Pinned Repositories
60_Days_RL_Challenge
Learn Deep Reinforcement Learning in depth in 60 days
Adhrit
Adhrit is an open source Android APK reversing and analysis tool that can help secuity researchers and CTF enthusiasts alike. The tool is an effort to cut down on the amount of time spent on reversing and basic reconnassaince of Android applications.
graph89
Fork of https://bitbucket.org/dhashoandroid/graph89-free.git
malware-samples-1
A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net
mitmproxy2swagger
Automagically reverse-engineer REST APIs via capturing traffic
ProcessHacker
Fork from http://svn.code.sf.net/p/processhacker/code/ processhacker-code
re-DECTed
tools for playing with DECT
rfcat
Clone of atlas rfcat from https://bitbucket.org/atlas0fd00m/rfcat
scriptkiddi3
Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using shell script and open source tools.
SniffDet
chosen1's Repositories
chosen1/amicontained
Container introspection tool. Find out what container runtime is being used as well as features available.
chosen1/antivirus_demo
Antivirus Demo for Fresh Machine Learning #7
chosen1/arwes
Futuristic Sci-Fi and Cyberpunk Graphical User Interface Framework for Web Apps
chosen1/blackhat-python3
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
chosen1/BrainDamage
Remote administration tool which uses Telegram as a C&C server
chosen1/CatalogScanner
Scans Animal Crossing: New Horizon catalog from video of user scrolling through.
chosen1/CTFd
CTFs as you need them
chosen1/dearg-thread-ipc-stealth
A novel technique to communicate between threads using the standard ETHREAD structure
chosen1/DjangoReactJs
chosen1/DTI
Discord Token Information Tool
chosen1/evilpdf
Embedding executable files in PDF Documents
chosen1/file-upload
minimal file sharing site - self hosted
chosen1/gcp-iam-sentinel-examples
chosen1/gcploit
These are tools we released with our 2020 defcon/blackhat talk https://www.youtube.com/watch?v=Ml09R38jpok
chosen1/generic-bank
Demo online-banking services for Kubernetes
chosen1/insecure-bank
An insecure example application
chosen1/MeGa-RAT-Pack
Remote Administration Tools & Remote access trojans in MEGA RAT PACK by B®AGA
chosen1/PinSwipe
Smart Card PIN swiping DLL
chosen1/ramdisk
Replacement (GUI + windows service) for ImDisk Toolkit - by using Arsenal Image Mounter as a driver for RAM-disks.
chosen1/rumin-web-clipper
Web clipper browser extension for saving highlights, screenshots, and automatically extracting content from web pages.
chosen1/ScoutSuite
Multi-Cloud Security Auditing Tool
chosen1/Serpico
SimplE RePort wrIting and COllaboration tool
chosen1/sleep
Automatically exported from code.google.com/p/sleep
chosen1/ssh-login-alert-telegram
Recieive telegram notfications when user connect to a server
chosen1/SuperWordlist
基于实战沉淀下的各种弱口令字典
chosen1/tda-api
A wrapper around the TD Ameritrade API
chosen1/tsunami-security-scanner
Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence.
chosen1/Unamed_VCS
chosen1/Unnamed_VCS_SFU
chosen1/violent-python3
Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.