Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attributes. This all includes tools to work with anything in general that makes changes to a system for the purposes of hiding information.
created at May 27, 2019, 4:38 p.m.
A collection of awesome videos, articles, books and resources about ARM exploitation.
created at June 30, 2019, 3:09 p.m.
finds publicly known security vulnerabilities in a website's frontend JavaScript libraries
created at Oct. 5, 2019, 10:52 a.m.
Dig Vulnerabilities in the BlackBox
created at Oct. 22, 2019, 1:19 a.m.
Static Application Security Testing (SAST) engine focused on covering the OWASP Top 10, to make source code analysis to find vulnerabilities right in the source code, focused on a agile and easy to implement software inside your DevOps pipeline. Support the following technologies: Java (Maven and Android), Kotlin (Android), Swift (iOS), .NET Full Framework, C#, and Javascript (Node.js).
created at Nov. 12, 2019, 8:07 p.m.
Open source cloud native security observability platform. Linux, K8s, AWS Fargate and more.
created at Feb. 6, 2020, 10:30 a.m.
CrowdSec - the open-source and participative security solution offering crowdsourced protection against malicious IPs and access to the most advanced real-world CTI.
created at May 15, 2020, 9:38 a.m.
A curated list of awesome resources about Electron.js (in)security
created at June 1, 2020, 10:02 a.m.
List of Bluetooth BR/EDR/LE security resources
created at June 21, 2020, 6:27 p.m.
A curated Cyber "Security Orchestration, Automation and Response (SOAR)" awesome list.
created at July 15, 2020, 2:11 a.m.
Find secrets and passwords in container images and file systems
created at Aug. 22, 2020, 5:43 a.m.
Swiss army knife for identifying and fingerprinting Android devices. MIT license, no restrictions on usage in production.
created at Oct. 20, 2020, 2:46 p.m.