Pinned Repositories
andcpc
Amstrad CPC emulator for android
argp-standalone
curl-android
DFIRbus
DFIR automation tool based on REbus
irssi-android
scapybase
screen-android
sysstat-android
tinyproxy
xmpp-tunnel
jahrome's Repositories
jahrome/DFIRbus
DFIR automation tool based on REbus
jahrome/ffmpeg-android
jahrome/gst-plugins-bad
jahrome/gst-plugins-base
jahrome/gst-plugins-good
jahrome/gst-plugins-ugly
jahrome/android
Misc Android stuff
jahrome/android_bionic
Android Bionic Library (cyanogenmod)
jahrome/android_device_htc_vision
Device repository for HTC Vision
jahrome/android_external_bash
Bourne Again SHell, ported to android
jahrome/android_external_dropbear
Dropbear for Android
jahrome/android_external_webkit
Webkit for Android (CyanogenMod)
jahrome/android_frameworks_base
Android base frameworks (cyanogenmod)
jahrome/android_packages_apps_Gallery3D
Android Gallery3D Application
jahrome/android_system_core
Android System Core (CM)
jahrome/android_vendor_cyanogen
CyanogenMod Android vendor tree
jahrome/gstreamer_aggregate
jahrome/proxychains
proxychains - a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy. Supported auth-types: "user/pass" for SOCKS4/5, "basic" for HTTP.
jahrome/QuickSearchBox
jahrome/tabview
Python curses command line CSV viewer
jahrome/blackarch
BlackArch Linux is a lightweight expansion to Arch Linux for pentesters and security researchers.
jahrome/cloud-custodian
Rules engine for AWS management, DSL in yaml for query, filter, and actions on resources
jahrome/cuckoo
Cuckoo Sandbox is an automated dynamic malware analysis system
jahrome/django-DefectDojo
DefectDojo is a DevSecOps and vulnerability management tool.
jahrome/INDXParse
Tool suite for inspecting NTFS artifacts.
jahrome/mitmproxy
An interactive SSL-capable intercepting HTTP proxy for penetration testers and software developers
jahrome/radare2
unix-like reverse engineering framework and commandline tools
jahrome/sleuthkit
The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file system data. The library can be incorporated into larger digital forensics tools and the command line tools can be directly used to find evidence.
jahrome/vim-ipython
A two-way integration between Vim and IPython 0.11+
jahrome/viper
Binary analysis framework