desegel's Stars
juliocesarfort/public-pentesting-reports
A list of public penetration test reports published by several consulting firms and academic security groups.
falcosecurity/falco
Cloud Native Runtime Security
shellphish/how2heap
A repository for learning various heap exploitation techniques.
facebookarchive/fbctf
Platform to host Capture the Flag competitions
zrax/pycdc
C++ python bytecode disassembler and decompiler
DataSploit/datasploit
An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the raw data, and give data in multiple formats.
ThreatHuntingProject/ThreatHunting
An informational repo about hunting for adversaries in your IT environment.
mandatoryprogrammer/NorthKoreaDNSLeak
Snapshot of North Korea's DNS data taken from zone transfers.
EmpireProject/EmPyre
A post-exploitation OS X/Linux agent written in Python 2.7
hasherezade/demos
Demos of various injection techniques found in malware
a0rtega/metame
metame is a metamorphic code engine for arbitrary executables
Lazza/RecuperaBit
A tool for forensic file system reconstruction.
misterch0c/malSploitBase
Malware exploits
intezer/linux-explorer
Easy-to-use live forensics toolbox for Linux endpoints
pfalcon/ScratchABit
Easily retargetable and hackable interactive disassembler with IDAPython-compatible plugin API
ANSSI-FR/polichombr
Collaborative malware analysis framework
intezer/docker-ida
Run IDA Pro disassembler in Docker containers for automating, scaling and distributing the use of IDAPython scripts.
Cisco-Talos/ROPMEMU
ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.
nettitude/Prowl
FSecureLABS/Azurite
Enumeration and reconnaissance activities in the Microsoft Azure Cloud.
mechaphish/mecha-docs
Documentation for the Mechanical Phish.
r00tkillah/HORSEPILL
HORSEPILL rootkit PoC
betab0t/cve-2017-7494
Proof-of-Concept exploit for CVE-2017-7494(Samba RCE from a writable share)
AlienVault-OTX/yabin
A Yara rule generator for finding related samples and hunting
ricardojrdez/anti-analysis-tricks
Bunch of techniques potentially used by malware to detect analysis environments
CvvT/AppTroy
An Online Analysis System for Packed Android Malware
DavidKorczynski/RePEconstruct
AdamGreenhill/VirusShare-Search
Downloads VirusShare hashes (https://virusshare.com/hashes.4n6) and searches them for specified MD5 hashes
secops4thewin/TA-intezer
This app leverages the Adaptive Response framework to search against the intezer analyze APIs
yarox24/binent
Cross-platform entropy calculation script with filtering and custom-block size options.