Pinned Repositories
algorithmic_trading_book
2 books and related source codes for algorithmic trading.
awesome-network-stuff
Resources about network security, including: Proxy/GFW/ReverseProxy/Tunnel/VPN/Tor/I2P, and MiTM/PortKnocking/NetworkSniff/NetworkAnalysis/etc。More than 1700 open source tools for now. Post incoming.
common-vulnerability-descriptions-from-Burp-and-CAPEC
cve-search
cve-search - a tool to perform local searches for known vulnerabilities
Extract-CVE-details-from-cvedetails.com
scripts to extract vuln. from cvedetails.com into high, medium, low and etc.
Extract-google-first-entry
Extract-vuln-from-Cisco-API
Extract vulnerabilities from through openVulnQuery into csv format
Extract-xpath-cisco-EOL
python script to extract Cisco EOL date through XPATH
Java-zombie
Two java programs: Master controller (commander) and Slave server (zombie). It was created in year 2 as a side project when studying the network programming courser ieg4180.
wishlog's Repositories
wishlog/algorithmic_trading_book
2 books and related source codes for algorithmic trading.
wishlog/awesome-network-stuff
Resources about network security, including: Proxy/GFW/ReverseProxy/Tunnel/VPN/Tor/I2P, and MiTM/PortKnocking/NetworkSniff/NetworkAnalysis/etc。More than 1700 open source tools for now. Post incoming.
wishlog/common-vulnerability-descriptions-from-Burp-and-CAPEC
wishlog/cve-search
cve-search - a tool to perform local searches for known vulnerabilities
wishlog/Extract-CVE-details-from-cvedetails.com
scripts to extract vuln. from cvedetails.com into high, medium, low and etc.
wishlog/Extract-google-first-entry
wishlog/Extract-vuln-from-Cisco-API
Extract vulnerabilities from through openVulnQuery into csv format
wishlog/Extract-xpath-cisco-EOL
python script to extract Cisco EOL date through XPATH
wishlog/Java-zombie
Two java programs: Master controller (commander) and Slave server (zombie). It was created in year 2 as a side project when studying the network programming courser ieg4180.
wishlog/Kvasir
Kvasir: Penetration Test Data Management
wishlog/os-scripts
some notes & pen scripts I've collected
wishlog/penkit
Bash script to build cutomizable pentesting systems.
wishlog/proxy-stuff
Simple script that make use of proxynova's proxy list and check if the returned web proxy can reach Google. Currently proxy_list.txt is down.
wishlog/Red_Team
Some scripts useful for red team activities
wishlog/shadowbroker
The Shadow Brokers "Lost In Translation" leak
wishlog/Smart-Contract-Security-Audits
Certified Smart Contract Audits (Ethereum, Hyperledger, EOS, Tezos) by Chainsulting
wishlog/stix-to-ioc
Python script to parse IOCs from description of STIX-1.1 (FS-ISAC feed)
wishlog/study-notes
personal notes
wishlog/TheSevenWeapons
wishlog/toolbox
toolbox for security assessment
wishlog/windows-scripts
Several windows scripts that help conducting assessment in client site easily. With these scripts, you don't have to remember and type the lengthy command or click the "next next next" again and again.
wishlog/wishlog.github.io
wishlog/www-community
OWASP Community Pages are a place where OWASP can accept community contributions for security-related content.
wishlog/zynos-attacker
ZynOS tool for automated attack on a range of IPs, find more informations at :