disclose / research-threatsLinks
Collection of legal threats against good faith Security Researchers; vulnerability disclosure gone wrong. A continuation of work started by @attritionorg
☆300Updated 6 months ago
Alternatives and similar repositories for research-threats
Users that are interested in research-threats are comparing it to the libraries listed below
Sorting:
- Checks all maintainers of all NPM and Pypi packages for hijackable packages through domain re-registration☆299Updated last week
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆91Updated 3 years ago
- Artifacts for the Black Hat talk.☆105Updated 5 years ago
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆242Updated 2 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 4 years ago
- Database of polyglot files. By polyglot, we mean files readable in multiple formats☆148Updated 2 months ago
- Reverse engineering basics in puzzle form☆183Updated 5 years ago
- In service of posteriority☆45Updated last month
- ☆231Updated 2 years ago
- CQ, a code security scanner☆100Updated last year
- High speed/Low cost CommonCrawl RegExp in Node.js☆255Updated last year
- The TLS-Scanner Module from TLS-Attacker☆278Updated last week
- A memorial site for Hackers and Infosec people who have passed☆138Updated last week
- ☆45Updated 3 years ago
- A small collection of potentially useful contract templates☆403Updated 2 months ago
- Creosote is our solution to searching for the tarfile vulnerability described by CVE-2007-4559.☆84Updated 2 years ago
- Tools for investigating Log4j CVE-2021-44228☆95Updated 3 years ago
- List of the tools and usage☆234Updated last month
- A CTF framework to create, build, deploy and monitor challenges☆117Updated 4 months ago
- ☆63Updated 2 years ago
- This repo is meant to be a list of companies that hire security people full remote.☆450Updated 2 months ago
- Open source release of challenges and other code used in the Hack-A-Sat 2 Qualifier in 2021.☆67Updated 4 years ago
- An open source intelligence tool to crawl the graph of certificate Alternate Names☆355Updated 3 weeks ago
- scylla.sh db dumps and more☆137Updated 4 years ago
- A CVE Heatmap Using CalPlot☆97Updated 4 years ago
- ncurses-grep: interactively navigate grep-like results☆32Updated last year
- Damn Vulnerable IoT Device☆212Updated last year
- Private key usage verification☆429Updated 4 months ago
- Finding potential software vulnerabilities from git commit messages☆417Updated last year
- A detailed compilation of polyglots [techniques, tools and resources] for offensive and defensive security (malware, incident response, s…☆112Updated 4 years ago