Stars
A set of Linux binary exploitation tasks for beginners on various architectures
My proof-of-concept exploits for the Linux kernel
A collection of links related to VMware escape exploits
A collection of links related to Linux kernel security and exploitation
nodejsscan is a static security code scanner for Node.js applications.
Tweaks to make Windows 10 less annoying and more usable
The Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes the technical processes for verifying the contr…
A curated list of Site Reliability and Production Engineering resources.
Course materials for Modern Binary Exploitation by RPISEC
Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
Checklist of the most important security countermeasures when designing, testing, and releasing your API
Google Chrome Extension automates testing fundamental Web Problems via Chrome
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Writeups for infosec Capture the Flag events by team Galaxians
Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabling collaboration to tackle trending vulnerabilities on the …
SSL Front-End Proxy With Automatic Free Certificate Management
DYANAS: nonlinear DYnamic ANAlysis of Single-degree-of-freedom systems, an open-source graphical user interface for OpenSees
A database of PHP security advisories
A toolset to make a system look as if it was the victim of an APT attack
Automate the creation of a lab environment complete with security tooling and logging best practices
Microsoft » Windows 10 : Security Vulnerabilities
Automated Red Team Infrastructure deployement using Docker
Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the active and passive scanner by means of personalized rules thro…