Stars
Gather and update all available and newest CVEs with their PoC.
State of the art faster Transformer with Tensorflow 2.0 ( NLP, Computer Vision, Audio ).
This tool was created during our research at Checkpoint Software Technologies on Whatsapp Protocol (This repository will be updated after BlackHat 2019)
A JavaScript library aimed at visualizing graphs of thousands of nodes and edges
A simple bash script to Obfuscate | De-Obfuscate bulk malicious domain list
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
An open-source post-exploitation framework for students, researchers and developers.
Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
The goal of this repository is to document the most common techniques to bypass AppLocker.
Quickly analyze and reverse engineer Android packages
ASOC, ASPM, DevSecOps, Vulnerability Management Using ArcherySec.
Curated list of public penetration test reports released by several consulting firms and academic security groups
Netflow is a key component for network traffic monitoring. As high speed technologies such as 10 Gbps or 40 Gbps links are common in a backbone network, it is impossible to monitor traffic via conv…
Post-exploitation tool for hiding processes from monitoring applications
TensorFlow Tutorial and Examples for Beginners (support TF v1 & v2)
🔥 A powerful MongoDB auditing and pentesting tool 🔥
VMware Escape Exploit before VMware WorkStation 12.5.5
Collection of things made during my preparation to take on OSCE
Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.
A list of interesting payloads, tips and tricks for bug bounty hunters.
A curated list of Artificial Intelligence (AI) courses, books, video lectures and papers.
Arbitrary code execution with kernel privileges using CVE-2018-8897.