zkenjar's Stars
rofl0r/proxychains-ng
proxychains ng (new generation) - a preloader which hooks calls to sockets in dynamically linked programs and redirects it through one or more socks/http proxies. continuation of the unmaintained proxychains project. the sf.net page is currently not updated, use releases from github release page instead.
drwetter/testssl.sh
Testing TLS/SSL encryption anywhere on any port
yeyintminthuhtut/Awesome-Red-Teaming
List of Awesome Red Teaming Resources
xairy/linux-kernel-exploitation
A collection of links related to Linux kernel security and exploitation
zmap/zmap
ZMap is a fast single packet network scanner designed for Internet-wide network surveys.
microsoft/onefuzz
A self-hosted Fuzzing-As-A-Service platform
googleprojectzero/winafl
A fork of AFL for fuzzing Windows binaries
rbsec/sslscan
sslscan tests SSL/TLS enabled services to discover supported cipher suites
googleprojectzero/sandbox-attacksurface-analysis-tools
Set of tools to analyze Windows sandboxes for exposed attack surface.
oreboot/oreboot
oreboot is a fork of coreboot, with C removed, written in Rust.
JackOfMostTrades/gadgetinspector
A byte code analyzer for finding deserialization gadget chains in Java applications
federicodotta/Java-Deserialization-Scanner
All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities
NickstaDB/BaRMIe
Java RMI enumeration and attack tool.
OWASP/MASTG-Hacking-Playground
matthiaskaiser/jmet
Java Message Exploitation Tool
Samsung/jalangi2
Dynamic analysis framework for JavaScript
ustwo/mastermind
Man in the middle testing
micromata/http-fake-backend
Build a fake backend by providing the content of JSON files or JavaScript objects through configurable routes.
google/pawn
Extract BIOS firmware from Intel-based workstations and laptops
nccgroup/umap
The USB host security assessment tool
GraxCode/Cafebabe
Easy-to-use java bytecode editor - successor of JByteMod!
impillar/AndroidReferences
Research papers and tools on Android
saswatanand/ella
Binary Instrumentation of Android Apps
micromata/generator-http-fake-backend
Yeoman generator for building a fake backend by providing the content of JSON files or JavaScript objects through configurable routes.
Contrast-Security-OSS/joogle
A static analysis API for finding deserialization attack gadgets
Ayrx/tlsenum
A command line tool to enumerate TLS cipher-suites supported by a server
no-sec-marko/java-web-vulnerabilities
Plattform to develop and experiment with existing java web attacks.
georlav/objectmap
A Simple command line tool that helps checking web applications to identify insecure deserialization vulnerabilities.
ozzi-/consoleSSLlabs
Automate scans using Qualys SSL Labs
AdrianVollmer/tlseraser
Eavesdrop on TLS connections with libpcap