disclose / research-threats
Collection of legal threats against good faith Security Researchers; vulnerability disclosure gone wrong. A continuation of work started by @attritionorg
☆295Updated 3 weeks ago
Alternatives and similar repositories for research-threats:
Users that are interested in research-threats are comparing it to the libraries listed below
- Checks all maintainers of all NPM and Pypi packages for hijackable packages through domain re-registration☆291Updated this week
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆209Updated 4 years ago
- CQ, a code security scanner☆99Updated 9 months ago
- Methodology for high-quality web application security testing - https://github.com/tprynn/web-methodology/wiki☆202Updated 3 months ago
- List of the tools and usage☆232Updated 2 years ago
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆241Updated 2 years ago
- IPFuscator - A tool to automatically generate alternative IP representations☆357Updated last year
- An open source intelligence tool to crawl the graph of certificate Alternate Names☆346Updated last year
- A wordlist that is kept up to date with the latest headlines to provide relevant words to human society☆119Updated 2 years ago
- Burp with Friends☆101Updated 2 years ago
- A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation☆230Updated 4 years ago
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆348Updated 4 years ago
- Tools for investigating Log4j CVE-2021-44228☆95Updated 3 years ago
- ☆45Updated 3 years ago
- ☆77Updated 8 months ago
- High speed/Low cost CommonCrawl RegExp in Node.js☆245Updated 10 months ago
- JIRA Secure Attachment Looter☆69Updated 4 years ago
- ☆376Updated 3 years ago
- ☆83Updated 8 months ago
- Binary Golf Grand Prix☆111Updated last year
- Open a DNS server that knows no records but records every request. Used for DNS exfiltration.☆68Updated 3 years ago
- materials we hand out☆141Updated last week
- scylla.sh db dumps and more☆134Updated 4 years ago
- A Passive SSH back-end and scanner.☆103Updated 8 months ago
- Private key usage verification☆424Updated 2 months ago
- An Open Letter to the OWASP Board☆106Updated last year
- Finding potential software vulnerabilities from git commit messages☆408Updated last year
- A small collection of potentially useful contract templates☆383Updated 2 years ago
- Database of polyglot files. By polyglot, we mean files readable in multiple formats☆128Updated 6 years ago
- XS-Leak Browser Test Suite☆75Updated last year