Java decompiler, assembler, and disassembler
updated at April 18, 2024, 6:39 p.m.
An engine to make Tor network your default gateway
updated at April 19, 2024, 1:31 p.m.
Collection of the cheat sheets useful for pentesting
updated at April 19, 2024, 5 p.m.
Empire is a PowerShell and Python post-exploitation agent.
updated at April 19, 2024, 7:09 p.m.
🎬 A curated list of movies every hacker & cyberpunk must watch.
updated at April 19, 2024, 9:07 p.m.
Capstone disassembly/disassembler framework for ARM, ARM64 (ARMv8), BPF, Ethereum VM, M68K, M680X, Mips, MOS65XX, PPC, RISC-V(rv32G/rv64G), SH, Sparc, SystemZ, TMS320C64X, TriCore, Webassembly, XCore and X86.
updated at April 20, 2024, 7:56 a.m.
The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file system data. The library can be incorporated into larger digital forensics tools and the command line tools can be directly used to find evidence.
updated at April 20, 2024, 10:45 a.m.
A tool for bug hunting or pentesting for targeting websites that have open .git repositories available in public
updated at April 20, 2024, 10:57 a.m.
Kaitai Struct: declarative language to generate binary data parsers in C++ / C# / Go / Java / JavaScript / Lua / Nim / Perl / PHP / Python / Ruby
updated at April 20, 2024, 5:10 p.m.
An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
updated at April 20, 2024, 7:30 p.m.