savenas's Stars
twitter/the-algorithm
Source code for Twitter's Recommendation Algorithm
sickcodes/Docker-OSX
Run macOS VM in a Docker! Run near native OSX-KVM in Docker! X11 Forwarding! CI/CD for OS X Security Research! Docker mac Containers.
carlospolop/PEASS-ng
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
smicallef/spiderfoot
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
CISOfy/lynis
Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
jopohl/urh
Universal Radio Hacker: Investigate Wireless Protocols Like A Boss
fuzzdb-project/fuzzdb
Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
OWASP/wstg
The Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.
telekom-security/tpotce
🍯 T-Pot - The All In One Multi Honeypot Platform 🐝
rebootuser/LinEnum
Scripted Local Linux Enumeration & Privilege Escalation Checks
The-Z-Labs/linux-exploit-suggester
Linux privilege escalation auditing tool
trustedsec/ptf
The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.
libreddit/libreddit
Private front-end for Reddit
trustedsec/unicorn
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.
thomasdondorf/puppeteer-cluster
Puppeteer Pool, run a cluster of instances in parallel
newsboat/newsboat
An RSS/Atom feed reader for text terminals
kuglee/TermiWatch
Terminal Watch Face for Apple Watch
411Hall/JAWS
JAWS - Just Another Windows (Enum) Script
duckduckgo/tracker-radar
Data set of top third party web domains with rich metadata about them
3ndG4me/AutoBlue-MS17-010
This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010
intel/compute-runtime
Intel® Graphics Compute Runtime for oneAPI Level Zero and OpenCL™ Driver
arthepsy/CVE-2021-4034
PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)
jychp/cloudflare-bypass
Bypass Coudflare bot protection using Cloudflare Workers
CUCyber/ja3transport
Impersonating JA3 signatures
MISP/misp-taxonomies
Taxonomies used in MISP taxonomy system and can be used by other information sharing tool.
microsoft/data-protection-mapping-project
Open Source Data Protection/Privacy Regulatory Mapping Project
IndeedMiners/PolarisBiosEditor
Polaris Bios Editor PBE 1.7.6
jayluxferro/Cookie-Editor
Cookie Editor extension for Safari
vibenas/Cybersecurity-Lithuania-Map
Map of Cybersecurity Sector in Lithuania
purple-WL/wordpress-CVE-2022-21661