Stars
Cybersecurity AI (CAI), an open Bug Bounty-ready Artificial Intelligence
An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any misuse of this toolkit !
ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing, and command & control attacks through an intuitive graphica…
The devolo dLAN Green PHY module is ideal for installation in all IoT-devices. Includes QCA7000 chipset and LPC1758 host processor.
The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file system data. The library can be incorporated into larger digi…
VSS Hardware Hacking Wiki and Blog Entries
jxscout superpowers JavaScript analysis for security researchers
KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities (Best Practical Paper Award of RAID 2024)
Container runtimes on macOS (and Linux) with minimal setup
SpringBoot 相关漏洞学习资料,利用方法和技巧合集,黑盒安全评估 check list
A friendly car security exploration tool for the CAN bus
macOS® Driver and SDK for USB CAN Interfaces from Kvaser
Linux virtual machines, with a focus on running containers
A collection of links related to Linux kernel security and exploitation
CGI fuzzer for MIPS, created specifically to test binaries belonging to the DSL-3788 router from D-Link
How to create a setup for linux kernel debugging using buildroot
msFuzz is a coverage-guided fuzzer for Windows kernel drivers that utilizes Intel PT and leverages constraint and dependency analysis to guide fuzzing.