Paolo Stagno's starred repositories
Detect-It-Easy
Program for determining types of files for Windows, Linux and MacOS.
ScoutSuite
Multi-Cloud Security Auditing Tool
LOLDrivers
Living Off The Land Drivers
exploit_mitigations
Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.
winchecksec
Checksec, but for Windows: static detection of security mitigations in executables
DriverBuddyReloaded
Driver Buddy Reloaded is an IDA Pro Python plugin that helps automate some tedious Windows Kernel Drivers reverse engineering tasks
APT38-0day-Stealer
APT38 Tactic PoC for Stealing 0days from security professionals
serianalyzer
A static byte code analyzer for Java deserialization gadget research
Exploit-Development
Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)
JOP_ROCKET
This framework enables user to discover JOP gagdets and can automate building a complete JOP chain to bypass DEP. JOP ROCKET is the ultimate solution for Windows jump-oriented programming. JOP ROCKET also finds the novel two-gadget dispatcher, which greatly expands what is possible with JOP.
jarjarbigs
A python script to merge multiple jar files for easier debugging via JD-Eclipse
IDAPython-pycharm-setup
How to setup Pycharm to run scripts in IDA using the Run menu (or a keybind)
alpnpass
This tool will listen on a given port, strip SSL encryption, forward traffic through a plain TCP proxy, then encrypt the returning traffic again and send it to the target of your choice. Unlike most SSL stripping solutions this tool will negotiate ALPN and preserve the negotiated protocol all the way to the target.
CycloComplexityCalc
a plugin to calculate complexity of executable's functions
CVE-2015-2291
(1) IQVW32.sys before 1.3.1.0 and (2) IQVW64.sys before 1.3.1.0 in the Intel Ethernet diagnostics driver for Windows allows local users to cause a denial of service or possibly execute arbitrary code with kernel privileges via a crafted (a) 0x80862013, (b) 0x8086200B, (c) 0x8086200F, or (d) 0x80862007 IOCTL call.