CyberT17 / secblogsLinks
Security Blogs - A simple aggregator for security news/blog
☆24Updated last month
Alternatives and similar repositories for secblogs
Users that are interested in secblogs are comparing it to the libraries listed below
Sorting:
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆51Updated 2 months ago
- Detection Engineering Tools☆16Updated 3 weeks ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆54Updated 9 months ago
- Proof-of-concept modular implant platform leveraging v8☆56Updated 7 months ago
- ThingFinder is a tool designed to facilitate searching and analysing code, whether it's source code or compiled binary executables. It pr…☆38Updated last year
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆35Updated this week
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆83Updated last year
- A feed of malware samples curated from threat intelligence sources.☆28Updated 2 years ago
- Frida plugin for Binary Ninja☆18Updated 8 months ago
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- BINARLY Research Tools and PoCs☆37Updated last year
- A simple Meterpreter stager written in Rust.☆40Updated last week
- ☆33Updated 10 months ago
- ☆39Updated last year
- Authenticated 0-click RCE against Linux 6.1.45 for CVE-2023-52440 and CVE-2023-4130☆48Updated 3 weeks ago
- ☆32Updated 7 months ago
- ☆38Updated 9 months ago
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆67Updated 2 years ago
- Reverse engineering assistant that extracts strings and related pseudocode from a binary file.☆67Updated last week
- ☆18Updated 8 months ago
- Binary Exploitation Phrack CTF Challenge☆65Updated last month
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆79Updated 2 months ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated last year
- Scripts to help and speed up reversing activities☆10Updated 9 months ago
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆18Updated 4 months ago
- ☆24Updated last month
- Vovk is framework of tools that include a WinDbg extension that generates in-depth YARA rules for malware.☆23Updated last year
- Leverages B64 chunks to split files and save to clipboard☆26Updated 5 months ago
- ☆22Updated last month
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆14Updated 10 months ago