sventek-s's repositories

easy_rust

Rust explained using easy English

Language:ShellLicense:MITStargazers:1Issues:0Issues:0

ABD

Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories

Language:Jupyter NotebookLicense:NOASSERTIONStargazers:0Issues:0Issues:0

Android-IMSI-Catcher-Detector

AIMSICD • Fight IMSI-Catcher, StingRay and silent SMS!

License:GPL-3.0Stargazers:0Issues:0Issues:0

android-kernel-exploitation

Android Kernel Exploitation - Payatu Workshop

Language:C++License:GPL-3.0Stargazers:0Issues:0Issues:0

android_kernel_samsung_universal9810

RZ Kernel tree for Exynos 9810 platform, based on ELS kernel with force pushes everyday

Language:CLicense:NOASSERTIONStargazers:0Issues:0Issues:0

atomic-red-team

Small and highly portable detection tests based on MITRE's ATT&CK.

Language:PowerShellLicense:MITStargazers:0Issues:0Issues:0

attack_range

A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk

License:Apache-2.0Stargazers:0Issues:0Issues:0

awesome-browser-exploit

awesome list of browser exploitation tutorials

License:GPL-3.0Stargazers:0Issues:0Issues:0

awesome-mobile-security

An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respective owners. I'm just maintaining it.

Stargazers:0Issues:0Issues:0

awesome_windows_logical_bugs

collect for learning cases

Stargazers:0Issues:0Issues:0

CVE-2016-5195

CVE-2016-5195 (dirtycow/dirtyc0w) proof of concept for Android

Stargazers:0Issues:0Issues:0

cve_info_data

IOT Device Vulnerability Repository of Major Platforms

Language:HTMLStargazers:0Issues:0Issues:0
License:MITStargazers:0Issues:0Issues:0

exploitation-course

Offensive Software Exploitation Course

Stargazers:0Issues:0Issues:0

free-programming-books

:books: Freely available programming books

License:NOASSERTIONStargazers:0Issues:0Issues:0

hacker-scripts

Based on a true story

Stargazers:0Issues:0Issues:0

hsrsh

This was a quickly written tool for demonstrating a reverse shell over a hidden service all in one binary and an excuse to play with Rust and solely for educational purposes.

License:GPL-3.0Stargazers:0Issues:0Issues:0

inotifywait-for-Android

inotifywait for Android

Language:CLicense:GPL-2.0Stargazers:0Issues:0Issues:0

noia

[WIP] Simple mobile applications sandbox file browser tool. Powered by [frida.re](https://www.frida.re).

Language:JavaScriptLicense:MITStargazers:0Issues:0Issues:0

pdusms

PoC app for raw pdu manipulation on Android.

Language:JavaStargazers:0Issues:0Issues:0

privilege-escalation-awesome-scripts-suite

PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)

Language:C#License:MITStargazers:0Issues:0Issues:0

rita

Real Intelligence Threat Analytics

License:GPL-3.0Stargazers:0Issues:0Issues:0

rotvpn

Run a personal VPN in the cloud. And rotate it regularly.

Stargazers:0Issues:0Issues:0

sliver

Implant framework

License:GPL-3.0Stargazers:0Issues:0Issues:0

sventek-s

README profile

Stargazers:0Issues:1Issues:0
Language:HTMLStargazers:0Issues:0Issues:0

TinyCheck

TinyCheck allows you to easily capture network communications from a smartphone or any device which can be associated to a Wi-Fi access point in order to quickly analyze them. This can be used to check if any suspect or malicious communication is outgoing from a smartphone, by using heuristics or specific Indicators of Compromise (IoCs). In order to make it working, you need a computer with a Debian-like operating system and two Wi-Fi interfaces. The best choice is to use a Raspberry Pi (2+) a Wi-Fi dongle and a small touch screen. This tiny configuration (for less than $50) allows you to tap any Wi-Fi device, anywhere.

Language:PythonLicense:Apache-2.0Stargazers:0Issues:0Issues:0

unrasp

Ressources and papers related to my conferences on RASPs

Stargazers:0Issues:0Issues:0

wildpwn

unix wildcard attacks

Language:PythonLicense:GPL-3.0Stargazers:0Issues:0Issues:0

Zeek-Network-Security-Monitor-Tutorial

A Zeek Network Security Monitor Tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.

License:Apache-2.0Stargazers:0Issues:0Issues:0