Displaying 1 to 7 from 7 results

h4cker - This repository is primarily maintained by Omar Santos and includes resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more

  •    Java

This repository includes thousands of cybersecurity-related references and resources and it is maintained by Omar Santos. This GitHub repository has been created to provide supplemental material to several books, video courses, and live training created by Omar Santos and other co-authors. It provides over 6,000 references, scripts, tools, code, and other resources that help offensive and defensive security professionals learn and develop new skills. This GitHub repository provides guidance on how build your own hacking environment, learn about offensive security (ethical hacking) techniques, vulnerability research, exploit development, reverse engineering, malware analysis, threat intelligence, threat hunting, digital forensics and incident response (DFIR), includes examples of real-life penetration testing reports, and more. These courses serve as comprehensive guide for any network and security professional who is starting a career in ethical hacking and penetration testing. It also can help individuals preparing for the Offensive Security Certified Professional (OSCP), the Certified Ethical Hacker (CEH), CompTIA PenTest+ and any other ethical hacking certification. This course helps any cyber security professional that want to learn the skills required to becoming a professional ethical hacker or that want to learn more about general hacking methodologies and concepts.

sAINT - :eye: (s)AINT is a Spyware Generator for Windows systems written in Java.

  •    Java

(s)AINT is a Spyware Generator for Windows systems written in Java. 💻 This project was created only for good purposes and personal use.

dojos - This is where the Novoda team do all their hacking

  •    Java

Find the module of the dojo you want to attempt. This will be a module under the root dir. Inside you will either find the default directory or a specific language directory. If you only find the default directory, follow these instructions. Once the folder structure has been updated properly you can continue, make a copy of the default project of whichever language you want to run the kata with.

droid_controller - Control the parameters of an Android system with the power of Xposed framework

  •    Java

Control the parameters of an Android system with the power of Xposed framework. 通过Xposed框架控制Android参数。




Umbrella_android - Digital and Physical Security Advice App

  •    Java

Umbrella is an Android mobile app developed by Security First that provides human rights defenders with the information on what to do in any given security situation and the tools to do it. It allows the user to choose what they want to do, such as: protect data; securely make a call/email; securely access the internet; plan secure travel; protect their office/home; conduct counter-surveillance; or deal with kidnapping, arrest or evacuation. Once a situation is chosen, the app outlines what to do and what tools to use given your circumstances. This is followed by a simple checklist of recommended actions that can be customised, saved and shared securely. Umbrella’s dashboard also provides users with an up-to-the-minute account of potential risks in their chosen location. Umbrella is designed for everyone (people looking to increase their security, folks living in high risk areas, regular travellers, business people, techies, journalists, NGO staff, aid workers, human rights defenders, social workers, environmental activists etc).

Jenkins-PreAuth-RCE-PoC - :smiling_imp: Jenkins RCE PoC

  •    Java

:smiling_imp: Jenkins RCE PoC. From unauthenticated user to remote code execution - it's a hacker's dream! (Chaining CVE-2019-1003000, CVE-2018-1999002, and more)

CTF-writeups-public - Writeups for infosec Capture the Flag events by team Galaxians

  •    Java

I like to participate in Capture The Flag events; computer security/hacking competitions which generally consist of participants breaking, investigating, reverse engineering and doing anything they can think of to reach the end goal; the flag, which is usually a specific string of text. For a list of upcoming events and more writeups, see CTFtime.