Skip to content
View plo-'s full-sized avatar

Block or report plo-

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.

Python 678 83 Updated Sep 10, 2024

zlib replacement with optimizations for "next generation" systems.

C 1,537 254 Updated Sep 12, 2024

Fork of the popular zip manipulation library found in the zlib distribution.

C 1,216 429 Updated Jul 5, 2024

A massively spiffy yet delicately unobtrusive compression library.

C 5,581 2,431 Updated Sep 1, 2024

Zip Slip Vulnerability (Arbitrary file write through archive extraction)

728 114 Updated Jul 7, 2024

Fuzz testing for go.

Go 1,493 119 Updated Nov 7, 2022

Randomized testing for Go

Go 4,753 276 Updated Feb 3, 2024

Open source code from the Zocdoc Information Security (ZocSec) SecurityAsCode initiative. Use AWS's in-built technologies to automate the remediation of common security problems.

Python 9 5 Updated Oct 2, 2023

Database of images from various digital cameras

PostScript 101 43 Updated Jul 29, 2024

Bandit is a tool designed to find common security issues in Python code.

Python 6,332 597 Updated Aug 26, 2024

A collection of malware samples and relevant dissection information, most probably referenced from https://blog.inquest.net

ActionScript 880 191 Updated Mar 26, 2024

PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in #phishingkit , maintained by @neonprimetime

Python 98 16 Updated Jan 11, 2022

The best way to write secure and reliable applications. Write nothing; deploy nowhere.

Dockerfile 60,375 4,717 Updated Aug 7, 2024

Ghidra is a software reverse engineering (SRE) framework

Java 50,494 5,772 Updated Sep 12, 2024

Code for the paper "Language Models are Unsupervised Multitask Learners"

Python 22,236 5,474 Updated Aug 14, 2024

Go Perceptual image hashing package

Go 734 70 Updated Jan 21, 2024

Fast linters runner for Go

Go 15,314 1,365 Updated Sep 12, 2024
C 235 85 Updated Feb 13, 2019

Python-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network.

Jupyter Notebook 322 59 Updated Sep 11, 2024

Modlishka. Reverse Proxy.

Go 4,789 875 Updated Apr 19, 2024

GRR Rapid Response: remote live forensics for incident response

Python 4,748 761 Updated Sep 10, 2024

Standard Go Project Layout

Makefile 48,361 5,067 Updated Jul 7, 2024

A very simple framework for state-of-the-art Natural Language Processing (NLP)

Python 13,809 2,091 Updated Sep 10, 2024

A C library for parsing/normalizing street addresses around the world. Powered by statistical NLP and open geo data.

C 4,033 416 Updated Aug 14, 2024

defeating the latest version of ReCaptcha with 91% accuracy

Python 4,955 462 Updated Jan 18, 2019

A tool for exploring each layer in a docker image

Go 45,451 1,731 Updated Jul 15, 2024

A toolkit for Security Researchers

Python 124 36 Updated Sep 2, 2019

Named vulnerabilities and their practical impact

430 31 Updated Dec 23, 2021

A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!

33 8 Updated Nov 17, 2018

Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which captures HTTP requests towards selectively chosen domains/IP…

Python 444 69 Updated Oct 26, 2022