
258 |
34 |
AxtMueller |
Windows-Kernel-Explorer - 一款 Windows 内核研究工具: |
https://github.com/AxtMueller/Windows-Kernel-Explorer |
https://www.aldi-sued.de |
I am currently working in a grocery store, but I have been studying the Windows kernel for many years. |
Dußlingen, Germany |
ALDI SÜD |
1 |
0 |
0 |
65 |
0 |
|
0 |
0 |
cfreal |
Apache 本地提权漏洞 CVE-2019-0211 Exploit |
https://github.com/cfreal/exploits/tree/master/CVE-2019-0211-apache |
https://github.com/ambionics |
|
None |
@ambionics |
2 |
0 |
3 |
65 |
0 |
PHP,HTML |
423 |
71 |
jakkdu |
fuzzilli的quickjs patch, Happy hacking :) |
https://github.com/jakkdu/fuzzilli-for-quickjs |
http://jakkdu.github.io |
|
Atlanta |
Georgia Institute of Technology |
13 |
0 |
49 |
65 |
6 |
Python,TeX,Ruby |
11 |
3 |
0xMJ |
AI-Security-Learning: 安全检测与数据挖掘的学习资料 |
https://github.com/0xMJ/AI-Security-Learning |
http://mang0.me |
CTF , Web Security , Data Analysis |
SiChuan, China |
None |
41 |
0 |
255 |
63 |
300 |
Python,PHP,HTML |
145 |
34 |
Kira-cxy |
科恩实验室 Kira-cxy 在 TenSec 2019 会议关于虚拟化以及 QEMU slirp:tcp_emu 堆溢出虚拟机逃逸漏洞(CVE-2019-6778)的分析 |
https://github.com/Kira-cxy/qemu-vm-escape |
None |
baby security researcher |
None |
None |
4 |
0 |
337 |
63 |
97 |
C,HTML,C++ |
101 |
18 |
decoder-it |
powershellveryless - 绕过 Powershell 受限语言模式及 AMSI 的工具 |
https://github.com/decoder-it/powershellveryless/ |
None |
|
None |
None |
9 |
0 |
1 |
63 |
0 |
C#,PowerShell,C++ |
129 |
48 |
guitmz |
virii - 远古计算机病毒源代码的收集: |
https://github.com/guitmz/virii |
https://github.com/relayr |
|
Berlin |
@relayr |
56 |
0 |
469 |
63 |
20 |
Go,Assembly,Nim |
0 |
0 |
scarvell |
grandstream_exploits - Grandstream 设备中的 RCE 漏洞 EXPLOIT 集合 |
https://github.com/scarvell/grandstream_exploits |
None |
|
Australia |
None |
22 |
0 |
54 |
63 |
37 |
Python,CoffeeScript,JavaScript,PHP |
50 |
24 |
brompwnie |
Break out the Box (BOtB) - Blackhat Arsenal 会议上公开的一款用于容器分析和常见容器漏洞利用的工具 |
https://github.com/brompwnie/botb/releases/tag/1.2.0 |
https://twitter.com/brompwnie |
Keyboard wrangler ⌨️ |
None |
None |
18 |
0 |
9 |
62 |
14 |
CSS,Go,Java,Smali,C++ |
462 |
213 |
DavidXanatos |
一个细粒度管理 Windows 软件更新包的工具 |
https://github.com/DavidXanatos/wumgr |
None |
|
None |
None |
30 |
0 |
7 |
60 |
0 |
C#,C,PowerShell,C++ |
405 |
57 |
JeremyFetiveau |
TurboFan String.lastIndexOf JSCall 节点输入错误漏洞的利用: |
https://github.com/JeremyFetiveau/TurboFan-exploit-for-issue-762874 |
None |
|
None |
None |
6 |
0 |
1 |
60 |
6 |
JavaScript,C++ |
41 |
26 |
Geluchat |
研究员Geluchat公开了若干针对Chrome V8引擎的1day漏洞和比赛题目的exploit。 |
https://github.com/Geluchat/chrome_v8_exploit |
https://www.dailysecurity.fr |
|
France |
None |
7 |
0 |
49 |
59 |
11 |
Python,C,JavaScript,PHP |
31 |
5 |
b1ack0wl |
Linux Mint 18.3-19.1 yelp 命令注入 Bug PoC |
https://github.com/b1ack0wl/linux_mint_poc |
None |
|
None |
None |
11 |
0 |
12 |
59 |
0 |
Python,Shell,HTML,Ruby,Propeller |
20 |
3 |
V33RU |
IoTSecurity101 - IoT 安全方向优秀资源索引: |
https://github.com/V33RU/IoTSecurity101 |
http://iotpentest.com/ |
Keen Interested in IoT Penetration testing |
bangalore |
Independent |
64 |
0 |
14 |
58 |
8 |
Python,Go |
707 |
151 |
jaredestroud |
如何通过 vim 来实现代码执行及持久化等攻击: |
https://github.com/jaredestroud/WOTD/blob/master/%5BDARK%5D%20Weapons%20of%20%20Text%20Destruction.pdf |
None |
|
None |
None |
17 |
0 |
208 |
57 |
37 |
SaltStack,PHP,Shell,C++ |
0 |
0 |
mcw0 |
HiSilicon DVR 黑客笔记 |
https://github.com/mcw0/pwn-hisilicon-dvr/blob/master/README.adoc |
None |
|
None |
None |
5 |
0 |
3 |
57 |
2 |
Python |
208 |
87 |
1120362990 |
vulnerability-list: 渗透测试中快速检测常见中间件、组件的高危漏洞 |
https://github.com/1120362990/vulnerability-list |
None |
web安全-渗透测试-python |
None |
None |
5 |
0 |
193 |
56 |
58 |
Python,Java |
269 |
61 |
TarlogicSecurity |
从 Linux 内存中 dump 出Kerberos 票据 |
https://github.com/TarlogicSecurity/tickey |
https://www.tarlogic.com/en/ |
Cyber security, cyber intelligence, Red Team |
None |
Tarlogic |
11 |
0 |
0 |
56 |
0 |
Go,Python,C,C++ |
87 |
19 |
LinXueyuanStdio |
Python数据挖掘与实战 |
https://github.com/LinXueyuanStdio/PythonDataMining |
http://xichen.pub |
He who thinks wins. |
None |
None |
78 |
0 |
329 |
55 |
32 |
Java,Jupyter,Rust |
0 |
0 |
lucasg |
基于 IDA 脚本实现的枚举系统 RPC 接口的工具 |
https://github.com/lucasg/findrpc |
None |
|
None |
None |
24 |
0 |
33 |
54 |
3 |
C#,Python,C,TeX,CSS |
1600 |
128 |
jiansiting |
Decryption-Tools: 勒索病毒解密工具的汇总 |
https://github.com/jiansiting/Decryption-Tools |
None |
剑思庭 |
China |
Industrial Control Security Researcher |
12 |
0 |
8 |
53 |
0 |
Python |
90 |
49 |
sapphirex00 |
APT IOCs 收集整理: |
https://github.com/sapphirex00/Threat-Hunting |
None |
|
None |
None |
18 |
0 |
38 |
53 |
48 |
Python,Shell |
0 |
0 |
0xcpu |
Windows 10 20H1 18999 新加了一个特性 AltSystemCallHandlers,可以实现 KiSystemCall 的 HOOK 回调 |
https://github.com/0xcpu/WinAltSyscallHandler |
None |
nothing interesting |
None |
None |
16 |
0 |
1300 |
52 |
112 |
Python,C,C++,Rust |
48 |
11 |
DeepSpaceHarbor |
人工智能(AI)安全方向的资料整理 |
https://github.com/DeepSpaceHarbor/Awesome-AI-Security |
None |
|
¯_(ツ)_/¯ |
None |
8 |
0 |
15 |
52 |
1 |
HTML |
882 |
134 |
qingxp9 |
macOS Mojave 10.14.4 802.1X 组件网络流量劫持逻辑漏洞的 PoC |
https://github.com/qingxp9/CVE-2019-6203-PoC |
https://qingxp9.github.io/ |
Wireless Security Researcher |
None |
360 PegasusTeam |
18 |
0 |
118 |
52 |
22 |
Python,C,Shell |
3800 |
859 |
xinali |
Adobe Font Development Kit for OpenType 套件相关的漏洞分析 |
https://github.com/xinali/AfdkoFuzz/ |
None |
Malware Analysis, Coder & Antiy Lab |
Harbin,China |
Jilin University |
14 |
0 |
121 |
52 |
56 |
Python,HTML,Dockerfile,C++,Vue |
85 |
37 |
jthuraisamy |
Synaptics 音频 Windows 内核驱动 CxUtilSvc 本地提权漏洞(CVE-2019-9730) |
https://github.com/jthuraisamy/CVE-2019-9730/ |
http://jackson.thuraisamy.me |
|
None |
None |
22 |
0 |
37 |
50 |
8 |
C#,Python,C,JavaScript,Java |
40 |
9 |
needmorecowbell |
Hamburglar: collect useful information from urls, directories, and files |
https://github.com/needmorecowbell/Hamburglar |
http://adammusciano.com |
Sharing is a moral imperative |
Pittsburgh, Pennsylvania |
Inquest |
68 |
0 |
458 |
50 |
34 |
Python,YARA,C++ |
0 |
0 |
0x7ff |
PoC for setting nonce without triggering KPP/KTRR/PAC |
https://github.com/0x7ff/dimentio |
None |
Monero: 42XMRm2cADx8tN3FxA9i2n852PNUTS1JSaDrqdBnxKkiW44WTQMvawFHXmYwxJmhhoKruQHE8bFNjH9BsWH35BjeETyG8fE |
None |
None |
10 |
0 |
0 |
49 |
6 |
C |
28 |
9 |
IgorKorkin |
基于 HyperPlatform / DdiMon 实现的驱动程序内核内存访问保护。作者举的实际应用例子是防止劫持其它驱动程序的 FILE_OBJECT 对象,但似乎有点大材小用。 |
https://github.com/IgorKorkin/MemoryRanger |
http://igorkorkin.blogspot.com |
An expert in digital security, full of passion and curiosity Im focusing on protection the Windows OS Kernel. #MEPhI alumni |
None |
None |
16 |
0 |
3 |
49 |
29 |
C++ |
53 |
14 |
shogunlab |
Hyper-V 漏洞及利用相关的资料收集 |
https://github.com/shogunlab/awesome-hyper-v-exploitation |
http://www.shogunlab.com |
Vulnerability Researcher at Shogun Lab. The lab was started to help organizations find security flaws in their software. |
Canada |
Shogun Lab |
8 |
0 |
395 |
49 |
24 |
Python,Swift,Ruby |
114 |
27 |
RanchoIce |
湛泸实验室 RanchoIce 在 ZeroNights 2018 会议演讲《From Graphic Mode To God Mode - Discovery Vulnerabilities of GPU Virtualization》的 PPT |
https://github.com/RanchoIce/ZeroNights2018// |
https://twitter.com/RanchoIce |
Researcher of Tencent Security ZhanluLab |
None |
ZhanluLab |
61 |
0 |
0 |
48 |
11 |
Ruby,PowerShell,C++ |
19 |
12 |
codemayq |
中文公开聊天语料库 |
https://github.com/codemayq/chaotbot_corpus_Chinese |
None |
new bird in nlp |
Beijing China |
Peking University |
7 |
0 |
234 |
47 |
12 |
Python,TypeScript |
725 |
192 |
intelstormteam |
针对 CPU 分支预测侧信道攻击的一种 Mitigation 防御方法 |
https://github.com/intelstormteam/Papers/blob/master/2019-Randpoline_A_Software_Mitigation_for_Branch_Target_Injection_Attacks_v1.42.pdf |
https://twitter.com/intelstormteam |
Intel STrategic Offensive Research & Mitigations Team (STORM) |
None |
Intel Corporation |
6 |
0 |
0 |
46 |
7 |
C++ |
8 |
6 |
mohuihui |
antispy: Windows下手工杀毒辅助工具开源 |
https://github.com/mohuihui/antispy |
None |
QQ & WeChat:454858525 |
None |
Alibaba |
9 |
0 |
5 |
46 |
2 |
C,Java,Objective-C |
242 |
133 |
lis912 |
Evaluation_tools: 等级保护测评工具 |
https://github.com/lis912/Evaluation_tools |
None |
时不时拧巴的菜鸡一只。 |
None |
None |
9 |
0 |
16 |
45 |
0 |
Go,Shell,HTML,CSS |
161 |
54 |
biggerwing |
绿盟科技漏洞扫描器(RSAS)漏洞知识库 |
https://github.com/biggerwing/nsfocus-rsas-knowledge-base |
None |
YmlnZ2VyLndpbmdAZ21haWwuY29tCg== |
None |
None |
79 |
0 |
13 |
44 |
1 |
Python,Lua,C,HTML |
141 |
42 |
chris408 |
ct-exposer: discovers sub-domains by searching Certificate Transparency logs |
https://github.com/chris408/ct-exposer |
https://linkedin.com/in/chris408 |
chris408.com |
None |
None |
9 |
0 |
6 |
44 |
6 |
Python,C |
0 |
0 |
marcinguy |
Android 7月补丁修复的Media Framework漏洞CVE-2019-2107的PoC |
https://github.com/marcinguy/CVE-2019-2107 |
None |
|
Berlin, Germany |
None |
39 |
0 |
11 |
44 |
28 |
Python,C |
52 |
13 |
numirias |
通过 VIM 对 modelines 特殊格式的支持可以实现任意代码执行。漏洞影响 Vim < 8.1.1365, Neovim < 0.3.6 版本 |
https://github.com/numirias/security/blob/master/doc/2019-06-04_ace-vim-neovim.md |
https://twitter.com/rawsec |
Infosec fanboy |
Europe |
None |
18 |
0 |
40 |
44 |
5 |
Python,JavaScript |
270 |
13 |
yyhsong |
iDataV: 大屏数据可视化示例 |
https://github.com/yyhsong/iDataV |
None |
Just coding for fun. |
None |
None |
13 |
0 |
31 |
42 |
0 |
JavaScript |
875 |
368 |
0xDezzy |
攻击 Pulse Secure Connect VPN 服务的 Exploit 代码 |
https://github.com/0xDezzy/CVE-2019-11539 |
None |
Houston based Security Researcher and Red Teamer |
Houston, Texas |
EY |
93 |
0 |
124 |
41 |
52 |
Python,KiCad,JavaScript,C++ |
68 |
15 |
sailay1996 |
Windows 10 LPE (UAC Bypass) in Windows Store (WSReset.exe) |
https://github.com/sailay1996/UAC_bypass_windows_store |
https://heynowyouseeme.blogspot.com/ |
@404death |
Myanmar |
None |
169 |
0 |
5 |
41 |
2 |
C,Shell,Python,JavaScript,C++,PowerShell |
75 |
23 |
NotMedic |
rdp-tunnel: Pre-compiled tools to tunnel TCP over RDP Conn... |
https://github.com/NotMedic/rdp-tunnel |
None |
|
None |
None |
16 |
0 |
2 |
40 |
0 |
HTML,C,JavaScript,PowerShell,C++ |
219 |
36 |
allpaca |
V8Harvest - V8 代码库近期回归测试样本的分析,方便分析 v8 的漏洞 |
https://github.com/allpaca/V8Harvest |
None |
|
None |
None |
46 |
0 |
37 |
40 |
4 |
JavaScript,C++ |
96 |
20 |
jovanbulck |
Intel SGX enclave 侧通道攻击框架 SGX-Step v1.3 发布,现已支持 Foreshadow 瞬态执行攻击: |
https://github.com/jovanbulck/sgx-step |
https://distrinet.cs.kuleuven.be/people/jo |
PhD student @KU_Leuven , Trusted Computing & Side-Channel Attacks , #IntelSGX #Sancus #Foreshadow |
None |
None |
16 |
0 |
64 |
40 |
0 |
C,Verilog |
0 |
0 |
0xffff0800 |
MuddyWater 组织的 Muddyc3 C2 源码泄漏 |
https://github.com/0xffff0800/muddyc3 |
https://www.twitter.com/0xffff0800 |
Security Researcher, Malware Analyst |
Shenzhen Guangdong China |
None |
1 |
0 |
0 |
39 |
0 |
Python |
103 |
67 |
rohanpadhye |
针对 Java 语言的基于覆盖率的 Fuzz 框架 |
https://github.com/rohanpadhye/jqf |
https://cs.berkeley.edu/~rohanpadhye |
PhD student |
Berkeley, CA |
UC Berkeley |
29 |
0 |
50 |
39 |
6 |
C,Java |
121 |
24 |
dahall |
Vanara - 方便从 .NET 调用 Windows Native API 而写的 .NET 字节码库 |
https://github.com/dahall/Vanara |
None |
Ive been writing and designing code for over 20 years for both commercial and open source use. I work as a CTO for tech firm. |
United States |
None |
14 |
0 |
2 |
38 |
0 |
C# |
304 |
69 |
c0d3p1ut0s |
Java反序列化漏洞自动挖掘方法 |
https://github.com/c0d3p1ut0s/Conference |
https://c0d3p1ut0s.github.io/ |
|
Hangzhou China |
None |
6 |
0 |
2 |
37 |
0 |
Python,HTML,Java |
92 |
17 |
kam800 |
macOS 平台的一款 Mach-O 混淆工具 |
https://github.com/kam800/MachObfuscator |
None |
|
Poland |
None |
9 |
0 |
467 |
37 |
11 |
Ruby,Objective-C,Swift,C |
193 |
20 |
therealsaumil |
ARM-X - 基于 Qemu 模拟执行 IoT 设备 ARM 固件的框架 |
https://github.com/therealsaumil/armx |
https://twitter.com/therealsaumil |
|
None |
None |
8 |
0 |
0 |
36 |
2 |
Shell,C,JavaScript,Assembly,Arduino |
170 |
32 |
unknownv2 |
CoreHook - 基于 .NET Core 运行时实现的 Windows HOOK 库 |
https://github.com/unknownv2/CoreHook |
https://thierrybiz.page |
Software Engineer interested in data engineering and cloud computing. |
None |
None |
32 |
0 |
888 |
36 |
30 |
C#,Java,C++,Scala |
75 |
11 |
vishnudxb |
automated-pentest-自动化扫描和生成渗透测试报告的 Parrot OS 系统容器 |
https://github.com/vishnudxb/automated-pentest |
http://www.vishnudxb.me |
Vishnu Nair is working as a Technology Lead in Taylor & Francis |
The Netherlands |
None |
130 |
0 |
179 |
36 |
54 |
Go,Shell,Ruby,PHP |
110 |
12 |
zznop |
bn-genesis - 协助分析 SEGA Genesis ROM 的 Binary Ninja 插件 |
https://github.com/zznop/bn-genesis |
None |
|
Dayton, Ohio |
None |
12 |
0 |
116 |
36 |
17 |
Python,Java,C,Assembly |
71 |
12 |
BusesCanFly |
Automate discovering and dropping payloads on LAN Raspberry Pis via ssh |
https://github.com/BusesCanFly/rpi-hunter |
None |
I make things, I break things. ¯_(ツ)_/¯ |
Somewhere in a linux server |
None |
4 |
0 |
437 |
35 |
66 |
Python |
0 |
0 |
open-cmdb |
cmdb: CMDB 配置管理系统 资产管理系统 |
https://github.com/open-cmdb/cmdb |
None |
|
Shanghai |
None |
2 |
0 |
2 |
35 |
0 |
Python,JavaScript |
413 |
166 |
securemode |
Invoke-Apex - 基于 PowerShell 的后渗透测试工具包: |
https://github.com/securemode/Invoke-Apex |
https://securemode.io |
|
None |
None |
13 |
0 |
158 |
35 |
0 |
Lua,Shell,PowerShell |
0 |
0 |
momika233 |
ClamAV 反病毒软件 0Day Exploit |
https://github.com/momika233/ClamAV_0Day_exploit/ |
https://twitter.com/momika233 |
momika233 |
Korea |
None |
4 |
0 |
4 |
34 |
0 |
Python |
97 |
24 |
superhedgy |
AttackSurfaceMapper - 一款开源的情报搜集工具 |
https://github.com/superhedgy/AttackSurfaceMapper |
https://github.com/SpiderLabs |
Just another InfoSec Ninja! My Latest open source tool is HostHunter: github.com/SpiderLabs/HostHunter/ |
United Kingdom |
@SpiderLabs |
4 |
0 |
89 |
34 |
11 |
Python,Shell |
292 |
41 |
CaijiOrz |
Fastjson <= 1.2.47 远程命令执行漏洞利用工具及方法 |
https://github.com/CaijiOrz/fastjson-1.2.47-RCE |
https://www.sec.kim/ |
A true master is an eternal student |
Chongqing China |
None |
11 |
0 |
216 |
33 |
108 |
Python,Ruby,HTML,Java |
22 |
11 |
dsnezhkov |
zombieant - 逃避 Linux EDR 检测的工具 |
https://github.com/dsnezhkov/zombieant/ |
None |
|
None |
None |
33 |
0 |
170 |
33 |
8 |
C#,Python,C,Go,C++ |
78 |
16 |
imjdl |
SearchApp: 小型网络空间搜索引擎 |
https://github.com/imjdl/SearchApp |
http://blog.blackarch.xyz |
Read The Fucking Source Code 菜雞一個 |
HK.China |
undergraduate |
125 |
0 |
341 |
33 |
174 |
Python |
0 |
0 |
A2nkF |
研究员 A2nkF 公开了一个 macOS 内核 0Day Exploit |
https://github.com/A2nkF/macOS-Kernel-Exploit/ |
https://twitter.com/A2nkF_ |
|
None |
None |
14 |
0 |
21 |
32 |
15 |
Python,C,C++ |
106 |
18 |
avishayil |
模拟 Capital One 数据泄露漏洞环境的云配置文件 |
https://github.com/avishayil/caponeme |
https://github.com/cyberark |
Cloud & DevOps Engineer @ CyberArk |
Israel |
@cyberark |
23 |
0 |
52 |
32 |
0 |
Java,Python,JavaScript,Objective-C,Dockerfile,CSS |
435 |
102 |
niemand-sec |
AntiCheat-Testing-Framework - 游戏反外挂测试框架,作者在 Recon2019 会议有一个关于这个工具的演讲 |
https://github.com/niemand-sec/AntiCheat-Testing-Framework |
None |
Twitter: @niemand_sec |
None |
None |
23 |
0 |
21 |
32 |
4 |
C#,Python,C++ |
102 |
21 |
Macr0phag3 |
GithubMonitor: 关键词监控GitHub泄漏 |
https://github.com/Macr0phag3/GithubMonitor |
https://www.tr0y.wang |
hello hacker ! |
None |
None |
22 |
0 |
53 |
31 |
2 |
Python,Shell |
0 |
0 |
AdrianVollmer |
PowerHub - 辅助 PowerSploit 绕过杀毒软件检测和应用白名单的 Web 应用 |
https://github.com/AdrianVollmer/PowerHub |
https://github.com/SySS-Research |
@mr_mitm |
Tübingen, Germany |
SySS GmbH @SySS-Research |
8 |
0 |
33 |
29 |
13 |
Python,C,Ruby,PowerShell |
126 |
15 |
Cherishao |
APT-Sample Files |
https://github.com/Cherishao/APT-Sample |
https://cherishao.github.io/ |
Malware researcher && APT Follow , Analyze threats,Blue/Red Team methodology, Networks, Malware Analysis,Reverse Engineering🕵️♂️ BTC:17iDHpUqe9XGpGJ2cMBUVciq |
ChengDu |
None |
68 |
1 |
346 |
29 |
31 |
Python,HTML |
47 |
24 |
echowei |
DeepTraffic: Deep Learning models for network traffic classification |
https://github.com/echowei/DeepTraffic |
None |
|
Beijing |
None |
1 |
0 |
1 |
29 |
0 |
Python |
153 |
117 |
Dongdongshe |
neuzz - 基于神经网络的 fuzzer: |
https://github.com/Dongdongshe/neuzz |
None |
|
None |
None |
28 |
0 |
6 |
28 |
1 |
Python,C,C++ |
171 |
31 |
ION28 |
BLUESPAWN - 用于辅助蓝队实现 Windows 系统主动防御的监控工具 |
https://github.com/ION28/BLUESPAWN/blob/master/README.md |
https://metactf.com |
|
None |
MetaCTF |
8 |
0 |
165 |
28 |
29 |
JavaScript,C++ |
60 |
16 |
artsploit |
solr-injection: Apache Solr Injection Research |
https://github.com/artsploit/solr-injection |
https://artsploit.blogspot.com/ |
|
None |
Veracode |
5 |
0 |
8 |
28 |
0 |
PHP,Java |
191 |
16 |
leeberg |
BlueCommand - PowerShell Empire 渗透工具的 DashBoard |
https://github.com/leeberg/BlueCommand |
http://www.leealanberg.com |
Product Manager, Automation, Content Producer, EX Microsoft MVP, Nerd |
Madison, Wisconsin, United States |
None |
37 |
0 |
90 |
28 |
65 |
C#,PowerShell |
92 |
10 |
terjanq |
一款JS编码工具,可以将 JS 编码成仅含有 /[a-z().]/ 字符的代码 |
https://github.com/terjanq/JS-Alpha/tree/master |
None |
Student of Informatics and Mathematics at University of Wroclaw |
None |
None |
21 |
0 |
17 |
28 |
7 |
HTML,JavaScript,C++ |
166 |
7 |
Sheisback |
Win32k CreateWindowEx 函数 UAF Exploit |
https://github.com/Sheisback/CVE-2019-0859-1day-Exploit |
http://sheisback.xyz |
|
None |
None |
66 |
0 |
10 |
27 |
4 |
Python,C#,C,JavaScript,C++ |
56 |
19 |
digital-missiles |
上周爆出 CVE-2019-0708 远程桌面服务的蠕虫级 RCE 漏洞,但是一只没有 PoC 公开出来。昨天 GitHub 上 digital-missiles 公开了一个可以触达漏洞函数路径的 PoC,不会引起拒绝服务。 |
https://github.com/digital-missiles/CVE-2019-0708-PoC-Hitting-Path |
None |
|
None |
None |
1 |
0 |
0 |
27 |
0 |
Python |
183 |
67 |
hanbinglengyue |
FART: ART环境下自动化脱壳方案 |
https://github.com/hanbinglengyue/FART |
None |
大成若缺,大道至简 |
None |
None |
78 |
0 |
3 |
27 |
20 |
Python,Java,C,PHP,Ruby |
239 |
77 |
Alexandre-Bartel |
DOSBox 模拟器缓冲区溢出漏洞 CVE-2019-12594 Exploit |
https://github.com/Alexandre-Bartel/CVE-2019-12594/ |
https://www.abartel.net |
|
None |
None |
15 |
0 |
4 |
26 |
1 |
Python,C,Java |
7 |
2 |
hyrathon |
Android平台上NFC相关漏洞的研究,来自 HITCON 2019 会议的议题 |
https://github.com/hyrathon/HITCON2019 |
None |
Android Security Researcher |
Beijing, PRC |
None |
59 |
0 |
341 |
26 |
35 |
C,JavaScript,Java,C++ |
21 |
5 |
zerobyte-id |
Bashter: Web Crawler, Scanner, and Analyzer Framework (Shell-Script based) |
https://github.com/zerobyte-id/Bashter |
https://zerobyte.id |
Dumb Repo |
None |
None |
11 |
0 |
3 |
26 |
0 |
Shell,JavaScript,PHP |
0 |
0 |
daddycocoaman |
Bypass Python 3.8 版本新增的 Runtime Audit Hooks 安全审计特性 |
https://github.com/daddycocoaman/SlidePresentations/blob/master/2019/BypassingPython38AuditHooks.pptx |
None |
|
None |
None |
10 |
0 |
11 |
25 |
1 |
Python,PowerShell,Boo |
43 |
9 |
fcavallarin |
domdig: DOM XSS scanner for Single Page Applications |
https://github.com/fcavallarin/domdig |
https://fcvl.net |
|
None |
None |
3 |
0 |
1 |
25 |
0 |
Python,JavaScript |
492 |
104 |
shadow-horse |
CVE-2019-17571/Apache Log4j 1.2.X 存在反序列化远程代码执行漏洞 |
https://github.com/shadow-horse/CVE-2019-17571 |
None |
Penetration, Vulnerability Research, SDL, STRIDE |
None |
None |
23 |
0 |
61 |
25 |
7 |
Python,JavaScript,Java,HTML,CSS |
5 |
1 |
DanyL |
作者公开了iOS12.3中修复的漏洞CVE-2019-8637和CVE-2019-8593的exploits |
https://github.com/DanyL/lockdownd_playground |
None |
|
None |
None |
16 |
0 |
15 |
24 |
7 |
Tcl,C,Shell,Ruby,Objective-C |
40 |
9 |
erbbysam |
erbbysam/DNSGrep: Quickly Search Large DNS Datasets |
https://github.com/erbbysam/dnsgrep/ |
None |
|
USA |
None |
13 |
0 |
54 |
24 |
4 |
Go,Shell,JavaScript,PHP |
250 |
43 |
tikazyq |
crawlab: 基于Celery的爬虫分布式爬虫管理平台 |
https://github.com/tikazyq/crawlab/blob/master/README-zh.md |
None |
|
Chongqing, China |
None |
35 |
0 |
98 |
24 |
19 |
Python,Vue |
527 |
100 |
linuxthor |
uul - 让 uul ELF 二进制文件同时在多个 *nix 风格的系统上运行的项目: |
https://github.com/linuxthor/uul |
None |
|
Yorkshire |
None |
32 |
0 |
0 |
23 |
3 |
C,Assembly |
0 |
0 |
locoz666 |
手把手教你写爬虫 |
https://github.com/locoz666/spider-article |
None |
|
ShenZhen |
Midu(www.midu.com) |
3 |
0 |
42 |
23 |
2 |
JavaScript |
0 |
0 |
lyxhh |
HTTPDecrypt: 利用HTTP协议 远程加解密数据包,实现Burp一条龙服务 |
https://github.com/lyxhh/lxhToolHTTPDecrypt |
None |
|
None |
None |
5 |
0 |
169 |
23 |
0 |
Python,JavaScript,HTML |
354 |
112 |
atrosinenko |
Linux内核快速模糊测试工具的集合 |
https://github.com/atrosinenko/kbdysch |
None |
|
Saint-Petersburg, Russia |
None |
33 |
0 |
78 |
22 |
1 |
C,C++,Scala |
59 |
2 |
hannespayer |
V8 Team在PLDI上办的v8讲座的资料 |
https://github.com/hannespayer/v8-tutorial-pldi2019 |
None |
|
None |
None |
4 |
0 |
0 |
22 |
0 |
C++ |
12800 |
2500 |
si9int |
Inserting arbitrary files into Google Earth Projects Archives |
https://github.com/si9int/OFFSEC-Archive/blob/master/web/Inserting%20arbitrary%20files%20into%20Google%20Earth%20Projects%20Archives.pdf |
https://si9int.sh |
Whitehat in own definition |
None |
None |
7 |
0 |
11 |
22 |
0 |
Python |
0 |
0 |
JonGates |
jon: LINUX系统攻防工具箱 |
https://github.com/JonGates/jon |
http://blog.jongates.cn |
birl |
None |
597.com |
10 |
0 |
118 |
21 |
7 |
Go,C,JavaScript |
104 |
28 |
KibodWapon |
Axis-1.4-RCE-Poc: Axis |
https://github.com/KibodWapon/Axis-1.4-RCE-Poc |
https://kibodwapon.github.io/ |
|
None |
None |
4 |
0 |
5 |
21 |
0 |
Python,HTML |
97 |
59 |
SolomonSklash |
chomp-scan: 用于简化Bug Bounty/Penetration Test探测阶段的工具脚本 |
https://github.com/SolomonSklash/chomp-scan |
https://www.solomonsklash.io/ |
Senior penetration tester at FIS Global. |
None |
FIS Global |
22 |
0 |
739 |
21 |
13 |
Python,Go,Shell |
0 |
0 |
vigneshsrao |
CVE-2019-11707 Firefox IonMonkey JIT类型混淆漏洞的完整exploit利用代码。 |
https://github.com/vigneshsrao/CVE-2019-11707 |
https://github.com/teambi0s |
Cyber Security Enthusiast. Does pwning and forensics for Team bi0s. |
None |
@teambi0s |
24 |
0 |
4 |
21 |
5 |
Python,JavaScript,Java |
22 |
4 |
xrkk |
跟 IDA Pro 有关的资源收集,当前包括的工具个数 450 左右 |
https://github.com/xrkk/awesome-ida |
None |
|
None |
None |
7 |
0 |
1400 |
21 |
0 |
Python,TypeScript |
403 |
69 |
MagicZer0 |
fastjson 1.2.46 版本 RCE Exploit |
https://github.com/MagicZer0/fastjson-rce-exploit |
None |
web security researcher, like coding. |
None |
None |
8 |
0 |
6 |
20 |
4 |
HTML,Java,PHP |
59 |
21 |
Rman0fCN |
ML_Malware_detect: 阿里云安全恶意程序检测比赛 |
https://github.com/Rman0fCN/ML_Malware_detect |
None |
Stu from HITsz |
None |
None |
48 |
0 |
76 |
20 |
67 |
Python,PHP,JavaScript,Smarty |
43 |
10 |
crypto-cypher |
《Privacy for Identities: The Art of Pseudonymity》发布,主要探讨信息安全,隐私权和大规模监控 |
https://github.com/crypto-cypher/privacy-for-identities/blob/master/PrivacyForIdentities%20-%20Prerelease.pdf |
https://twitter.com/CryptoCypher |
Networking. OpSec. Privacy. Coding. Just another paranoid cypherpunk whos terrible at calculus. Dreaming big. |
None |
None |
7 |
0 |
7 |
20 |
7 |
Shell |
32 |
5 |
dvur12 |
基带安全研究相关的资料整理 |
https://github.com/dvur12/awesome-baseband-research |
https://twitter.com/dvur12 |
|
Israel |
TroopsLabs |
36 |
0 |
81 |
20 |
15 |
Python,C,C++ |
30 |
10 |
feexd |
runc 容器逃逸漏洞(CVE-2019-5736)及利用介绍 : 1) https://www.exploit-db.com/exploits/463592) https://github.com/feexd/pocs3) |
https://github.com/feexd/pocs3) |
https://www.twitter.com/poprdi |
|
None |
None |
3 |
0 |
30 |
20 |
2 |
Python,C |
207 |
73 |
gnebbia |
pdlist: A passive subdomain finder |
https://github.com/gnebbia/pdlist |
None |
|
Italy |
None |
231 |
0 |
225 |
20 |
5 |
C,XSLT,Python,JavaScript,Makefile,Perl,HTML,Go,PowerShell |
104 |
14 |
stevenaldinger |
stevenaldinger/decker: Declarative penetration testing orchestration framework |
https://github.com/stevenaldinger/decker |
https://www.linkedin.com/in/steven-aldinger-7a32a774/ |
|
None |
None |
51 |
0 |
54 |
20 |
8 |
Go,Shell,HCL |
208 |
14 |
streaak |
Keyhacks - 逐个请求各公司 API 服务接口,用于检查泄漏的 API Keys 是否是主流公司的有效 API Key |
https://github.com/streaak/keyhacks |
None |
|
None |
None |
31 |
0 |
13 |
20 |
1 |
Python,Shell,Ruby |
98 |
20 |
vulmon |
Vulmap: Vulmap Online Local Vulnerability Scanners Project |
https://github.com/vulmon/Vulmap |
https://github.com/yavuzatlas |
Open source tools of Vulmon @yavuzatlas @ozelfatih |
None |
None |
1 |
0 |
1 |
20 |
0 |
Python |
0 |
0 |
Areizen |
一款基于 Android 模拟器和 Frida 实现的 Android 恶意软件分析的沙盒 |
https://github.com/Areizen/Android-Malware-Sandbox |
None |
|
None |
None |
16 |
0 |
2 |
19 |
2 |
Python,Shell,JavaScript |
86 |
23 |
GuidoPaul |
CAIL2019: 中国法研杯司法人工智能挑战赛之相似案例匹配第一名... |
https://github.com/GuidoPaul/CAIL2019 |
http://www.baosl.com/ |
|
None |
None |
20 |
0 |
124 |
19 |
12 |
Python,Jupyter,Java,Vim |
68 |
24 |
StrangerealIntel |
针对以色列某未知 APT 恶意样本的分析报告 |
https://github.com/StrangerealIntel/CyberThreatIntel/blob/master/Israel/APT/Unknown/26-08-19/Malware%20analysis%2026-08-19.md |
None |
|
None |
None |
1 |
0 |
0 |
19 |
0 |
Visual |
67 |
14 |
paul-axe |
paul-axe 公开的 WCTF 2019 P Door 赛题的 writeup |
https://github.com/paul-axe/ctf/tree/master/wctf2019/p-door |
None |
|
None |
None |
5 |
0 |
94 |
19 |
10 |
Python,C,PHP,Haskell |
7 |
1 |
trombastic |
基于 Django 实现的开源 SCADA 系统,支持多种工控协议 |
https://github.com/trombastic/PyScada |
http://martin-schroeder.net |
|
Berlin |
Technische Universität Berlin |
11 |
0 |
8 |
19 |
0 |
Python,JavaScript |
138 |
52 |
Darkabode |
zerokit - GAPZ Bootkit 源码 |
https://github.com/Darkabode/zerokit |
None |
|
None |
None |
6 |
0 |
0 |
18 |
0 |
C,Java,C++ |
84 |
33 |
chrisnas |
DebuggingExtensions - 一款可以用于 Windows 和 Linux 的 .NET Core 控制台的调试工具 |
https://github.com/chrisnas/DebuggingExtensions/releases/tag/v1.6 |
None |
|
None |
None |
9 |
0 |
2 |
18 |
1 |
C#,PowerShell |
102 |
13 |
yangruiqiyr |
一个用Intel VT-X/EPT实现的类似Sysinternals Process Monitor的工具 |
https://github.com/yangruiqiyr/Syscall-Monitor |
None |
Weak chicken in weak chicken |
None |
None |
74 |
0 |
57 |
18 |
34 |
Python,C,PHP,Java,C++ |
1 |
0 |
baronpan |
SysmonHunter:一个简单的基于ATT&CK的Sysmon日志狩猎工具 |
https://github.com/baronpan/SysmonHunter |
http://threatmobile.blogspot.com |
|
None |
None |
11 |
0 |
10 |
17 |
5 |
Python,Batchfile,JavaScript,Java,PowerShell |
31 |
7 |
batteryshark |
商用硬件Token设备软件实现中安全问题 |
https://github.com/batteryshark/writeups/tree/master/20190417 |
None |
|
New York, NY |
Stonefish Systems |
46 |
0 |
2 |
17 |
0 |
Python,C |
24 |
2 |
linhlhq |
微软 2 月份修复的 SharePoint RCE 漏洞的 PoC 代码(CVE-2019-0604) |
https://github.com/linhlhq/CVE-2019-0604 |
https://twitter.com/linhlhq |
|
None |
None |
53 |
0 |
2 |
17 |
3 |
C,C#,C++,Python,Pascal,Go,PowerShell |
75 |
45 |
wish-i-was |
femida: Automated blind-xss search for Burp Suite |
https://github.com/wish-i-was/femida |
None |
Twitter https://twitter.com/wish_iwas |
None |
None |
1 |
0 |
1 |
17 |
4 |
Python |
100 |
24 |
alexfrancow |
A-Detector: An anomaly-based intrusion detection system. |
https://github.com/alexfrancow/A-Detector |
https://twitter.com/alexfrancow |
SysAdmin, Pentester and Python developer. Future OSCP and computer engineer. |
A Coruña, Spain |
None |
22 |
0 |
52 |
16 |
13 |
Python,Ruby,CSS |
0 |
0 |
blaCCkHatHacEEkr |
PENTESTING-BIBLE |
https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE |
https://twitter.com/cry__pto |
MalwareHacker,,OSPentester,,NetworkBreaker,,ForensicsExpert,,SocialEngineeringPro,,WebProtector,,: ::::::::::GPG:68E11CD1:::::::::: |
syria |
None |
2 |
0 |
21 |
16 |
13 |
|
85 |
19 |
bsauce |
Fuzz 方向的几篇 Paper 的解读 |
https://github.com/bsauce/Some-Papers-About-Fuzzing |
https://www.jianshu.com/u/a12c5b882be2 |
|
None |
None |
18 |
0 |
48 |
16 |
17 |
Python,C,CSS,C++ |
25 |
6 |
rndinfosecguy |
Scavenger: Crawler searching for credential leaks on paste sites |
https://github.com/rndinfosecguy/Scavenger |
https://twitter.com/rnd_infosec_guy |
Just an information security guy marching down his path. |
/dev/null |
None |
2 |
0 |
2 |
16 |
7 |
Python,JavaScript |
114 |
27 |
DimopoulosElias |
alpc-mmc-uac-bypass - 通过 ALPC 绕过 UAC 的项目 |
https://github.com/DimopoulosElias/alpc-mmc-uac-bypass |
https://www.linkedin.com/in/dimopouloselias |
|
None |
None |
5 |
0 |
11 |
15 |
2 |
Python,C,C++ |
43 |
10 |
Vlad-tri |
6 月份被发现的野外 Win32k 0Day 提权漏洞(CVE-2019-1132)的 PoC |
https://github.com/Vlad-tri/CVE-2019-1132/ |
http://www.botnetarmy.wordpress.com |
Learning Machine Learning and Malware Anlaysis |
None |
None |
16 |
0 |
1 |
15 |
1 |
Python,C++ |
27 |
19 |
mattnotmax |
cyber-chef-recipes - 包含大量编码解密等工具的项目收集: |
https://github.com/mattnotmax/cyber-chef-recipes |
https://bitofhex.com |
|
None |
None |
13 |
0 |
86 |
15 |
1 |
Python |
0 |
0 |
rutkai |
pentest-bookmarks - 渗透测试相关的资料收集 |
https://github.com/rutkai/pentest-bookmarks |
http://rutkai.hu/ |
|
Hungary |
LogMeIn |
14 |
0 |
42 |
15 |
0 |
HTML,JavaScript,PHP |
9 |
6 |
CoreyD97 |
Stepper: A natural evolution of Burp Suites Repeater tool |
https://github.com/CoreyD97/Stepper |
https://github.com/nccgroup |
Security Consultant @nccgroup UK. |
United Kingdom |
NCC Group |
8 |
0 |
6 |
14 |
2 |
JavaScript,Java |
29 |
4 |
No-Github |
Dork-Admin: 盘点近年来的数据泄露事件 |
https://github.com/No-Github/Dork-Admin |
None |
井底之蛙 |
remote |
None |
30 |
0 |
574 |
14 |
10 |
HTML |
132 |
7 |
anx1ang |
anx1ang 收集的主流 Web 框架的漏洞攻击代码 |
https://github.com/anx1ang/Poc_Pentest |
None |
|
None |
None |
56 |
0 |
74 |
14 |
18 |
Python,C,JavaScript |
62 |
15 |
sumas |
OSCP-Cheatsheet-God - OSCP 考试备忘清单 |
https://github.com/sumas/OSCP-Cheatsheet-God |
None |
|
None |
None |
18 |
0 |
1 |
14 |
1 |
Python,JavaScript,Java,PHP |
124 |
31 |
butterflyhack |
linux蓝牙模块空指针引用漏洞PoC。 |
https://github.com/butterflyhack/CVE-2019-10207/ |
None |
|
None |
None |
129 |
0 |
19 |
13 |
28 |
Python,C,Java |
15 |
7 |
SVF-tools |
SVF - 针对 C/C++ 程序的指针和过程依赖静态分析工具 |
https://github.com/SVF-tools/SVF |
None |
|
None |
None |
4 |
0 |
0 |
12 |
0 |
C,C++ |
284 |
93 |
hongphipham95 |
研究员 hongphipham95 公开 KMPlayer 和 VirualBox 的很多漏洞分析文章,昨天新增一篇 VirtualBox Intel PRO 1000 设备模拟整数溢出漏洞的分析 |
https://github.com/hongphipham95/Vulnerabilities |
None |
|
Viet Nam |
None |
6 |
0 |
79 |
12 |
9 |
Python,Java,C++ |
13 |
3 |
redaelli |
imago-forensics - Python 实现的图像数字取证工具 |
https://github.com/redaelli/imago-forensics |
None |
I’m a cyber security enthusiast. blog: https://www.forensics-matters.com/ twitter: @solventred |
None |
None |
1 |
0 |
9 |
12 |
16 |
Python |
66 |
12 |
sgxrop |
SGX-ROP - 使用 Intel SGX 的 Enclave 恶意软件,paper: https://arxiv.org/abs/1902.03256 PoC: |
https://github.com/sgxrop/sgxrop |
None |
|
None |
None |
0 |
0 |
0 |
12 |
0 |
|
0 |
0 |
0xpwntester |
Sysmon configuration and scripts |
https://github.com/0xpwntester/Sysmon |
None |
|
None |
None |
9 |
0 |
6 |
11 |
3 |
Python,ASP,Batchfile,PowerShell,C++ |
48 |
11 |
kabachook |
Kubernetes 容器管理系统安全相关的资料收集 |
https://github.com/kabachook/k8s-security |
None |
Making coziness via tech. Fan of Docker🐋 and CTF🚩, do backend(Nodejs and Python), done a bit of ML, also DevOps |
None |
None |
11 |
0 |
160 |
11 |
5 |
Jupyter,Shell,JavaScript,PHP |
10 |
1 |
ReAbout |
datacon比赛方向三-攻击源与攻击者分析writeup |
https://github.com/ReAbout/datacon |
None |
Re.About |
Beijing |
Tsinghua University |
4 |
0 |
124 |
10 |
2 |
Python |
21 |
8 |
antonioCoco |
一款自带混淆的ASPX类型的Webshell |
https://github.com/antonioCoco/SharPyShell |
None |
@splinter_code |
Italy |
None |
1 |
0 |
3 |
10 |
7 |
Python |
103 |
16 |
cwerling |
分析和解析AMD安全处理器的固件工具包 |
https://github.com/cwerling/psptool |
None |
|
Berlin |
None |
2 |
0 |
10 |
10 |
0 |
Python |
27 |
1 |
kirk-sayre-work |
恶意 VB 脚本样本的分析 |
https://github.com/kirk-sayre-work/talks |
None |
I do cyber security work for Walmart. |
None |
Walmart |
7 |
0 |
3 |
10 |
0 |
Python,C#,JavaScript |
39 |
6 |
JuxhinDB |
OOB-Server: A Bind9 server for pentesters to use for Out-of-Band vulnerabilities |
https://github.com/JuxhinDB/OOB-Server |
https://github.com/JuxhinDB |
Twitter: @JuxhinDB |
Malta |
None |
12 |
0 |
58 |
9 |
4 |
Python,Shell,Java,Rust |
0 |
0 |
W00t3k |
Awesome-Cellular-Hacking |
https://github.com/W00t3k/Awesome-Cellular-Hacking |
None |
Wireless eap peap lootbooty |
None |
Lootb00ty Inc. |
601 |
0 |
85 |
9 |
3 |
Python,C,HTML |
71 |
8 |
cdisselkoen |
pitchfork - 基于 argr,利用符号执行的方式检测 CPU Spectre 漏洞 |
https://github.com/cdisselkoen/pitchfork |
https://cseweb.ucsd.edu/~cdisselk |
PhD student at UC San Diego |
None |
None |
33 |
0 |
3 |
9 |
0 |
C++ |
0 |
0 |
daikerSec |
Windows 内网协议学习 |
https://github.com/daikerSec/windows_protocol/blob/master/SUMMARY.md |
None |
|
None |
None |
4 |
0 |
16 |
9 |
4 |
Go,HTML,CSS |
9 |
2 |
Magpol |
利用 FRiDA 爆破 Samsung S7 Edge FDE 全盘加密 |
https://github.com/Magpol/fridafde |
https://twitter.com/may_pol17 |
All things Android - Forensics |
None |
None |
4 |
0 |
1 |
8 |
1 |
Python,Shell |
21 |
3 |
OYE93 |
Chinese-NLP-Corpus: Collections of Chinese NLP corpus |
https://github.com/OYE93/Chinese-NLP-Corpus |
https://oyeblog.com/ |
|
None |
None |
16 |
0 |
2 |
8 |
0 |
Python,HTML,Dockerfile,CSS |
110 |
18 |
Microsvuln |
AFL Fuzz 相关的资料整理 |
https://github.com/Microsvuln/Awesome-AFL |
None |
|
None |
None |
6 |
0 |
2 |
7 |
1 |
C |
124 |
8 |
PokemonGoTeam |
CRYPTOPOKEMON: Simple C++ cryptolocker Blowfish CBC |
https://github.com/PokemonGoTeam/CRYPTOPOKEMON |
http://pokemongo.icu |
|
Kiev, Ukraine |
PokemonGo |
1 |
0 |
0 |
7 |
0 |
C++ |
12 |
3 |
TheCyberGeek |
rConfig 3.9.2 被发现提权漏洞(CVE-2019-19268) |
https://github.com/TheCyberGeek/CVE-2019-19268 |
https://TheCyberGeek.co.uk |
|
Bournemouth, United Kingdom |
None |
7 |
0 |
0 |
7 |
2 |
CSS |
0 |
0 |
XiaoXiaoGuaiXiaShi |
OpenSource-HoneyPot: 对开源蜜罐的学习研究与理解 |
https://github.com/XiaoXiaoGuaiXiaShi/OpenSource-HoneyPot |
None |
信息安全学习者 |
None |
None |
3 |
0 |
80 |
7 |
38 |
Python,JavaScript |
12 |
1 |
ansionasc |
2019年哈尔滨ASC安全峰会的会议PPT |
https://github.com/ansionasc/ASC/tree/master/2019 |
https://www.ansion.cn |
Ansion Security Conference |
China |
Ansion |
1 |
0 |
1 |
7 |
0 |
|
14 |
5 |
grigoritchy |
(browser exploit)Webkit JavascriptCore array unshift race condition, it leads to RCE. |
https://github.com/grigoritchy/unshift-racy |
None |
|
None |
None |
1 |
0 |
0 |
7 |
0 |
JavaScript |
11 |
4 |
yogeshshe1ke |
MobaTek MobaXterm 个人版 SSH 私钥泄漏漏洞(CVE-2019-7690) |
https://github.com/yogeshshe1ke/CVE/ |
https://twitter.com/yogesh_she1ke |
Software Security , Binary Reversing , Exploitation |
Bengaluru, India |
None |
6 |
0 |
231 |
7 |
25 |
Python,Ruby,PowerShell,C++ |
3 |
0 |
KTN1990 |
WordPress Ninja Forms File Uploads 插件任意文件上传漏洞 PoC(CVE-2019-10869) |
https://github.com/KTN1990/CVE-2019-10869/blob/master/README.md |
https://www.facebook.com/KtN.1990 |
𝖍𝖆𝖈𝖐 𝖙𝖔 𝖑𝖎𝖛𝖊 𝖆𝖓𝖉 𝖑𝖎𝖛𝖊 𝖙𝖔 𝖍𝖆𝖈𝖐 |
DZ |
⓪ⓧ⑥⑥⑥ |
11 |
0 |
8 |
6 |
3 |
Python,Perl |
7 |
0 |
lucamassarelli |
二进制函数相似性比对工具,相关论文已公开。相比于之前使用机器学习方法解决此类问题的研究,其亮点是引入了 RNN 神经网络中的 Self-Attentive (自注意力) 技术,且仅使用了汇编指令的特征。论文中与 Gemini 做了实验对比,各项数据都优于 Gemini 。 |
https://github.com/lucamassarelli/yarasafe |
None |
Phd Student @ Sapienza University of Rome |
Rome |
None |
7 |
0 |
7 |
6 |
0 |
Python,C,CSS |
52 |
7 |
qq4108863 |
himqtt: MQTT物联网防火墙源码 |
https://github.com/qq4108863/himqtt |
None |
|
None |
None |
2 |
0 |
0 |
6 |
0 |
C |
15 |
7 |
wfh45678 |
radar: 实时风控引擎(Risk Engine) |
https://github.com/wfh45678/radar |
http://radar.pgmmer.top |
它山之石,可以攻玉 |
China/ShangHai |
票易通 |
2 |
0 |
18 |
6 |
1 |
Java |
99 |
37 |
Frint0 |
email-enum - 通过搜索主流社交网站判断邮箱是否注册的工具 |
https://github.com/Frint0/email-enum |
https://pwnable.club |
Pro Expert Elite Master Hacker |
Los Angeles |
None |
3 |
0 |
1 |
5 |
1 |
Python,CSS |
167 |
27 |
chame1eon |
jni 函数调用 trace 模块,基于 frida |
https://github.com/chame1eon/jnitrace |
None |
|
None |
None |
3 |
0 |
0 |
5 |
0 |
Python,Lua,JavaScript |
71 |
9 |
attakercyebr |
DVR 摄像头漏洞攻击脚本(CVE-2018-2019) |
https://github.com/attakercyebr/hack4lx_CVE-2018-2019 |
https://t.me/hack4lx |
The black hat hacker team leader just came out for destruction M4nifest0 Cyber security team™ |
Romania |
@os20ir |
18 |
0 |
21 |
4 |
17 |
Python,Visual,Shell |
6 |
3 |
cmcmsec |
dpia: GDPR个人数据合规评估 |
https://github.com/cmcmsec/dpia |
None |
|
None |
None |
3 |
0 |
0 |
4 |
0 |
JavaScript,Ruby |
21 |
15 |
mfthomps |
RESim - 基于 Simics 模拟器的全系统模拟动态分析工具。 |
https://github.com/mfthomps/RESim |
None |
|
None |
None |
6 |
0 |
0 |
4 |
1 |
Python,C#,HTML |
21 |
9 |
ydhcui |
Scanver: 分布式在线资产漏洞扫描管理系统 |
https://github.com/ydhcui/Scanver |
None |
biu biu biu |
None |
cn |
11 |
0 |
4 |
4 |
3 |
Python,HTML,Java,JavaScript |
4 |
4 |
JarekMSFT |
MSRC 成员对 Microsoft bug bounty 的介绍、如何 润色 报告及获得更高的奖金 |
https://github.com/JarekMSFT/Presentations/blob/master/Getting%20to%2010K_Nullcon2019.pdf |
None |
|
None |
None |
2 |
0 |
0 |
3 |
0 |
|
4 |
2 |
dogangcr |
vulnerable-sso: vulnerable single sign on |
https://github.com/dogangcr/vulnerable-sso |
None |
|
None |
None |
2 |
0 |
9 |
3 |
1 |
Java |
80 |
11 |
sharepub |
CheckVM-Sandbox |
https://github.com/sharepub/CheckVM-Sandbox |
None |
|
None |
None |
1 |
0 |
0 |
3 |
0 |
C++ |
70 |
17 |
tim124058 |
华硕智能家居 App 和 HG100 网关漏洞利用代码( CVE-2019-11061、CVE-2019-11063) |
https://github.com/tim124058/ASUS-SmartHome-Exploit/ |
None |
|
None |
None |
27 |
0 |
3 |
3 |
3 |
Python,HTML,C++ |
16 |
5 |
chipik |
SAP Gateway ACL 错误配置漏洞的 Exploit |
https://github.com/chipik/SAP_GW_RCE_exploit |
None |
https://twitter.com/_chipik |
None |
None |
5 |
0 |
2 |
2 |
1 |
Python |
4 |
2 |
lion-gu |
IOC Explorer:自动化关联失陷指标的工具 |
https://github.com/lion-gu/ioc-explorer |
None |
|
None |
None |
1 |
0 |
3 |
2 |
0 |
Python |
22 |
2 |
mykter |
aws-security-cert-service-notes - AWS 服务安全认证学习笔记 |
https://github.com/mykter/aws-security-cert-service-notes |
http://mykter.com |
|
UK |
None |
20 |
0 |
29 |
2 |
0 |
Python,C,TypeScript |
272 |
52 |
AzizMea |
Exim 远程命令执行漏洞(CVE-2019-10149)Exploit |
https://github.com/AzizMea/CVE-2019-10149-privilege-escalation |
None |
|
riyadh |
None |
3 |
0 |
0 |
1 |
0 |
Python,PowerShell |
1 |
2 |
MegadodoPublications |
Mautic Remote Code Execution |
https://github.com/MegadodoPublications/exploits/blob/master/mautic.md |
None |
|
Germany |
None |
1 |
0 |
0 |
1 |
0 |
|
4 |
1 |
MoonLight-SteinsGate |
LearnAFL--knowledge-learn evolutionary fuzzer |
https://github.com/MoonLight-SteinsGate/LearnAFL |
None |
|
None |
None |
2 |
0 |
1 |
1 |
0 |
C,C++ |
8 |
3 |
PINGXcpost |
F-NAScan-PLUS 安服资产搜集 |
https://github.com/PINGXcpost/F-NAScan-PLUS |
http://hackhat.net |
|
None |
None |
7 |
0 |
0 |
1 |
0 |
Python,Shell,PowerShell |
19 |
8 |
bd249ce4 |
QBAnalyzer: automates extracting artifacts and binaries |
https://github.com/bd249ce4/QBAnalyzer |
None |
|
None |
None |
2 |
0 |
0 |
1 |
0 |
YARA,HTML |
3 |
1 |
dplusec |
端对端加密的微信聊天插件 |
https://github.com/dplusec/tgwechat |
None |
|
None |
None |
2 |
0 |
0 |
1 |
0 |
HTML |
15 |
4 |
llt4l |
从思科 Ciscos CUCM (Call Manager,呼叫管理软件)的 TFTP 服务器中提取手机配置文件并搜索密钥信息 |
https://github.com/llt4l/iCULeak.py |
https://twitter.com/llt4l |
Infosec person.. |
None |
None |
5 |
0 |
0 |
1 |
0 |
Python,HTML,CSS |
5 |
2 |
0Kee-Team |
0Kee Team 开源的用于收集 URL 入口的爬虫,基于 Headless Chrome 编写 |
https://github.com/0Kee-Team/crawlergo |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,Vue,Java |
0 |
0 |
AngelCtulhu |
Wordpress Support Candy 插件的文件上传漏洞 |
https://github.com/AngelCtulhu/CVE-2019-11223/ |
http://cert.kalasag.com.ph |
|
Pasig |
8Layer Technologies Inc. |
2 |
0 |
0 |
0 |
0 |
Python |
0 |
0 |
Bashfuscator |
Bashfuscator - 完全可配置和可扩展的 Bash 混淆框架: |
https://github.com/Bashfuscator/Bashfuscator |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python |
0 |
0 |
BloodHoundAD |
域渗透神器 BloodHound2.1.0 发布 |
https://github.com/BloodHoundAD/BloodHound/releases/tag/2.1.0 |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C#,Python,PowerShell |
0 |
0 |
FSecureLABS |
FSecure Labs 开源了一款用于 AWS 云上资源关联关系可视化的工具 |
https://github.com/FSecureLABS/awspx |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,Shell,Java,Python,JavaScript,C++,C#,PowerShell |
2000 |
549 |
FederatedAI |
FATE: 联邦学习开源项目 |
https://github.com/FederatedAI/FATE |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,Java,CSS |
703 |
203 |
MicrosoftDocs |
微软公开 Windows Driver Kit 相关的文档 |
https://github.com/MicrosoftDocs/windows-driver-docs |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
TypeScript,HTML,C#,JavaScript,Python,Shell,PowerShell |
3100 |
8200 |
MotherFuzzers |
湾区一个关于Fuzzing的workshop的分享内容,三个议题涵盖了c/c++,web应用等不同目标的Fuzzing技巧 |
https://github.com/MotherFuzzers/meetups/blob/master/README.md |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
|
0 |
0 |
Netis |
packet-agent: 云环境网络流量镜像项目 |
https://github.com/Netis/packet-agent/blob/master/README-zh-Hans.md |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,C++ |
0 |
0 |
NoneAge |
交易所安全测试系列指南文档 |
https://github.com/NoneAge/BlockchainSecurityTutorial |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,WebAssembly |
0 |
0 |
PSGumshoe |
用于从 Windows 各类日志和缓存中收集取证信息的 PowerShell 模块 |
https://github.com/PSGumshoe/PSGumshoe/releases/tag/v1.1 |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
PowerShell |
0 |
0 |
QAX-A-Team |
LuWu: 红队基础设施自动化部署工具 |
https://github.com/QAX-A-Team/LuWu |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,Shell,Java,Python,C++,Go,PowerShell |
0 |
0 |
SCUBSRGroup |
SCUBSRGroup 整理的关于软件漏洞自动化利用(AEG)方向的技术资料 |
https://github.com/SCUBSRGroup/Automatic-Exploit-Generation |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,C,HTML,C++ |
28 |
13 |
Tencent |
TencentOS tiny - 腾讯开源的面向物联网领域的实时操作系统 |
https://github.com/Tencent/TencentOS-tiny |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,Java,Python,Kotlin,JavaScript,C++,Lua,Go,PHP,CSS,C# |
23200 |
5900 |
YanxinTang |
Watermark: 网页添加水印的库 |
https://github.com/YanxinTang/Watermark |
https://yanx.in |
Frontend Developer |
None |
None |
13 |
0 |
65 |
0 |
2 |
JavaScript |
0 |
0 |
advanced-threat-research |
Repository of YARA rules made by McAfee ATR Team |
https://github.com/advanced-threat-research/Yara-Rules |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,YARA,HTML |
0 |
0 |
android-hacker |
无 ROOT 版本 Xposed - VirtualXposed 新增对 Android 10 系统的支持 |
https://github.com/android-hacker/VirtualXposed/releases/tag/0.18.0 |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Kotlin,JavaScript,Java |
0 |
0 |
apachecn |
面向机器学习的特征工程 |
https://github.com/apachecn/fe4ml-zh |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Shell,Jupyter,Scala,Python,JavaScript,HTML,PHP,CSS |
22200 |
7800 |
baidu-security |
openrasp-iast: IAST 灰盒扫描工具 |
https://github.com/baidu-security/openrasp-iast |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Java,Python,JavaScript,C++,HTML,Go,TSQL |
0 |
0 |
chineseocr |
darknet-ocr: darknet text detect and darknet cnn ocr |
https://github.com/chineseocr/darknet-ocr |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,C,C++ |
0 |
0 |
compsec-snu |
Fuzz内核中条件竞争漏洞的工具,相关工作已经发表在Oakland19上 |
https://github.com/compsec-snu/razzer |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C |
0 |
0 |
defenxor |
dsiem: Security event correlation engine for ELK stack |
https://github.com/defenxor/dsiem?from=timeline |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Go,HTML |
0 |
0 |
ernw |
ERNW GmbH 公开了几篇关于 Windows WDAC 与 Code integrity 的研究 Paper |
https://github.com/ernw/Windows-Insight/tree/master/articles/Device%20Guard/WDAC |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,Shell,Java,XSLT,Python,Erlang |
488 |
134 |
eth-sri |
利用机器学习的方法还原(推测)被 strip 过的二进制程序的调试符号信息 |
https://github.com/eth-sri/debin |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,TypeScript,Java,D,Python,Mathematica,C++,C#,HTML,SMT,JavaScript |
0 |
0 |
fireeye |
StringSifter - FireEye 开源的一个基于 strings 和机器学习的相关字符串搜索工具,方便恶意代码的静态分析 |
https://github.com/fireeye/stringsifter |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,Vue,C#,JavaScript,C++,Python,Go,PowerShell |
0 |
0 |
fkie-cad |
嵌入式与 IoT 安全方向的资料 |
https://github.com/fkie-cad/awesome-embedded-and-iot-security |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,Shell,Python,OCaml,C++,Emacs,Dockerfile |
0 |
0 |
fuzzitdev |
Jsfuzz: coverage-guided fuzz testing for Javascript |
https://github.com/fuzzitdev/jsfuzz |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,TypeScript,CMake,Dockerfile,C++,Swift,HCL,Go,Java,Ruby,Rust |
234 |
11 |
google |
Google 在 sanitizers Repo 介绍了一些存在条件竞争问题的代码模型 |
https://github.com/google/sanitizers/wiki/ThreadSanitizerPopularDataRaces |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Groovy,C,Java,HTML,Python,Kotlin,JavaScript,C++,Haskell,Go,Jupyter,Rust,Lasso |
0 |
0 |
googleprojectzero |
DrSancov - j00ru 开源的一款 DynamoRIO 插件,用于在动态插桩中输出 ASAN/ SanitizerCoverage 框架支持的格式方便进一步做分析 |
https://github.com/googleprojectzero/DrSancov |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,C#,C++,Python,HTML,Swift |
0 |
0 |
goretk |
GoRE - 用于分析 Go 二进制文件的工具库 |
https://github.com/goretk/gore |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,Go,Shell,HTML |
0 |
0 |
guardicore |
labs_campaigns 攻击团队IOC信息 |
https://github.com/guardicore/labs_campaigns |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,TypeScript,Java,Python,JavaScript,C++,CoffeeScript,C# |
0 |
0 |
hungryfoolou |
CVE漏洞信息爬取 |
https://github.com/hungryfoolou/Vulnerability_Mining/tree/master/craw |
None |
|
None |
XiDian University |
6 |
0 |
10 |
0 |
3 |
Python,C,HTML |
75 |
39 |
idapython |
IDA Pro IDAPython 项目的源代码 |
https://github.com/idapython/src |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python |
0 |
0 |
immunityinc |
Immunity 开源了一个用于进程调试和 Trace 的库 - libptrace |
https://github.com/immunityinc/libptrace |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C |
0 |
0 |
intel |
Intel 开源了一个 VBH(Virtualization Based Hardening)项目,通过 API 可以为 Client 提供基于虚拟化的安全防护特性支持 |
https://github.com/intel/vbh |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,Shell,Assembly,Python,JavaScript,BitBake,C++,Go,Java,Rust |
0 |
0 |
jmpsec |
osctrl: Fast and efficient osquery management |
https://github.com/jmpsec/osctrl |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Go,CSS |
0 |
0 |
k8scop |
k8s-security-dashboard: A security monitoring solution for Kubernetes |
https://github.com/k8scop/k8s-security-dashboard |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python |
0 |
0 |
libusb |
libusb - 跨平台的 USB 设备交互库 |
https://github.com/libusb/libusb |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,HTML |
0 |
0 |
microsoft |
微软研究员关于内存安全的一个演讲《Quest Memory Safety》 |
https://github.com/microsoft/MSRC-Security-Research/tree/master/presentations/2019_09_Ekoparty |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,TypeScript,CMake,Python,JavaScript,C++,C#,Rich,Dockerfile,PowerShell |
0 |
0 |
nccgroup |
acCOMplice - 用于发现和利用 COM 劫持的工具,作者 9 月份在 DerbyCON 会议有过一次关于这个工具的演讲 |
https://github.com/nccgroup/acCOMplice |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,TypeScript,Java,Python,JavaScript,C++,C#,HTML,Shell,Elixir,Go,PowerShell,Rust |
874 |
157 |
openworldoperations |
一种高级的网络钓鱼技术,可让攻击者设置有效的域和SSL证书,请注意防范 |
https://github.com/openworldoperations/FISHY |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,HTML |
15 |
4 |
palantir |
Windows Exploit Guard 相关的资料整理 |
https://github.com/palantir/exploitguard |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Groovy,TypeScript,Java,Scala,Python,JavaScript,Shell,Go,Rust |
0 |
0 |
pan-unit42 |
Powershell自动反混淆工具 |
https://github.com/pan-unit42/public_tools/tree/master/powershellprofiler |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,PHP,CSS |
0 |
0 |
pdbpp |
pdb++ - Python debugger(pdb)的增强版 |
https://github.com/pdbpp/pdbpp |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python |
0 |
0 |
rackerlabs |
scantron - 分布式 Nmap/Masscan 网络扫描框架 |
https://github.com/rackerlabs/scantron |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Groovy,TypeScript,Java,Python,JavaScript,Shell,HTML,HCL,Ruby,CSS |
0 |
0 |
secdevops-cuse |
CyberRange: The Open-Source AWS Cyber Range |
https://github.com/secdevops-cuse/CyberRange |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,C,Dockerfile,CSS,HCL |
0 |
0 |
seecode-audit |
seecode-audit: SeeCode Audit 代码审计管理系统 |
https://github.com/seecode-audit/seecode-audit |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python |
0 |
0 |
seemoo-lab |
Nexmon - 一款支持 Broadcom/Cypress WiFi 芯片的固件 Patch 框架,基于框架可以编写自己的补丁,启用监听模式 |
https://github.com/seemoo-lab/nexmon |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,Shell,Jupyter,Python,JavaScript,C++,TeX,Objective-C,HTML,MATLAB,Java |
3300 |
274 |
skydive-project |
Skydive可用以对网络拓扑及协议进行实时分析,以图像的方式清晰展现。 |
https://github.com/skydive-project/skydive |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Go,Python,HTML,JavaScript,Puppet |
0 |
0 |
sophiabiancalatessa |
FakeNewsDeepLearning: Opening the Black-Box of Deep Learning Based Detector |
https://github.com/sophiabiancalatessa/FakeNewsDeepLearning |
None |
|
None |
None |
2 |
0 |
0 |
0 |
0 |
Python,C++ |
9 |
6 |
sslab-gatech |
QSYM - 为混合 Fuzz 定制的符号执行引擎 |
https://github.com/sslab-gatech/qsym |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,Filebench,Python,Makefile,C++,HTML,HCL |
0 |
0 |
tarantula-team |
开源防火墙 fSense 2.4.4-p2 - 2.4.4-p3 XSS 漏洞 PoC(CVE-2019-12949) |
https://github.com/tarantula-team/CVE-2019-12949/ |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
|
0 |
0 |
tea-deliverers |
PlaidCTF 2019 比赛的 Writeup |
https://github.com/tea-deliverers/ctf-writeups/blob/master/pctf2019/PlaidCTF2019_Writeup_Tea_Deliverers.pdf |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
|
0 |
0 |
telspacesystems |
华硕 Windows 触摸板驱动 AsusPTPFilter.sys 存在拒绝服务漏洞(CVE-2019-10709) |
https://github.com/telspacesystems/Asus-DOS/ |
https://www.telspace.co.za |
|
South Africa |
Telspace Systems |
2 |
0 |
0 |
0 |
0 |
Python |
0 |
1 |
ucsb-seclab |
KARONTE: Detecting Insecure Multi-binary Interactions in Embedded Firmware |
https://github.com/ucsb-seclab/karonte?from=timeline |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,Java,Python,JavaScript,C++,Dockerfile |
0 |
0 |
uds-se |
关于 Fuzz 的书《Generating Software Tests》的原始文件 |
https://github.com/uds-se/fuzzingbook |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
C,LLVM,Java,Python,Kotlin,JavaScript,Shell,Objective-C,HTML,Jupyter,R,Dockerfile |
0 |
0 |
vim |
8.1.2136 补丁:释放window内存与fuzzer的 autocmd命令一起使用 |
https://github.com/vim/vim/commit/ec66c41d84e574baf8009dbc0bd088d2bc5b2421 |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Shell,C,Batchfile,Vim |
0 |
0 |
xiangpasama |
京东SRC小课堂系列文章 |
https://github.com/xiangpasama/JDSRC-Small-Classroom |
None |
|
None |
None |
1 |
0 |
0 |
0 |
0 |
|
34 |
9 |
xsleaks |
一些可能导致跨域信息泄漏的 DOM API 收集 |
https://github.com/xsleaks/xsleaks/wiki/Browser-Side-Channels |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
|
0 |
0 |
zaproxy |
zaproxy - OWASP Zed Attack Proxy (ZAP),一个用于辅助 Web 应用安全性测试的工具 |
https://github.com/zaproxy/zaproxy |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Java,C#,JavaScript,Python,HTML,Go,PHP,Rust |
6300 |
1200 |
zeek |
Zeek - 一款开源的网络协议分析工具 |
https://github.com/zeek/zeek |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Bro,C,Zeek,CMake,Python,JavaScript,C++,Vim,Yacc,PHP,Dockerfile |
2800 |
728 |