sventek-s's repositories
ABD
Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories
Android-IMSI-Catcher-Detector
AIMSICD • Fight IMSI-Catcher, StingRay and silent SMS!
android-kernel-exploitation
Android Kernel Exploitation - Payatu Workshop
android_kernel_samsung_universal9810
RZ Kernel tree for Exynos 9810 platform, based on ELS kernel with force pushes everyday
atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
attack_range
A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
awesome-browser-exploit
awesome list of browser exploitation tutorials
awesome-mobile-security
An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respective owners. I'm just maintaining it.
awesome_windows_logical_bugs
collect for learning cases
CVE-2016-5195
CVE-2016-5195 (dirtycow/dirtyc0w) proof of concept for Android
cve_info_data
IOT Device Vulnerability Repository of Major Platforms
exploitation-course
Offensive Software Exploitation Course
free-programming-books
:books: Freely available programming books
hacker-scripts
Based on a true story
hsrsh
This was a quickly written tool for demonstrating a reverse shell over a hidden service all in one binary and an excuse to play with Rust and solely for educational purposes.
inotifywait-for-Android
inotifywait for Android
noia
[WIP] Simple mobile applications sandbox file browser tool. Powered by [frida.re](https://www.frida.re).
pdusms
PoC app for raw pdu manipulation on Android.
privilege-escalation-awesome-scripts-suite
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
rita
Real Intelligence Threat Analytics
rotvpn
Run a personal VPN in the cloud. And rotate it regularly.
sliver
Implant framework
sventeks-nerd-space
Nerd Space
TinyCheck
TinyCheck allows you to easily capture network communications from a smartphone or any device which can be associated to a Wi-Fi access point in order to quickly analyze them. This can be used to check if any suspect or malicious communication is outgoing from a smartphone, by using heuristics or specific Indicators of Compromise (IoCs). In order to make it working, you need a computer with a Debian-like operating system and two Wi-Fi interfaces. The best choice is to use a Raspberry Pi (2+) a Wi-Fi dongle and a small touch screen. This tiny configuration (for less than $50) allows you to tap any Wi-Fi device, anywhere.
unrasp
Ressources and papers related to my conferences on RASPs
wildpwn
unix wildcard attacks
Zeek-Network-Security-Monitor-Tutorial
A Zeek Network Security Monitor Tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.