-
00:56
(UTC -12:00)
Block or Report
Block or report igusil
Contact GitHub support about this user’s behavior. Learn more about reporting abuse.
Report abuseLanguage
Sort by: Recently starred
Starred repositories
🇺🇦 Windows driver with usermode interface which can hide processes, file-system and registry objects, protect processes and etc
OWASP based Web Application Security Testing Checklist is an Excel based checklist which helps you to track the status of completed and pending test cases.
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 solely and completely with "BurpSuite".
0xEC99 / RansomWatch
Forked from salemarsm/RansomWatchRansomware detection application for Windows using Windows Minifilter driver
Vagrant VirtualBox environment for conducting an internal network penetration test
Bluetooth-LE-Spam is a project made by simondankelmann, you can get it from his Repositories: https://github.com/simondankelmann/Bluetooth-LE-Spam
This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter
A simple tutorial on how to do reverse engineer and code injection on AMI BIOSes (Legacy)
Magnolia enables access to tools and games directly from a computer's BIOS
Repositório criado com intuito de reunir informações, fontes(websites/portais) e tricks de OSINT dentro do contexto Brasil.
A series of mini-projects used to learn C for beginners
Patches needed to build VMware (Player and Workstation) host modules against recent kernels
Demonized Shell is an Advanced Tool for persistence in linux.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
This is a curated list of mobile based CTFs, write-ups and vulnerable apps. Most of them are android based due to the popularity of the platform.
Conteúdo em português sobre segurança em Dispositivos Móveis.
📚 Freely available programming books
Algorithmic, Data Structures, Frontend and Pentest - Programming challenges and competitions to improve knowledge.
Hex patterns, include patterns and magic files for the use with the ImHex Hex Editor