Stars
Jenkins RCE Proof-of-Concept: SECURITY-1266 / CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative)
Assortment of various malicious pieces of code. For research purposes.
An Open Source Machine Learning Framework for Everyone
Automatically "block" people in images (like Black Mirror) using a pretrained neural network.
Pseudo library for python, provides custom colored text formatting in a convenient way.
A cross-version Python bytecode decompiler
Hunt down social media accounts by username across social networks
Powerful Python tool to analyze PDF documents
Latest hashcat docker for CUDA, OpenCL, and POCL. Deployed on Vast.ai
A super fast, highly extensible markdown parser for PHP
graffiti sends ASCII-art texts to remote webserver logs using consecutive 404 errors
The Wolfcast BrowserDetection PHP class facilitates the identification of the user's environment such as Web browser, version, platform family, platform version or if it's a mobile device or not.
Infection Monkey - An open-source adversary emulation platform
PEDA - Python Exploit Development Assistance for GDB
This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY
Simple, private file sharing from the makers of Firefox
Working Python test and PoC for CVE-2018-11776, includes Docker lab
Xori is an automation-ready disassembly and static analysis library for PE32, 32+ and shellcode
A Python module to bypass Cloudflare's anti-bot page.
With Selenium headless browsing and CAPTCHA solving
Wiki.js | A modern and powerful wiki app built on Node.js
Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.
Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.
Notebook(s) for research into applied ML for Information Security
Incredibly fast crawler designed for OSINT.
Stalk your Friends. Find their Instagram, FB and Twitter Profiles using Image Recognition and Reverse Image Search.