disclose / research-threatsLinks
Collection of legal threats against good faith Security Researchers; vulnerability disclosure gone wrong. A continuation of work started by @attritionorg
☆310Updated 10 months ago
Alternatives and similar repositories for research-threats
Users that are interested in research-threats are comparing it to the libraries listed below
Sorting:
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆94Updated 3 years ago
- Reverse engineering basics in puzzle form☆183Updated 5 years ago
- Database of polyglot files. By polyglot, we mean files readable in multiple formats☆153Updated 6 months ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 5 years ago
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆244Updated 3 years ago
- ☆45Updated 4 years ago
- Artifacts for the Black Hat talk.☆104Updated 5 years ago
- Checks all maintainers of all NPM and Pypi packages for hijackable packages through domain re-registration☆302Updated last week
- A memorial site for Hackers and Infosec people who have passed☆137Updated 2 months ago
- CQ, a code security scanner☆100Updated last year
- In service of posteriority☆44Updated 4 months ago
- The TLS-Scanner Module from TLS-Attacker☆280Updated 2 months ago
- Tools for investigating Log4j CVE-2021-44228☆94Updated 3 years ago
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search☆190Updated last year
- Trail of Bits Testing Handbook☆87Updated 2 weeks ago
- Slides for Reverse Engineering 101 in 20 minutes as presented at Pancakes Con☆126Updated 5 years ago
- Finding potential software vulnerabilities from git commit messages☆418Updated 2 years ago
- An open source intelligence tool to crawl the graph of certificate Alternate Names☆360Updated 3 months ago
- A CVE Heatmap Using CalPlot☆97Updated 4 years ago
- A small collection of potentially useful contract templates☆411Updated 6 months ago
- Coverage-based fuzzer for python applications☆237Updated 3 years ago
- A CTF framework to create, build, deploy and monitor challenges☆118Updated 3 months ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆77Updated 4 years ago
- Open a DNS server that knows no records but records every request. Used for DNS exfiltration.☆69Updated 3 years ago
- Private key usage verification☆432Updated 8 months ago
- Pwn2Win 2020 Challenges☆55Updated 4 years ago
- ☆82Updated 3 years ago
- scylla.sh db dumps and more☆139Updated 2 weeks ago
- A collection of scanned, high-resolution Hacker / Information Security Stickers from various conferences☆46Updated 5 years ago
- Qubes containerization on Windows☆130Updated 4 years ago