bogardavid's Stars
golang/go
The Go programming language
angular/angular
Deliver web apps with confidence 🚀
protocolbuffers/protobuf
Protocol Buffers - Google's data interchange format
bazelbuild/bazel
a fast, scalable, multi-language and extensible build system
vxunderground/MalwareSourceCode
Collection of malware source code for a variety of platforms in an array of different programming languages.
java-decompiler/jd-gui
A standalone Java Decompiler GUI
digininja/DVWA
Damn Vulnerable Web Application (DVWA)
screetsec/TheFatRat
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .
VirusTotal/yara
The pattern matching swiss knife
google/syzkaller
syzkaller is an unsupervised coverage-guided kernel fuzzer
secfigo/Awesome-Fuzzing
A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis.
mandiant/capa
The FLARE team's open-source tool to identify capabilities in executable files.
rapid7/metasploitable3
Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.
google/google-ctf
Google CTF
google/fuzzing
Tutorials, examples, discussions, research proposals, and other resources related to fuzzing
littlekernel/lk
LK embedded kernel
google-research/t5x
panda-re/panda
Platform for Architecture-Neutral Dynamic Analysis
mrexodia/TitanHide
Hiding kernel-driver for x86/x64.
kevoreilly/CAPEv2
Malware Configuration And Payload Extraction
screetsec/Sudomy
Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
fkie-cad/awesome-embedded-and-iot-security
A curated list of awesome embedded and IoT security resources.
nettitude/PoshC2
A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.
fabrimagic72/malware-samples
A collection of malware samples caught by several honeypots i manage
google/osv.dev
Open source vulnerability DB and triage service.
swagkarna/Defeat-Defender-V1.2.0
Powerful batch script to dismantle complete windows defender protection and even bypass tamper protection ..Disable Windows-Defender Permanently....Hack windows. POC
screetsec/Dracnmap
Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. Hence Dracnmap is designed to perform fast scaning with the utilizing script engine of nmap and nmap can perform various automatic scanning techniques with the advanced commands.
crvvdev/MasterHide
A x64 Windows Rootkit using SSDT or Hypervisor hook
BC-SECURITY/Moriarty
Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in Windows environments.
TinyKern/TinyKernel
Tiny Kernel is a work in progress Operating System kernel.