A New York District Court Judge granted a $1 million bail for Virgil Griffith, an Ethereum developer accused of violating economic sanctions...
PHP Fuzzer This library implements a fuzzer for PHP, which can be used to find bugs in libraries (particularly parsing libraries) by feeding them...
Pown Recon Pown Recon is a target reconnaissance framework powered by graph theory. The benefit of using graph theory instead of flat...
What is keyFinder? keyFinder is a chrome extension that searches the DOM for any embedded script link, as script tag may contain...
XSpear XSpear is XSS Scanner on ruby gems Key features Pattern matching based XSS scanning Detect alert confirm prompt event on headless browser (with Selenium) Testing...
Deep Learning models for network traffic classification The development of an anomaly-based intrusion detection system (IDS) is a primary research direction in...
The Metasploit Project is a computer security project which provides information about security vulnerabilities and aids in penetration testing and IDS signature...
SysWhispers SysWhispers helps with evasion by generating header/ASM files implants can use to make direct system calls. All core syscalls are supported...
Extracting metadata and hardcoded Indicators of Compromise from ransomware, in a scalable, efficient, way with cuckoo integrations. Ideally, is it run during...
cspparse cspparse is a tool to evaluate Content Security Policies. It uses Google’s API to retrieve the CSP Headers and returns them...
Async DNS Brute A Python 3.5+ tool that uses asyncio to brute force domain names asynchronously. Speed It’s fast. Benchmarks on small...
nmapAutomatorA script that you can run in the background! SummaryThe main goal for this script is to automate all of the process...
An Obfuscation-Neglect Android Malware Scoring System ConceptsAndroid malware analysis engine is not a new story. Every antivirus company has their own secrets...
Goby – Attack surface mapping The new generation of network security technology achieves rapid security emergency through the establishment of a complete...
Windows Firewall Ruleset Windows firewall rules organized into individual powershell scripts according to: Rule group Traffic direction IP version (IPv4 / IPv6)...
A normal flask web app to learn win32api with code snippets and references. PrerequisiteYou need to download the following package before starting...
What’s PAKURIIn Japanese, imitating is called “Pakuru”. ぱくる (godan conjugation, hiragana and katakana パクる, rōmaji pakuru) eat with a wide open mouth...