Jack2's Stars
meta-llama/llama
Inference code for Llama models
meta-llama/llama3
The official Meta Llama 3 GitHub site
cyrus-and/gdb-dashboard
Modular visual interface for GDB in Python
juliocesarfort/public-pentesting-reports
A list of public penetration test reports published by several consulting firms and academic security groups.
ihebski/DefaultCreds-cheat-sheet
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
IvanGlinkin/CCTV
Close-Circuit Telegram Vision revolutionizes location tracking with its open-source design and Telegram API integration. Offering precise tracking within 50-100 meters, users can monitor others in real-time for logistics or safety, redefining how we navigate our surroundings
yeti-platform/yeti
Your Everyday Threat Intelligence
Whitecat18/Rust-for-Malware-Development
This repository contains my complete resources and coding practices for malware development using Rust 🦀.
FoxIO-LLC/ja4
JA4+ is a suite of network fingerprinting standards
owasp-dep-scan/dep-scan
OWASP dep-scan is a next-generation security and risk audit tool based on known vulnerabilities, advisories, and license limitations for project dependencies. Both local repositories and container images are supported as the input, and the tool is ideal for integration.
DosX-dev/obfus.h
Macro-header for compile-time C obfuscation (tcc, win x86/x64)
sarperavci/GoogleRecaptchaBypass
Solve Google reCAPTCHA in less than 5 seconds! 🚀
zacharyvoase/humanhash
Human-readable digests.
jstrosch/learning-malware-analysis
This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be compiled and used for learning purposes, without having to worry about handling live malware.
void-stack/VMUnprotect
VMUnprotect can dynamically log and manipulate calls from virtualized methods by VMProtect.
Psmths/windows-forensic-artifacts
Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!
vonderchild/digital-forensics-lab
Digital forensics lab course, as offered in FAST NUCES Karachi during Spring 2023.
crocodyli/ThreatActors-TTPs
Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups and evolving to other types of threats.
mandiant/Vulnerability-Disclosures
cgosec/Blauhaunt
A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you come from where did you go) in Security Incidents and Threat Hunts
travisbgreen/hunting-rules
Suricata rules for network anomaly detection
DataDog/HASH
HASH (HTTP Agnostic Software Honeypot)
fkie-cad/nvd-json-data-feeds
Community reconstruction of the legacy JSON NVD Data Feeds. This project uses and redistributes data from the NVD API but is neither endorsed nor certified by the NVD.
longyan97/EMEye_Tutorial
Tutorial and code of EM Eye camera eavesdropping attack research
tidalcyber/cyber-threat-profiling
A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense
0xSojalSec/Mobile-Application-Security
NextronSystems/gimphash
Imphash-like calculation on Golang binaries
redrays-io/SAP-Threat-Modeling
The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP systems, helping users identify security risks and vulnerabilities. With features like inputting SAP credentials, scanning for connections, and visualizing the network.
0xbigshaq/GenesisOS
curiosity got me here
delivr-to/delivrto_vectr_import
Python tool for importing delivr.to campaign results into VECTR