shalekesan's Repositories
shalekesan/advisories
SSD Secure Disclosure Advisories
shalekesan/androguard
Reverse engineering, Malware and goodware analysis of Android applications ... and more (ninja !)
shalekesan/APT_Digital_Weapon
Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.
shalekesan/awesome-vehicle-security
🚗 A curated list of resources for learning about vehicle security and car hacking.
shalekesan/BurpSuite-Secret_Finder
Burp Suite extension to discover apikeys/accesstokens and sensitive data from HTTP response.
shalekesan/CVE-2019-1759-csrf-js-rce
Bolt-cms 3.6.10 Csrf -> xss -> rce
shalekesan/CVE-2019-7482
CVE-2019-7482 tracking
shalekesan/CVE-2020-0796
CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost
shalekesan/CVE-2020-0796-LPE
SMBGHOST local privilege escalation
shalekesan/DroidCC
Android malware detection using deep learning, contains android malware samples, papers, tools etc.
shalekesan/elk-detection-lab
An ELK environment containing interesting security datasets.
shalekesan/FACT_core
Firmware Analysis and Comparison Tool
shalekesan/flare-fakenet-ng
FakeNet-NG - Next Generation Dynamic Network Analysis Tool
shalekesan/FlowDroid
FlowDroid Static Data Flow Tracker
shalekesan/fuzzing
Tutorials, examples, discussions, research proposals, and other resources related to fuzzing
shalekesan/geneva
client-side censorship evasion engine from the Geneva AI
shalekesan/imaginaryC2
Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which captures HTTP requests towards selectively chosen domains/IPs. Additionally, the tool aims to make it easy to replay captured Command-and-Control responses/served payloads.
shalekesan/inetutils-CVE-2019-0053-Patched-PKGBUILD
A patched Arch Linux PKGBUILD to address CVE-2019-0053 (buffer overflow). Downloads and applies a (currently) unreleased patch from upstream.
shalekesan/JSScanner
You can readup the writeup on this script here
shalekesan/klee
KLEE Symbolic Execution Engine
shalekesan/mimikatz
A little tool to play with Windows security
shalekesan/misc
shalekesan/PoisonHandler
lateral movement techniques that can be used during red team exercises
shalekesan/RogueWinRM
Windows Local Privilege Escalation from Service Account to System
shalekesan/sdwan-harvester
:globe_with_meridians: Automatically enumerate and fingerprint SD-WAN nodes on the internet
shalekesan/SecToolSet
The security tool(project) Set from github。github安全项目工具集合
shalekesan/security_w1k1
collect
shalekesan/UEFITool
UEFI firmware image viewer and editor
shalekesan/WALA
T.J. Watson Libraries for Analysis
shalekesan/WindowsInternals
Windows Internals Book 7th edition Tools