Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
CMS渗透测试框架-A CMS Exploit Framework
Raspberry PI-TIMOLO ( PI-TImelapse, MOtion, LOwLight ) uses RPI picamera and OpenCV for Remote Headless Security Monitoring using Motion Tracking, Rcl...
Two-factor authentication for Symfony applications 🔐
Vulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
umbrella project for emulation of smart card readers or smart cards
Ansible Role - iptables Firewall configuration.
PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with ty...
Hacker, ready for more of our story ! 🚀
The source repository for the Trusted Platform Module (TPM2.0) tools
By Kprobe technology Open Source Host-based Intrusion Detection System(HIDS), from E_Bwill.
Bluetooth Low Energy (BLE) packet sniffer and transmitter for both standard and non standard (raw bit) based on Software Defined Radio (SDR).
wolfMQTT is a small, fast, portable MQTT client implementation, including support for TLS 1.3.
A tiny web auditor with strong opinions.
Encrypted, secure, user-owned productivity suite
The best way to scan for weak ssh passwords on your network
Build your own privacy and security focused Android OS in the cloud.
A Deep Graph-based Toolbox for Fraud Detection
Read local Chrome cookies without root or decrypting
A tool designed to assist with finding all sinks and sources of a web application and display these results in a digestible manner.
Multiplatform reverse shell generator
Dradis Framework: Colllaboration and reporting for IT Security teams
The Ultimate Boilerplate for Products.
High-speed secure pseudorandom function for short messages
🔐 API key permissions for Django REST Framework
Keyfinder🔑 is a tool that let you find keys while surfing the web!
Multi-threaded AWS inventory collection tool with a focus on security-relevant resources and metadata.
This package helps you to associate users with permissions and permission groups with laravel framework
swiss army knife for hackers
A sensible, modern pastebin.
Meltdown Exploit / Proof-of-concept / checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN.
The PHP extension for libsodium.
Build Content-Security-Policy headers from a JSON file (or build them programmatically)
🔒Unified API for password hashing algorithms
Collection of IT whitepapers, presentations, pdfs; hacking, web app security, db, reverse engineering and more; EN/PL.
ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library that makes it easier for programmers to wri...
Go implementation of The Update Framework (TUF)
Pure Go implementation of the NaCL set of API's
A Collection of Vulnerabilities in ERC20 Smart Contracts With Tokens Affected
404 Not Found的知识库:计算机理论基础、计算机技术基础、底层研究、安全技术、安全研究、人工智能、企业安全建设、安全发展、职业规划、综合素质、国内外优秀...
RetroWrite -- Retrofitting compiler passes through binary rewriting
Burp-Automator: A Burp Suite Automation Tool with Slack Integration. It can be used with Jenkins and Selenium to automate Dynamic Application Security...
A free utility that finds malware, adware and other security threats
A PHP SVG/XML Sanitizer
An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.
Java library for secure, distributed, P2P-based file synchronization and sharing.
Light-weight, secure and modular VPN solution which makes use of NaCl encryption (also available for Android using jnacl in "sigmavpn-android")
Fuzzing cryptographic libraries. Magic bug printer go brrrr.
:angry: Go IP/port scanner with SYN (stealth) scanning and device manufacturer identification
a browser extension to bring security and privacy to chrome, firefox, and opera
📝 Generating, validating and processing secure forms in PHP. Handy API, fully customizable, server & client side validation and mature design.