uvicorn's Stars
TheBlupper/linineq
Functions for solving linear inequalities in integers
icemonster/symbolic_mersenne_cracker
Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs
rkm0959/Inequality_Solving_with_CVP
CVP "trick" for CTF challenges
ajinabraham/nodejsscan
nodejsscan is a static security code scanner for Node.js applications.
iagox86/hash_extender
AdvDebug/NoMoreCookies
Browser Protector against various stealers, written in C# & C/C++.
vykt/liblain
Process manipulation library for Linux.
matro7sh/BypassAV
This map lists the essential techniques to bypass anti-virus and EDR
athul/archie
A minimal Hugo Theme
A-poc/RedTeam-Tools
Tools and Techniques for Red Team / Penetration Testing
lirantal/awesome-nodejs-security
Awesome Node.js Security resources
paragonie/awesome-appsec
A curated list of resources for learning about application security
defund/coppersmith
Coppersmith's method for multivariate polynomials
B3nac/Android-Reports-and-Resources
A big list of Android Hackerone disclosed reports and other resources.
tanprathan/MobileApp-Pentest-Cheatsheet
The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics.
binsync/binsync
A reversing plugin for cross-decompiler collaboration, built on git.
imadr/Unity-game-hacking
A guide for hacking unity games
fareedfauzi/Flare-On-Challenges
This repo is aim to compile all Flare-On challenge's binaries. Update: 2014 -2022.
yonlif/0x41414141-CTF-writeups
Our solutions for the 0x41414141 CTF
pschanely/CrossHair
An analysis tool for Python that blurs the line between testing and type systems.
snoopysecurity/Vulnerable-Code-Snippets
A small collection of vulnerable code snippets
torch2424/wasmboy
Game Boy / Game Boy Color Emulator Library, 🎮written for WebAssembly using AssemblyScript. 🚀Demos built with Preact and Svelte. ⚛️
FrenchYeti/dexcalibur
[Official] Android reverse engineering tool focused on dynamic instrumentation automation leveraging Frida. It disassembles dex, analyzes it statically, generates hooks, discovers reflected methods, stores intercepted data and does new things from it. Its aim is to be an all-in-one Android reverse engineering platform.
amlweems/hexpand
Hash Length Extension Attack
evilpan/jni_helper
Find JNI function signatures in APK and apply to reverse-engineering tools.
rasta-mouse/ThreatCheck
Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.
airbus-cert/ttddbg
Time Travel Debugging IDA plugin
mandiant/flare-emu
hyprwired/untwister
Seed recovery tool for PRNGs
alufers/mitmproxy2swagger
Automagically reverse-engineer REST APIs via capturing traffic