liebhartdevelopment's starred repositories

MagiskOnWSA

Integrate Magisk root and Google Apps (OpenGApps) into WSA (Windows Subsystem for Android)

License:AGPL-3.0Stargazers:17338Issues:0Issues:0

byob

An open-source post-exploitation framework for students, researchers and developers.

Language:PythonLicense:GPL-3.0Stargazers:8799Issues:328Issues:497

log4j-scan

A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228

Language:PythonLicense:MITStargazers:3362Issues:57Issues:84

OSINT

Collections of tools and methods created to aid in OSINT collection

chainsaw

Rapidly Search and Hunt through Windows Forensic Artefacts

Language:RustLicense:GPL-3.0Stargazers:2566Issues:50Issues:86

EggShell

iOS/macOS/Linux Remote Administration Tool

Language:Objective-CLicense:GPL-2.0Stargazers:1618Issues:113Issues:133

Androl4b

A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis

Ukraine-Cyber-Operations

Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for additional free threat intelligence. Slava Ukraini. Glory to Ukraine.

Django-4-by-example

Django 4 by example (4th Edition) published by Packt

Language:PythonLicense:MITStargazers:739Issues:30Issues:46

iLEAPP

iOS Logs, Events, And Plist Parser

Language:PythonLicense:MITStargazers:647Issues:26Issues:64

log4j-payload-generator

Log4j jndi injects the Payload generator

JPGtoMalware

It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganography methods. However, since the payload in the JPG file is encrypted, it cannot be easily decrypted. It also uses the "garbage code insertion/dead-code insertion" method to prevent the payload from being caught by the antivirus at runtime.

Language:PythonLicense:NOASSERTIONStargazers:361Issues:9Issues:1

Grawler

Grawler is a tool written in PHP which comes with a web interface that automates the task of using google dorks, scrapes the results, and stores them in a file.

Language:PHPLicense:MITStargazers:206Issues:15Issues:6

support-desk

Support ticket app built with the MERN stack

Language:JavaScriptLicense:MITStargazers:174Issues:3Issues:3

pythonizing_nmap

A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.

Language:PythonLicense:GPL-3.0Stargazers:147Issues:4Issues:0

Mastering-Python-for-Networking-and-Security-Second-Edition

Mastering Python for Networking and Security, Second Edition, published by Packt

Language:PythonLicense:MITStargazers:137Issues:13Issues:2

corsair_scan

Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).

Language:PythonLicense:MITStargazers:121Issues:9Issues:6

Mastering-React-Test-Driven-Development-Second-Edition

Mastering React Test-Driven Development, published by Packt

Language:JavaScriptLicense:MITStargazers:102Issues:6Issues:4

React-Projects-Second-Edition

React Projects Second Edition, Published by Packt

Language:JavaScriptLicense:MITStargazers:96Issues:8Issues:4

Python-for-Geeks

Python for Geeks, published by Packt

Language:PythonLicense:MITStargazers:93Issues:8Issues:1

Bugs-feed

Bug's feed is a local hosted portal where you can search for the latest news, videos, CVEs, vulnerabilities...

Language:JavaScriptLicense:GPL-3.0Stargazers:91Issues:4Issues:2

Blazor-WebAssembly-by-Example

Blazor WebAssembly by Example, published by Packt

Language:C#License:MITStargazers:76Issues:0Issues:0

Secure_Kali

How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports or launch attacks against your apache web server and more

Language:ShellLicense:MITStargazers:67Issues:4Issues:1

Mastering-Kali-Linux-for-Advanced-Penetration-Testing-4E

Mastering Kali Linux for Advanced Penetration Testing 4E published by Packt

Language:PythonLicense:MITStargazers:63Issues:6Issues:1

JexBotv4

Auto Scanner and Auto exploiter web app tool V4 Leaked by #GhostSec

Becoming-an-Enterprise-Django-Developer

Becoming an Enterprise Django Developer, Published by Packt

Language:PythonStargazers:46Issues:7Issues:0

Threat-Hunting-with-Elastic-Stack

Threat Hunting with Elastic Stack, Published by Packt

Language:PowerShellLicense:MITStargazers:32Issues:0Issues:0

SMB-Data-Discovery

A PowerShell solution to discover visible SMB shares, test for access rights, inventory accessible files and flag human readable file contents for sensitive information.

Language:PowerShellLicense:MITStargazers:26Issues:2Issues:0