

bugcrowd/bugcrowd_university Open source education content for the researcher community.google/sandbox-attacksurface-analysis-tools Set of tools to analyze and attack Windows sandboxes.arm-software/arm-trusted-firmware Read-only mirror of Trusted Firmware-A.dominicbreuker/pspy Monitor linux processes without root permissions.miek/inspectrum Offline radio signal analyser.david942j/one_gadget The best tool for finding one gadget RCE in libc.so.6.osirislab/hack-night Hack Night is an open weekly training session run by the OSIRIS lab.yelp/detect-secrets An enterprise friendly way of detecting and preventing secrets in code.nbs-system/php-malware-finder Detect potentially malicious PHP files.Find their Instagram, FB and Twitter Profiles using Image Recognition and Reverse Image Search. thoughtfuldev/eagleeye Stalk your Friends.cure53/httpleaks HTTPLeaks - All possible ways, a website can leak HTTP requests.

dgiese/dustcloud Xiaomi Smart Home Device Reverse Engineering and Hacking.google/martian Martian is a library for building custom HTTP/S proxies.


y-vladimir/smartdeblur Restoration of defocused and blurred photos/images.chipsec/chipsec Platform Security Assessment Framework.darthton/blackbone Windows memory hacking library.bloodhoundad/bloodhound Six Degrees of Domain Admin.Recon&InfoGather&SubDomainDiscovery&OSINT.Pentest&Offensive&PentestFramework&PostExp.Communication&Proxy&RverseProxy&Tunnel.WellKnownVulnerability&CVE&SpecificProduct.Vulnerability&BugHunting&Exploit&Fuzzing.AI&MachineLearning&DeepLearning&NeturalNetwork.The page You see here is a stripped version: Repos with less than 200 stars and last modified more than 500 days ago are not included.Ĭheck FULL version here: English Version-Full Directory
