security-goodies's repositories
pyre-check
Performant type-checking for python.
ctf-party
:flags: A library to enhance and speed up script/exploit writing for CTF players
easy-linux-pwn
A set of Linux binary exploitation tasks for beginners on various architectures
Awesome-Red-Teaming
List of Awesome Red Teaming Resources
reutils
A collection of scripts to aid in reverse engineering and exploit development.
Awesome-Hacking-Resources
A collection of hacking / penetration testing resources to make you better!
cloudgoat
Rhino Security Labs' "Vulnerable by Design" AWS infrastructure setup tool
evilginx2
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, alowing to bypass 2-factor authentication.
awesome-windows-security-development
awesome-windows-security-development
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
browser-sec-whitepaper
Cure53 Browser Security White Paper
ethereum-lists
A repository for maintaining lists of things like malicious URLs, fake token addresses, and so forth. We love lists.
slackbot
Some security enhancement bots for Slack workspaces.
SecGen
Create randomly insecure VMs
gost
Build a local copy of Security Tracker. Notify via E-mail/Slack if there is an update.
sandsifter
The x86 processor fuzzer
CableTap
CableTap public disclosure documents.
security-research-pocs
Proof-of-concept codes created as part of security research done by Google Security Team.
OPCDE
OPCDE DXB 2017 Materials
Mirai-Source-Code
Leaked Mirai Source Code for Research/IoC Development Purposes
sgxfun
SGX command-line tools and paper
bintut
Teach you a binary exploitation for great good.
how2heap
A repository for learning various heap exploitation techniques.
pwntools
CTF framework used by Gallopsled in every CTF
tinyctf-platform
Yet another CTF platform
docs
Tips, Tricks, and Suggestions for Running a CTF
Routerhunter-2.0
Testing vulnerabilities in devices and routers connected to the Internet.
radare2
unix-like reverse engineering framework and commandline tools
ctf-tools
Some setup scripts for security research tools.
shadow
Shadow is a unique discrete-event network simulator that runs real applications like Tor, and distributed systems of thousands of nodes on a single machine. Shadow combines the accuracy of emulation with the efficiency and control of simulation, achieving the best of both approaches.