Tools
- __builtin_expect
- ¿Y si documentamos la base de datos? ... SchemaSpy al rescate
- .families.yaml
- .gov.ru
- .NET Core Plugins
- .NET Core Runtime
- .NET Deobfuscator
- .NET Roulette: Exploiting Insecure Deserialization in Telerik UI
- .Net 反序列化之 ViewState 利用
- .NET-Bypass:.NET 免杀绕过、Tricks方法合集
- .netshrink
- .NETWebShell-动态编译实现任意命令执行,Windows Defender 免杀
- “Ok Google. What is Forensic Analysis?”
- “Selfie”:利用DynamoRIO实现自修改代码自动脱壳的神器
- “This should never happen. If it does, call the developers.”
- “What's the worst that could happen?”: A worked example of how we deal with live incidents
- “短信拦截马”黑色产业链与溯源取证研究
- (homebrew)
- (ISC)2 YouTube channel
- (LinkedIn)
- (via Community packages)
- [1]
- [1807.08264] Digital forensic investigation of two-way radio communication equipment and services
- [1807.10214] Cloud Storage Forensic: hubiC as a Case-Study
- [1807.10218] CloudMe Forensics: A Case of Big-Data Investigation
- [1807.10359] B-CoC: A Blockchain-based Chain of Custody for Evidences Management in Digital Forensics
- [1807.10436] Emerging from The Cloud: A Bibliometric Analysis of Cloud Forensics Studies
- [1807.10438] Internet of Things Security and Forensics: Challenges and Opportunities
- [1807.10445] Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study
- [1808.01196] Enabling Trust in Deep Learning Models: A Digital Forensics Case Study
- [1809.00745] IoTDots: A Digital Forensics Framework for Smart Environments
- [1811.00701] Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset
- [1811.01629] On the Transferability of Adversarial Examples Against CNN-Based Image Forensics
- [1811.09239] Digital Forensics for IoT and WSNs
- [1903.01396] A complete formalized knowledge representation model for advanced digital forensics timeline analysis
- [1903.03061] DIALOG: A framework for modeling, analysis and reuse of digital forensic knowledge
- [1903.07703] A Survey of Electromagnetic Side-Channel Attacks and Discussion on their Case-Progressing Potential for Digital Forensics
- [1903.10770] Blockchain Solutions for Forensic Evidence Preservation in IoT Environments
- [1904.00734] Forensics Analysis of Xbox One Game Console
- [1904.01725] Using Google Analytics to Support Cybersecurity Forensics
- [1905.01999] A Benchmark API Call Dataset for Windows PE Malware Classification
- [1906.05268] Differential Imaging Forensics
- [1906.10625] Antiforensic techniques deployed by custom developed malware in evading anti-virus detection
- [1907.00074] Forensic Analysis of Third Party Location Applications in Android and iOS
- [1907.01421] Methodology for the Automated Metadata-Based Classification of Incriminating Digital Forensic Artefacts
- [3]
- [Case study] Decrypt strings using Dumpulator
- [core]
- [dev.twitter.com] XSS
- [Done]
- [GHSA-43rf-3hm4-hv5f] 反编译恶意的 CLASS 文件可能导致程序不可用
- [GHSA-jmcg-r2c5-7m29] Jar Analyzer 存在 ZIP SLIP 漏洞(最坏情况可导致 RCE 风险)
- [GHSA-x5h2-78p8-w943] Jar Analyzer 2.13 版本之前存在 SQL 注入漏洞
- [HITCON CMT 2017] R0D202 - 陳威伯 - Triton and Symbolic execution on GDB
- [ISS 2017]电子数据取证 议题分享一:网络犯罪魔与道:过去、现在、未来
- [ISS 2017]电子数据取证 议题分享二:计算机取证,科学?
- [link]
- [namespaces]
- [network]
- [python]
- [tool] Network Forensics with Tshark
- [分享]IDA + VMware 调试win7 x64
- [原创] 《软件调试》分页机制windbg例子分析(各种填坑)
- [原创] Frida操作手册-Android环境准备
- [原创] iOSOpenDev修改版MonkeyDev,最新theos和Xcode 9测试通过!
- [原创] 修复 IDA Pro 7.0在macOS Mojave崩溃的问题
- [原创][开源]OllyDbg 2.x插件编写教程
- [原创]《使用OllyDbg从零开始Cracking》第14课练习完整解答
- [原创]4s的9.3.5尝试Proteas大神的Native lldb
- [原创]ARM Linux下搭建IDA Pro远程调试环境
- [原创]CVE-2017-4901 VMware虚拟机逃逸漏洞分析【Frida Windows实例】
- [原创]dyld加载mach-o文件分析
- [原创]Easy MPEG to DVD Burner 1.7.11 SEH + DEP Bypass Local Buffer Overflow
- [原创]gikdbg v1.1携手lldb震撼来袭,求内测伙伴!
- [原创]IDA 在解析 IA64 中的 brl 指令时存在一个 Bug
- [原创]IDA 插件- FRIEND 的安装和使用
- [原创]IDA7.0 Mac 插件编译指南
- [原创]IDA7.2安装包分析
- [原创]IDAPython脚本分享 - 自动在JNI_OnLoad下断点
- [原创]IDA动态调试ELF
- [原创]lldb使用方法(学习笔记)
- [原创]Mach-O动态连接的简单分析(延时绑定)
- [原创]mach-o文件格式学习记录
- [原创]Mach-O格式分析
- [原创]Ollydbg插件的编写流程
- [原创]PE加载器的简单实现
- [原创]Reverse Engineering Code with IDA Pro第七章中文译稿
- [原创]win10_arm64 驱动注入dll 到 arm32程序
- [原创]win7X64DBGPORT移位数据
- [原创]Windows平台下的取证技术
- [原创]xls文件取证
- [原创]一种通用DLL劫持技术研究
- [原创]业余时间开发的类IDA静态反汇编工具(仿Ollydbg界面)(内有传送门)
- [原创]介召几个frida在安卓逆向中使用的脚本以及延时Hook手法
- [原创]代替创建用户线程使用ShellCode注入DLL的小技巧
- [原创]使用“PE文件加区段工具”、“LordPE”、“WinHex”、“OllyDbg”为PE文件添加section、dll(API)
- [原创]使用x64dbg+VS2015 Spy++去除WinRAR5.40(64位)广告弹框
- [原创]修正lldb-310及以后版本的Thumb反汇编问题
- [原创]借第一篇破文吹一下olldbg
- [原创]初探Mach-O学习小记(附源码)
- [原创]利用Ret2Libc挑战DEP——利用ZwSetInformationProcess
- [原创]取证分析之逆向服务器提权开启3389远程连接工具
- [原创]源码编译x64dbg
- [原创]科普文之如何编写ollydbg插件
- [原创]让Windbg在驱动入口前断下来
- [原创]让代码飞出一段钢琴曲(freepiano小助手)(全局键盘钩子+dll劫持)+有码
- [原创]逆向技术之熟悉IDA工具
- [原创]通过Selife学习使用DynamoRIO动态插桩
- [原创]通过Wannacry分析内核shellcode注入dll技术
- [推荐]Android取证和安全测试开放课程
- [更新]GUI界面文件信息取证分析工具-FileInfo V6.0
- [求助]IDA Pro调试so,附加完毕,跳到目标so基址,但是内容都是DCB伪指令?
- [编程][翻译] 用 gdb 学 C 语言
- [翻译](20081030更新)The IDA Pro Book 第12章:使用FLIRT签名识别库
- [翻译]CTF取证类题目指南
- [翻译]DEP缓解技术(一)
- [翻译]IDA Hex-Rays反编译器使用的一些小技巧
- [翻译]IDA v6.5 文本执行
- [翻译]IDAPython-Book(Alexander Hanel)
- [翻译]Ollydbg2.0X版本帮助手册中文翻译
- [翻译]Reverse Engineering Code with IDA Pro(第一、二章)
- [翻译]The IDA Pro book 第5章---IDA DATA DISPLAY
- [翻译]The IDA Pro Book 第六章
- [翻译]The IDA Pro Book(第一章)
- [翻译]The IDA Pro Book(第二章)
- [翻译]WhatsApp取证:对加密数据库进行解密和在尚未被Root的Android设备上提取已删除的消息
- [翻译]WinDbg内核调试配置方法介绍
- [翻译]使用OllyDbg从零开始Cracking 第五十八章-EXECryptor v2.2.50.h脱壳
- [翻译]使用OllyDbg从零开始Cracking 第四十三章-ACProtect V1.09脱壳(编写脚本修复IAT)
- [翻译]使用OllyDbg从零开始Cracking 第四十四章-ACProtect V1.09脱壳(修复AntiDump)
- [翻译]在IDA中使用Python Z3库来简化函数中的算术运算
- [翻译]多种DLL注入技术原理介绍
- [翻译]对抗IDA Pro调试器ARM反汇编的技巧
- [翻译]消息断点在x64dbg中的应用 by lantie@15PB
- [翻译]逆向平台Binary Ninja介绍
- 《Dive into Windbg系列》AudioSrv音频服务故障
- 《Dive into Windbg系列》Explorer无法启动排查
- 《Lateral Movement — SCM and DLL Hijacking Primer》的利用扩展
- 《MiniDumpWriteDump via COM+ Services DLL》的利用测试
- 《提问的智慧》
- 【.Net代码审计】-.Net反序列化文章
- 【android 移动app渗透】apkleaks-扫描APK文件提取URL、终端和secret
- 【Android 移动app渗透】之一键提取APP敏感信息
- 【Android脱壳】FRIDA-DEXDump-【使用Frida来进行Android脱壳】
- 【Android脱壳】XServer是一个用于对方法进行分析的Xposed插件
- 【Android脱壳】Youpk-又一款基于ART的主动调用的脱壳机
- 【Linux 提权】CVE-2021-33909:Linux kernel 本地提权漏洞
- 【Linux 提权】CVE-2021-4034:Linux Polkit 权限提升漏洞(pkexec)
- 【Linux 提权】CVE-2021-4154:Linux Kernel 资源管理错误漏洞
- 【Linux 提权】CVE-2021-4204:Linux Kernel eBPF Local Privilege Escalation
- 【Linux 提权】CVE-2022-1972-infoleak-PoC:Linux-netfilter-越界写入漏洞
- 【Linux 提权】CVE-2022-23222:Linux Kernel eBPF Local Privilege Escalation
- 【Linux 提权】CVE-2022-2588
- 【Linux 提权】CVE-2022-2602: Linux io_uring子系统UAF漏洞漏洞利用POC,可用于本地提权
- 【Linux 提权】CVE-2022-2639-PipeVersion
- 【Linux 提权】CVE-2022-32250-exploit
- 【Linux 提权】CVE-2022-34918:netfilter nf_tables 本地提权
- 【Linux 提权】CVE-2023-0386: Linux OverlayFS权限提升漏洞
- 【Linux 提权】CVE-2023-32233: Linux Kernel 权限提升漏洞
- 【Linux 提权】vault_range_poc:CVE-2021-26708 四字节写特殊竞争UAF转化为内核任意读写漏洞
- 【Linux】CVE-2021-4034:pkexec 本地提权漏洞
- 【Linux提权】CVE-2021-3156-SUDO缓冲区溢出漏洞
- 【Linux提权】CVE-2021-33909:Linux kernel 本地提权漏洞
- 【Linux提权】CVE-2021-3490:Linux kernel 缓冲区错误漏洞
- 【Linux提权】CVE-2021-3560 Local PrivEsc Exploit
- 【Linux提权】CVE-2023-2008: Linux Kernel 权限提升漏洞
- 【Linux提权】CVE2023-1829: Linux Kernel 权限提升漏洞
- 【Linux提权】LinEnum:Linux 提权检查脚本
- 【Linux提权/RCE】OpenSMTPD 6.4.0 < 6.6.1 - Local Privilege Escalation + Remote Code Execution
- 【PHP】bypass disable_functions via LD_PRELOA (no need /usr/sbin/sendmail)
- 【shell管理工具】Godzilla-哥斯拉
- 【webshell免杀】php免杀D盾webshell生成工具
- 【Windows bypass UAC】UACME-一种集成了60多种Bypass UAC的方法
- 【Windows 提权】Auto-Elevate:通过bypass UAC 和令牌模拟提权到 system权限
- 【Windows 提权】CVE-2021-21551:Dell BIOS驱动权限提升漏洞
- 【Windows 提权】CVE-2021-31956-EXP:Windows 内核堆栈溢出漏洞利用工具
- 【Windows 提权】CVE-2021-40449 EXP about windows 10 14393 LPE
- 【Windows 提权】CVE-2022-21882:win32k LPE bypass CVE-2021-1732
- 【Windows 提权】CVE-2022-21999:Windows 打印机提权漏洞(此漏洞是去年打印机提权漏洞Printnightmare的续集)
- 【Windows 提权】CVE-2022-29072:7-Zip帮助页面命令注入漏洞
- 【Windows 提权】CVE-2022-31262:GOG Galaxy LPE Exploit
- 【Windows 提权】DiagTrackEoP:绕过服务账户限制滥用DiagTrack服务与SeImpersonate权限进行权限提升
- 【Windows 提权】InstallerFileTakeOver:Windows Installer 本地提权漏洞PoC
- 【Windows 提权】KrbRelayUp:域内提权
- 【Windows 提权】PetitPotam:替代PrintBug用于本地提权的新方式,主要利用MS-EFSR协议中的接口函数
- 【Windows 提权】PetitPotato:通过PetitPotam进行本地提权
- 【Windows 提权】PrivExchange:通过滥用Exchange将您的权限交换为域管理权限
- 【Windows 提权】sam-the-admin:CVE-2021-42278 and CVE-2021-42287域内提权
- 【Windows 提权】WinPwnage:UAC bypass, Elevate, Persistence methods
- 【windows】Bypassing AV via in-memory PE execution-通过在内存中加载多次XOR后的payload来bypass杀软
- 【Windows提权 Windows 10&Server 2019】PrintSpoofer-Abusing Impersonation Privileges on Windows 10 and Server 2019
- 【Windows提权】-CVE-2020-1048 | PrintDemon本地提权漏洞-漏洞影响自1996年以来发布(Windows NT 4)的所有Windows版本
- 【windows提权】byeintegrity-uac:通过劫持位于本机映像缓存中的DLL绕过UAC
- 【Windows提权】CVE-2018-8120 Exploit for Win2003 Win2008 WinXP Win7
- 【Windows提权】CVE-2019-0863-Windows中错误报告机制导致的提权-EXP
- 【Windows提权】CVE-2020-0787-EXP-ALL-WINDOWS-VERSION-适用于Windows所有版本的提权EXP
- 【Windows提权】CVE-2020-1054-Win32k提权漏洞Poc
- 【Windows提权】CVE-2020-1066-EXP
- 【Windows提权】dazzleUP是一款用来帮助渗透测试人员进行权限提升的工具,可以在window系统中查找脆弱面进行攻击。工具包括两部分检查内容,exploit检查和错误配置检查。
- 【Windows提权】KernelHub-近二十年Windows权限提升集合
- 【Windows提权】Priv2Admin-Windows提权工具
- 【Windows提权】wesng-Windows提权辅助脚本
- 【Windows提权】Windows 下的提权大合集
- 【windows提权】利用有漏洞的技嘉驱动程序来加载恶意的驱动程序提升权限或干掉驱动级保护的杀软
- 【Windows提权工具】SweetPotato修改版,用于webshell下执行命令
- 【Windows提权工具】Windows 7 to Windows 10 / Server 2019
- 【win提权】CVE-2023-21752: Windows 备份服务特权提升漏洞
- 【win提权】CVE-2023-29343: Windows 特权提升漏洞的 SysInternals Sysmon
- 【两万字原创长文】完全零基础入门Fastjson系列漏洞(基础篇)
- 【免杀】AVByPass:一款Web在线自动免杀工具(利用 Python 反序列化免杀)
- 【免杀】avcleaner:通过分析抽象语法树的方式进行字符串混淆并重写系统调用来隐藏API函数的使用,使其绕过杀软的静态文件扫描和动态的API函数行为检测
- 【免杀】bypassAV-条件触发式远控
- 【免杀】bypassAV:借助Win-PS2EXE项目编写cna脚本方便快速生成免杀可执行文件
- 【免杀】FuckThatPacker:混淆加密 PowerShell 脚本免杀 Windows defender的 py 脚本工具
- 【免杀】GoBypass:Golang免杀生成工具
- 【免杀】ImgLoaderShellCode-将shellcode注入bmp图片文件
- 【免杀】nim_shellloader:nim 免杀,支持远程、本地、命令行加载 shellcode
- 【免杀】py2exe-将python脚本转换为单文件版可执行的exe文件
- 【免杀】ZheTian:免杀shellcode加载框架
- 【免杀】使用nim语言进行shellcode加载
- 【免杀框架】Veil-Evasion是一个用python写的免杀框架
- 【内网】RestrictedAdmin:远程启用受限管理员模式
- 【内网代理】chisel:一款快速稳定的隧道工具(通过HTTP传输使用SSH加密)
- 【内网代理】Ecloud是一款基于http/1.1协议传输TCP流量的工具,适用于内网不出网时通过web代理脚本转发tcp流量,以达到socket5隧道、内网cs等程序上线、反弹虚拟终端等功能
- 【内网代理】FastTunnel:高性能跨平台的内网穿透解决方案
- 【内网代理】Neo-reGeorg重构的reGeorg
- 【内网代理】php-proxy-app-一款代理访问网站的工具
- 【内网代理】pivotnacci-通过HTTP隧道将TCP流量代理出来或进去
- 【内网代理】proxy.php-单文件版的php代理
- 【内网代理】reDuh-通过http隧道搭建代理(比较远古,酌情使用)
- 【内网代理】Stowaway:一个利用go语言编写、专为渗透测试工作者制作的多级代理工具
- 【内网代理】Tunna-通过http隧道将TCP流量代理出来
- 【内网代理】内网渗透代理转发利器reGeorg
- 【内网代理】毒刺(pystinger)通过webshell实现内网SOCK4代理,端口映射.
- 【内网探测】SharpNetCheck-批量检测机器是否有出网权限,可在dnslog中回显内网ip地址和计算机名,可实现内网中的快速定位可出网机器
- 【取证分析】CentOS_5.5_安装GCC编译LiME
- 【图片挖掘】国外图片挖掘案例(附过程及工具)
- 【威胁日志分析】DeepBlueCLI-通过Windows事件日志来搜寻威胁的powershell模块
- 【字典】Dictionary-Of-Pentesting-认证类、文件路径类、端口类、域名类、无线类、正则类
- 【干货分享】Sandbox技术之DLL注入
- 【技巧】利用谷歌搜索引擎和手机网页检测功能查看非好友领英网页
- 【游戏漏洞】注入DLL显示游戏窗口
- 【漏洞库】又一个各种漏洞poc、Exp的收集或编写
- 【爆破字典】基于实战沉淀下的各种弱口令字典
- 【爆破字典】自己收集整理的端口、子域、账号密码、其他杂七杂八字典,用于自己使用
- 【爆破字典整合推荐】PentesterSpecialDict-该项目对 [ fuzzDicts | fuzzdb | Dict ] 等其他网上字典开源项目进行整合精简化和去重处理
- 【端口爆破】PortBrute-一款跨平台小巧的端口爆破工具,支持爆破FTP/SSH/SMB/MSSQL/MYSQL/POSTGRESQL/MONGOD
- 【端口爆破】x-crack-一款FTP/SSH/SNMP/MSSQL/MYSQL/PostGreSQL/REDIS/ElasticSearch/MONGODB弱口令爆破工具
- 【钓鱼】Mail-Probe-邮箱探针后台管理系统
- @_abhiramkumar
- @0xAmit
- @0xB4LINT
- @0xff6a
- @13exp
- @13exp
- @4n6ist
- @Abss0x7tbh
- @ac3ss0r
- @aheadless
- @akokSZ
- @alb-p
- @AndriesK
- @AppleExaminer
- @aptnotes
- @ArthurWolfhound
- @Bearcat
- @Benni0109
- @blackbagtech
- @BonusPlay
- @bsd_daemon
- @Buashei
- @caddyserver
- @CaledoniaProject
- @carrier4n6
- @catsuryuu
- @chivay
- @christophetd
- @CindyMurph
- @claud_xiao
- @corydalis10
- @cozyplanes
- @cure53berlin
- @cutter_re
- @cybergoof
- @danigargu
- @Darkpills
- @darrenmartyn
- @dee__see
- @DefCon42
- @dialluvioso_
- @domroaft
- @dr1nKoRdi3
- @dragokas
- @DugnyG
- @dxa4481
- @EddieIvan01
- @edznux
- @efrenbg1
- @erenbektas
- @EricRZimmerman
- @ErvalhouS
- @faradaysec
- @filedescriptor
- @Fkalis
- @Fkalis
- @FlamingFury00
- @forensikblog
- @freelabz
- @funilrys
- @gaasedelen
- @garethheyes
- @GaryGadget9
- @GerbenJavado
- @giovankabisano
- @githubcatw
- @grigorem
- @gwendallecoguic
- @h3xstream
- @HackwithGithub
- @hasegawayosuke
- @HECFBlog
- @Hexacorn
- @hiddenillusion
- @horsicq
- @hx
- @iamevltwin
- @icedevml
- @jaredcatkinson
- @jofpin
- @joscdk
- @joskaja
- @JPoForenso
- @jtop_fap
- @kakkk
- @KatJillianne
- @kinugawamasato
- @kscieslinski
- @lampi8426
- @liucoj
- @loucifkharouni
- @lucasskluser
- @m8sec
- @maridegrazia
- @MattIPv4
- @Mecanik
- @merces
- @mholt6
- @mitchellkrogza
- @mrbellek
- @msm-cert
- @ndelphit
- @nift4
- @nikossyr
- @objective_see
- @osxdaily
- @osxreverser
- @ourren
- @overjt
- @OWASP_MAS
- @patrickolsen
- @patrickwardle
- @PatrikHudak
- @pemontto
- @PlasticBrain
- @psrok1
- @pxb1988
- @radareorg
- @regist
- @robertstrom
- @rscloura
- @Ry0taK
- @Sandor-Helper
- @schmittner
- @shhnjk
- @Sigarya
- @sleuthkit
- @Sn0wfreezeDev
- @stamparm
- @subho007
- @superhedgy
- @thebl4ckturtle
- @thebl4ckturtle
- @TheLaluka
- @TheLastFrame
- @ThumpBo
- @ThumpBo
- @TMBotsStore
- @tomnomnom
- @trendmicro
- @tretre91
- @Ullaakut
- @UndeadSec
- @vanhauser-thc
- @Viking
- @Viking
- @williballenthin
- @x0rz
- @XWaysGuide
- @YanXi9999
- @YanXi9999
- @yeya24
- @YiJhu
- *
- *OS iBoot
- *OS Internals - Kernel Mode by Levin
- *OS Internals - Security by Levin
- *OS Internals - User Mode by Levin
- *OS Internals by Jonathan Levin
- /dev/random:K2
- /dev/tcp as a weapon
- /docs/async_client
- /docs/client
- /docs/file
- /docs/legacy
- /docs/media
- /docs/pydantic_ai
- /docs/requests
- /r/computerforensics/
- /r/vitahacks
- #10 Use database to record all events and interacting logs
- #106
- #11 Make STDOUT and STDERR distinguishable
- #1144
- #116
- #12 Add capability of setting human-readable name of session
- #1270
- #1271
- #1272
- #13 Add a display current prompt setting
- #15 Encryption support
- #16
- #19 Read command file when start up
- #219
- #23 Case insensitive CLI
- #24 Upgrading platypus to a system service
- #25 Replace new connection from same IP with old one
- #27
- #28
- #28 Suport enable internet on the internal machine
- #30 RaaS support specifying language, thanks for @RicterZ
- #39
- #50
- #53 Reload config file
- #6
- #6 Send one command to all clients at once (Meta Command)
- #7 Allow user to choose operation for the same IP income connection
- #83
- #9
- #9 BlockSameIP
- #apktool on libera.chat
- #cheatsheets channel
- #copacetic
- #FAQ
- #feedback
- #general
- #HITB2018DXB: Offensive Memory Forensics - Hugo Teso
- #HITB2019AMS D1T2 - fn_fuzzy: Fast Multiple Binary Diffing Triage With IDA - Takahiro Haruyama
- #HITB2019AMS D1T3 - Overcoming Fear: Reversing With Radare2 - Arnau Gamez Montolio
- #Medusa - Extensible binary instrumentation framework based on #FRIDA for Android applications
- #monero-dev on Libera
- #NoFilter - Abusing Windows Filtering Platform for Privilege Escalation
- #project-mobile-app-security
- #rizin
- #rizindev
- #support
- %b %d %H:%M:%S
- %E6%9F%A5%E8%AF%A2%E9%9D%9E%E7%BA%A6%E6%9D%9F.png
- `ydkhatri/UnifiedLogReader``
- </script> is filtered ?
- ⚠️Network Attacks & Defense⚠️
- ⭐Courses & Training⭐
- 🌅 Defense 🌅
- 🌈 Exploit Development 🌈
- 🌻 Web 🌻
- 🍋Rants & Writeups🍋
- 🍯Honeypots🍯
- 🍱Containers🍱
- 🎣Phishing🎣
- 🎮 Game Hacking 🎮
- 🎲Cryptography & Encryption🎲
- 🏁 CTFs & Wargames 🏁
- 🏮 Red Teaming/Penetration Testing Stuff 🏮
- 🐛 Fuzzing & Bug Hunting 🐛
- 👋 Getting started
- 💀Malware💀
- 💎 Download release
- 💬 Contribute to Translations
- 💸Career💸
- 📄 Download
- 📋 Changelog
- 📦 Volatility3 Linux Plugin : Inodes
- 📦 Volatility3 Windows Plugin : Prefetch
- 📰 Documentation & Reporting 📰
- 📶 Wireless Networks and RF Devices 📶
- 📹Conferences/Recordings📹
- 🔥 Blockchain dark forest selfguard handbook(黑手册)
- 🔥 Cryptocurrency Security Solution
- 🔥UI/UX Design🔥
- 🔨Building a Testing Lab🔨
- 🔩 System Internals (Linux/Windows) 🔩
- 🔭Open Source Intelligence Gathering - OSINT🔭
- 🔰 Basic Security Information 🔰
- 😃Social Engineering😃
- 🚀 DIE API Library (for Developers)
- 🚀 Providers and Models
- 🚗 Car hacking 🚗
- 🚪Physical Security🚪
- $20000 Facebook DOM XSS
- $36k Google App Engine RCE
- $7.5k Google services mix-up
- $PIRIT
- 0-0eth0
- 0-x-2-2
- 02402 Introduction to Statistics E12 - Technical University of Denmark
- 02417 Time Series Analysis
- 03-251: Introduction to Computational Molecular Biology - Carnegie Mellon University
- 03-712: Biological Modeling and Simulation - Carnegie Mellon University
- 05-600 HCI Pro Seminar - Fall 2015 - CMU
- 08-763 Intro to HCI for Technology Executives - Fall 2015 - CMU
- 0bin
- 0BuRner
- 0ca
- 0CTF 2018 Final - h4x0rs.club
- 0CTF 2018 Qual - EzDoor
- 0CTF 2019 Final - hotel booking system
- 0CTF 2021 Qual - 1linephp
- 0CTF 2021 Qual - 2rm1
- 0CTF 2022 - 3rm1
- 0CTF 2022 - hessian-onlyjdk
- 0Day Labs
- 0day:各种CMS、各种平台、各种系统、各种软件漏洞的EXP、POC 该项目将不断更新
- 0Day.rocks on discord
- 0day.today
- 0dayCTF
- 0dayex-checker: Zeroday Microsoft Exchange Server checker (Virtual Patching checker)
- 0day安全_软件漏洞分析技术(第二版)
- 0ki/mikrotik-tools
- 0n3t04ll
- 0poss
- 0ssigeno
- 0x0 attack
- 0x00 Intro [Reversing with Radare2]
- 0x01 Xcode调试一个LLVM Pass
- 0x02 What is Radare2 [Reversing with Radare2]
- 0x03 Environment Setup [Reversing with Radare2]
- 0x03f3
- 0x04 Target Application [Reversing with Radare2]
- 0x08 Navigation [Reversing with Radare2]
- 0x09 Cross References [Reversing with Radare2]
- 0x09AL/raven
- 0x0C - Cutter: FLARE-On #3 Challenge Part 1 [Reversing with Radare2]
- 0x0D - FLARE-On #3 Challenge Part 2 [Reversing with Radare2]
- 0x10f2c
- 0x192
- 0x254
- 0x36/ghidra_kernelcache
- 0x48piraj/MalWAReX
- 0x4D31
- 0x6470
- 0x7Fancy
- 0x7ff/gaster
- 0xacb
- 0xadam
- 0xalwayslucky
- 0xB25C5E8fA1E53eEb9bE3421C59F6A66B786ED77A
- 0xbc
- 0xD3
- 0xd3vil
- 0xd4d/de4dot
- 0xd4d/dnspy
- 0xd4d/iced
- 0xf.at
- 0xflotus
- 0xFooBar Twitter
- 0xgalz/virtuailor
- 0xInfection
- 0xmaximus
- 0xMJ:AI-Security-Learning
- 0xnbk
- 0xr3act0r
- 0xscope.com
- 0xsyr0
- 0xtejas
- 0xyy66
- 10 - 301/601 - Introduction to Machine Learning - Fall 2023 - CMU
- 10 Advantages of Redis
- 10 npm security best practices
- 10 Steps to Develop an Incident Response Plan You’ll ACTUALLY Use
- 10 Things Everybody Needs to Know About Site Reliability Engineering (SRE)
- 10-414/714: Deep Learning Systems - CMU
- 10-418 / 10-618 (Fall 2019) Machine Learning for Structured Data
- 10-600 Math Background for ML - CMU
- 10-601 - Introduction to Machine Learning (MS) - Tom Mitchell - 2015, CMU
- 10-601 Machine Learning | CMU | Fall 2017
- 10-605 - Machine Learning with Large Datasets, Fall 2016 - CMU
- 10-701 - Introduction to Machine Learning (PhD) - Tom Mitchell, Spring 2011, CMU
- 10-702/36-702 - Statistical Machine Learning - Larry Wasserman, Spring 2016, CMU
- 10-708 - Probabilistic Graphical Models, Carnegie Mellon University
- 10-715 Advanced Introduction to Machine Learning - CMU
- 10-725 Convex Optimization, Spring 2015 - CMU
- 10-725 Convex Optimization: Fall 2016 - CMU
- 10-725 Optimization Fall 2012 - CMU
- 10-801 Advanced Optimization and Randomized Methods - CMU
- 100 BTC deadman drops: Silk Road
- 100 Days of Machine Learning - CampusX (Hindi)
- 1000字够不够?小米MIUI 10去广告教程
- 100301579-b4d00c00-2f98-11eb-82c5-047c190ffcd6.png
- 102 Deep Dive in the Dark Web OSINT Style Kirby Plessas
- 102160982-c6fde580-3e86-11eb-9885-c23eb60d622b.png
- 102161929-87d09400-3e88-11eb-9e42-70087e3fab87.png
- 102162100-dc740f00-3e88-11eb-8037-528fbcc636e9.png
- 102162218-16451580-3e89-11eb-85d1-a4d24c980d7d.png
- 10se1ucgo/disablewintracking
- 10大深网搜索引擎
- 11-755 - Machine Learning for Signal Processing, CMU
- 11-785: Introduction to Deep Learning - CMU
- 11-hour Practical Windows Forensics (PWF) course
- 111 个 Chrome 扩展被发现秘密收集用户敏感数据
- 11310b509f8bf86daa5577758e9d1eb5
- 117335188-28a50780-ae9b-11eb-98d9-cfd3bc2f1295.png
- 123webcam
- 131B - Introduction to Probability and Statistics, UCI
- 138查
- 14Finger:基于vue3+django前后端分离,功能齐全的Web指纹扫描和分享平台
- 15-213 Introduction to Computer Systems, Fall 2015 - CMU
- 15-418 - Parallel Computer Architecture and Programming, CMU
- 15-445 - Introduction to Database Systems, CMU
- 15-721 - Database Systems, CMU
- 15-721 Advanced Database Systems (Spring 2019) - CMU
- 15-780 - Graduate Artificial Intelligence, Spring 14, CMU
- 15-850 Advanced Algorithms - CMU Spring 2023
- 15-859BB: Quantum Computation and Quantum Information 2018 - CMU
- 15.S12 Blockchain and Money, Fall 2018 - MIT
- 150 things You Should Know About Security
- 159185618-fa20f45c-91b4-45b4-ad82-02becc648fa5.png
- 159185780-44a1af6e-7aa9-4f52-b04c-55a314b2a5e3.png
- 16 Linux server monitoring commands you really need to know
- 162656545-11db3759-6741-44e0-bcfb-f3542482415f.png
- 163061676-bae440c6-ff0d-478e-8799-98a927600964.png
- 16s-4102 - Algorithms, University of Virginia
- 17 small suggestions how to improve ssllabs.com/ssltest/
- 17mon/china_ip_list
- 17VIN 17位车架号查询
- 17Ydx9m7vrhnx4XjZPuGPMqrhw3sDviNTU
- 18-447 - Introduction to Computer Architecture, CMU
- 18-636 Browser Security, Stanford
- 18.01 Single Variable Calculus, Fall 2006 - MIT OCW
- 18.02 Multivariable Calculus, Fall 2007 - MIT OCW
- 18.03 Differential Equations, Spring 2010 - MIT OCW
- 18.06 - Linear Algebra, Prof. Gilbert Strang, MIT OCW
- 18.065 Matrix Methods in Data Analysis, Signal Processing, and Machine Learning - MIT OCW
- 18.409 Algorithmic Aspects of Machine Learning Spring 2015 - MIT
- 18.650 Statistics for Applications - MIT OCW
- 18.S096 Topics in Mathematics with Applications in Finance, MIT OCW
- 18o
- 192 (UK)
- 192.168.56.110
- 19h/ftab-dump
- 1cysw0rdk0/whodunnit
- 1fexd
- 1hehaq
- 1Hosts
- 1Mark
- 1N3
- 1n3/reverseapk
- 1NuNTXo7Aato7XguFkvwYnTAFV2immXmjS
- 1orenz0
- 1st Headlines
- 1ua
- 2-SPIFF: A 2-stage packer identification method based on function call graph and file attributes
- 2.0.11
- 2.5代指纹追踪技术—跨浏览器指纹识别
- 20 regular expressions examples to search for data related to cryptocurrencies
- 200214192-796332cf-fd56-4f30-b624-e17d2137aa8c.png
- 200214192-796332cf-fd56-4f30-b624-e17d2137aa8c.png
- 2005 DFRWS Forensic Challenge
- 2007 TREC Public Spam Corpus
- 2010 Digital Forensics and Incident Response Summit
- 2012 Lectures
- 2013 Lectures
- 2013 Volatility Plugin Contest
- 2014 Car Hacker's Handbook
- 2014 Lectures
- 2014 Volatility Plugin Contest
- 2015 Lectures
- 2015 Volatility Plugin Contest
- 2016 Car Hacker's Handbook
- 2016 Lectures
- 2017 Top 10 Application Security Risks
- 2017-SUEE-data-set
- 2018-04-GandCrab-Swarm
- 2018-05-Agent-Tesla-Open-Directory
- 2018-2020青年安全圈-活跃技术博主/博客
- 2019 虎鲸杯电子取证大赛赛后复盘总结
- 2019-01 Malicious Excel XLM Macros
- 2019-03 Sophisticated PowerShell Script (Dropping URLZone)
- 2019-07 Base64 Encoded Powershell Pivots
- 2020 Volatility Plugin Contest
- 2020-05 Zloader 4.0 Macrosheet Evolution
- 2020-07 Tale of a Polished Carrier
- 2021 Volatility Plugin Contest
- 2022 Volatility Plugin Contest
- 2022's Snyk protestware types
- 2022's Techcrunch protestware review
- 2023 High Performance Computing Course Prof Dr - Ing Morris Riedel
- 2023-06 Mystic Stealer: The New Kid on the Block
- 2024-01 Shortcut To Malice: URL Files
- 20to4
- 21 LTR: Scene1
- 2101yyf
- 22款受欢迎的计算机取证工具
- 237800413-dbb64ecc-394a-4fbd-8607-5b7f6955b340.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiJnaXRodWIuY29tIiwiYXVkIjoicmF3LmdpdGh1YnVzZXJjb250ZW50LmNvbSIsImtleSI6ImtleTUiLCJleHAiOjE3NDU4NzAyNzUsIm5iZiI6MTc0NTg2OTk3NSwicGF0aCI6Ii8yNDU1NTgxMC8yMzc4MDA0MTMtZGJiNjRlY2MtMzk0YS00ZmJkLTg2MDctNWI3ZjY5NTViMzQwLnBuZz9YLUFtei1BbGdvcml0aG09QVdTNC1ITUFDLVNIQTI1NiZYLUFtei1DcmVkZW50aWFsPUFLSUFWQ09EWUxTQTUzUFFLNFpBJTJGMjAyNTA0MjglMkZ1cy1lYXN0LTElMkZzMyUyRmF3czRfcmVxdWVzdCZYLUFtei1EYXRlPTIwMjUwNDI4VDE5NTI1NVomWC1BbXotRXhwaXJlcz0zMDAmWC1BbXotU2lnbmF0dXJlPWE2MmIxNTgzMWMyNjEwZjkwNTExYTc0MTEzYzcwMTNlNDAyY2M2MTJjMzA5YzhiYzFlMTEzNTMwMmJlNzQ3YTgmWC1BbXotU2lnbmVkSGVhZGVycz1ob3N0In0.30tnayL3eI41vdjZMJYBlUEY6lUOafWzU7Vc_T8zzIo
- 237801244-6c036a97-83f8-4c37-9ebd-2717c2d53507.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.FYcBKqg_kr0Pi1R-aJDaqri_E5eaO3lbq_zg6MD1q38
- 2687fcd6-cc92-11e6-8bad-885fc9f77a78.PNG
- 26de80e3bbbe1f053da4131ca7a405644b7443356ec97d48517f1ab86d5f1ca5.doc
- 26de80e3bbbe1f053da4131ca7a405644b7443356ec97d48517f1ab86d5f1ca5.macro
- 26de80e3bbbe1f053da4131ca7a405644b7443356ec97d48517f1ab86d5f1ca5.related
- 285046567-81def31a-e080-4b01-9aa2-25b979062963.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.-YxCgGVFofzPlhr17SkmLVOqKPwVz5mWoHIVlXd8PCM
- 285047222-302dc69f-7026-4f41-afe6-e24c4d0a514a.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.W1_APqLlmvzrE9pmcQ6vCAHYq9xWENoIQ2zee6McdA8
- 285048065-f6c71594-d38a-4c7c-9142-5aa1e203f3fa.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.RCDxeVpVHO642KIwBjXOqbQ-m2CEtw4PmHZTSBvpGAI
- 285049369-c8bd8cab-9894-4886-94b5-bfd6bb0b9d8e.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.qjDARlWB_Zmxsi7n97sYFt4y6fWQPJVa2dwfllgfls4
- 285054817-4a6a00d9-7a8c-4765-a4d6-ea99aa516200.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.axqvS9mD5ai9ZRinhBf20qvEWbk_RRjEG7HS50u6TzI
- 2FA bypassing
- 2lingual
- 2lingual Search
- 2much:1
- 2Pi Network attack
- 2press
- 2tokui
- 2xyo
- 2个思路
- 3 Lessons Learned From Implementing Chaos Engineering at Enterprise
- 301 Redirects explained
- 307993947-550d3004-9cbc-404e-b74c-9248a2d0bb0f.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.VZaK1Ba_73MCKzEOWeGOHuWdS51R0s-B5SU5foa0GeA
- 30min demo
- 32-Bit Windows Buffer Overflows Made Easy
- 32Lite
- 3389user无法添加
- 359848676-9ae33fe8-6069-48e6-a4a3-ea74d2f351e1.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.FokjpN4O18AftCMVznqhcKGrvRBh82gs4rzzivBeGEs
- 35c3 - post
- 36-705 - Intermediate Statistics - Larry Wasserman, CMU
- 360 0Kee-Team 的 crawlergo动态爬虫 结合 长亭XRAY扫描器的被动扫描功能
- 360 PassiveDNS.CN
- 360° AML Analytics
- 360SafeBrowsergetpass-一键辅助抓取360安全浏览器密码的Cobalt Strike脚本
- 379997488-ce79232d-2cb2-4cdf-9304-ca7b6bffeced.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiJnaXRodWIuY29tIiwiYXVkIjoicmF3LmdpdGh1YnVzZXJjb250ZW50LmNvbSIsImtleSI6ImtleTUiLCJleHAiOjE3NDU4Njk5OTYsIm5iZiI6MTc0NTg2OTY5NiwicGF0aCI6Ii8xMDI4MzgxNjcvMzc5OTk3NDg4LWNlNzkyMzJkLTJjYjItNGNkZi05MzA0LWNhN2I2YmZmZWNlZC5wbmc_WC1BbXotQWxnb3JpdGhtPUFXUzQtSE1BQy1TSEEyNTYmWC1BbXotQ3JlZGVudGlhbD1BS0lBVkNPRFlMU0E1M1BRSzRaQSUyRjIwMjUwNDI4JTJGdXMtZWFzdC0xJTJGczMlMkZhd3M0X3JlcXVlc3QmWC1BbXotRGF0ZT0yMDI1MDQyOFQxOTQ4MTZaJlgtQW16LUV4cGlyZXM9MzAwJlgtQW16LVNpZ25hdHVyZT04NWVlMTYxOWMwY2RlYmJhYmZjNzQ3NjJjZjFmMjYxNjVlMmQ1M2E3MGFhNTRlNWFhYzJhODUyYWUzYTQzNmQyJlgtQW16LVNpZ25lZEhlYWRlcnM9aG9zdCJ9.RRGe-NpqPiTaAPNzhcT2iHyzUXAm3ByJsjOQrMRwKa0
- 379997933-d02c82fc-1226-4522-b37b-04b007211102.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiJnaXRodWIuY29tIiwiYXVkIjoicmF3LmdpdGh1YnVzZXJjb250ZW50LmNvbSIsImtleSI6ImtleTUiLCJleHAiOjE3NDU4Njk5OTYsIm5iZiI6MTc0NTg2OTY5NiwicGF0aCI6Ii8xMDI4MzgxNjcvMzc5OTk3OTMzLWQwMmM4MmZjLTEyMjYtNDUyMi1iMzdiLTA0YjAwNzIxMTEwMi5wbmc_WC1BbXotQWxnb3JpdGhtPUFXUzQtSE1BQy1TSEEyNTYmWC1BbXotQ3JlZGVudGlhbD1BS0lBVkNPRFlMU0E1M1BRSzRaQSUyRjIwMjUwNDI4JTJGdXMtZWFzdC0xJTJGczMlMkZhd3M0X3JlcXVlc3QmWC1BbXotRGF0ZT0yMDI1MDQyOFQxOTQ4MTZaJlgtQW16LUV4cGlyZXM9MzAwJlgtQW16LVNpZ25hdHVyZT04ZmMxYzBkZWI4OGY3ZDM3ZDIwOGRlZjgwMzYwMDg0ZjZjOGNhZTFhYmZiYTJkYWM2Yjg3MDY4YWM3ZWFkYzgwJlgtQW16LVNpZ25lZEhlYWRlcnM9aG9zdCJ9.bLLMgekYvXWuePHDuouYioe1h0jg6Ohx2t3c2Ze3pmY
- 379998271-ab3cd0ca-2539-4df4-8e7b-8fcc6869bbfd.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiJnaXRodWIuY29tIiwiYXVkIjoicmF3LmdpdGh1YnVzZXJjb250ZW50LmNvbSIsImtleSI6ImtleTUiLCJleHAiOjE3NDU4Njk5OTYsIm5iZiI6MTc0NTg2OTY5NiwicGF0aCI6Ii8xMDI4MzgxNjcvMzc5OTk4MjcxLWFiM2NkMGNhLTI1MzktNGRmNC04ZTdiLThmY2M2ODY5YmJmZC5wbmc_WC1BbXotQWxnb3JpdGhtPUFXUzQtSE1BQy1TSEEyNTYmWC1BbXotQ3JlZGVudGlhbD1BS0lBVkNPRFlMU0E1M1BRSzRaQSUyRjIwMjUwNDI4JTJGdXMtZWFzdC0xJTJGczMlMkZhd3M0X3JlcXVlc3QmWC1BbXotRGF0ZT0yMDI1MDQyOFQxOTQ4MTZaJlgtQW16LUV4cGlyZXM9MzAwJlgtQW16LVNpZ25hdHVyZT1jOTk1ZGQ3ZjAwYTIxNjU4MjgzYzJhYTY1ZjNlYjk4YmQ2OTY0NmQ2NmI5ZDk2ZTdjYjdmMGEyZmU4ZTIyNzU5JlgtQW16LVNpZ25lZEhlYWRlcnM9aG9zdCJ9.H7OMOcWt6OWqMEDU7shTOYyEIAv_TNpz2rrptfne7_g
- 3D Computer Vision - National University of Singapore
- 3D Sun Path
- 3f/dllexport
- 3Ld4D
- 3rdPartyTools
- 3snake
- 3v4Si0N
- 3xp0rt
- 4 Real-World Scenarios That Read Like Chaos Engineering Experiments
- 4 Steps for Pairing the Cloud and DevOps to Improve Resiliency
- 4 use-cases for Sankey Charts
- 4 ways Capture Memory for Analysis (Memory Forensics)
- 4 Ways to Identify Who is Logged-In on Your Linux System
- 403 bypass checklist
- 404notf0und学习记录
- 40huo
- 411 (US)
- 413 Request Entity Too Large in Nginx with client_max_body_size set
- 413x8
- 427686877-496cc3cb-17ee-445a-802c-2f496f39a34c.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.TGn0CyXxbI409khB7MNQLDaD8cdu1U41BapPrUeaBek
- 428754890-9cd923b0-7f37-46e9-b857-d5ee0930a82b.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiJnaXRodWIuY29tIiwiYXVkIjoicmF3LmdpdGh1YnVzZXJjb250ZW50LmNvbSIsImtleSI6ImtleTUiLCJleHAiOjE3NDU4NzAyMDUsIm5iZiI6MTc0NTg2OTkwNSwicGF0aCI6Ii8zNDUxNTIyOS80Mjg3NTQ4OTAtOWNkOTIzYjAtN2YzNy00NmU5LWI4NTctZDVlZTA5MzBhODJiLnBuZz9YLUFtei1BbGdvcml0aG09QVdTNC1ITUFDLVNIQTI1NiZYLUFtei1DcmVkZW50aWFsPUFLSUFWQ09EWUxTQTUzUFFLNFpBJTJGMjAyNTA0MjglMkZ1cy1lYXN0LTElMkZzMyUyRmF3czRfcmVxdWVzdCZYLUFtei1EYXRlPTIwMjUwNDI4VDE5NTE0NVomWC1BbXotRXhwaXJlcz0zMDAmWC1BbXotU2lnbmF0dXJlPTExNGI4YzQwZjM3ODY1OTAzNGE5MjU4MGUwZjdlN2NiM2Y2ZjUzOWE4MTM0ZjI0MWZhYTk1Y2ZkNmIyZjEzZDQmWC1BbXotU2lnbmVkSGVhZGVycz1ob3N0In0.U9l65v_IE_bH4lUJOqrcG0AB8TdxBnHnGhVN_efBaGw
- 431072455-409cabba-b80a-49d1-8737-d0178ad1ead9.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.baoCDn90zp4KPMT3Ysca_lzgNEu5FR2aWgfnk6BJTvI
- 432923561-c5e3143c-e5af-40b2-8ebe-b8fa0e2034ca.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.2z9EcrXLNIdbRo1yUtASZXGXIi2JWoYZ7vvFcysMgsw
- 438085 - Security: SOP bypass via DNS-Rebind (including PoC) - chromium - Monorail
- 4armed/volatility-attributeht
- 4chan
- 4chansearch
- 4G Access Level Security Assessment
- 4nonimizer
- 4plebs
- 4ra1n
- 4Shared
- 4w4k3
- 5 Agile Practices Every SRE Team Should Adopt
- 5 Reasons to Rackmount Your PC
- 5 Steps to Getting Your App Chaos Ready
- 5 ways to improve HDD speed on Linux
- 5 Ways to Keep Remote SSH Sessions and Processes Running After Disconnection
- 5 Ways to patch binaries with Cutter
- 5-Star Automotive Cyber Safety Framework, 2015
- 500K HTTP Headers
- 501 Website Hacking Secrets
- 504ensicslabs/lime
- 59e92b0e-cc92-11e6-90bf-a050ed920ee9.png
- 5Fingers
- 5G NR Jamming, Spoofing, and Sniffing
- 5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol
- 5h4kun1
- 5ime
- 5k1l
- 5w33t50ny4
- 6 Days
- 6 Threat Intelligence Sources That Will Help Enhance Digital Forensics Readiness | By Jonathan Zhang
- 6.00 - Introduction to Computer Science and Programming (Fall 2008) - MIT OCW
- 6.0001 - Introduction to Computer Science and Programming in Python - MIT OCW
- 6.0002 Introduction to Computational Thinking and Data Science - MIT OCW
- 6.001 - Structure and Interpretation of Computer Programs, MIT
- 6.004 - Computation Structures Spring 2013, MIT
- 6.006 - Introduction to Algorithms, MIT OCW
- 6.00SC - Introduction to Computer Science and Programming (Spring 2011) - MIT OCW
- 6.01SC - Introduction to Electrical Engineering and Computer Science I - MIT OCW
- 6.034 Artificial Intelligence, MIT OCW
- 6.036 - Machine Learning, Broderick - MIT Fall 2020
- 6.041 Probabilistic Systems Analysis and Applied Probability - MIT OCW
- 6.042J - Mathematics for Computer Science, MIT OCW
- 6.045 Automata, Computability, and Complexity, MIT
- 6.046 - Design and Analysis of Algorithms, Spring 2015 - MIT OCW
- 6.046J - Introduction to Algorithms - Fall 2005, MIT OCW
- 6.047/6.878 Machine Learning for Genomics Fall 2020 - MIT
- 6.047/6.878 Public Lectures on Computational Biology: Genomes, Networks, Evolution - MIT
- 6.1600 Foundations of Computer Security - MIT Fall 2023
- 6.172 Performance Engineering of Software Systems - MIT OCW
- 6.262 Discrete Stochastic Processes - MIT OCW
- 6.802J/ 6.874J Foundations of Computational and Systems Biology - MIT OCW
- 6.824 - Distributed Systems, Spring 2015 - MIT
- 6.824 Distributed Systems - Spring 2020 - MIT
- 6.828 - Operating System Engineering [Fall 2014]
- 6.830/6.814 - Database Systems [Fall 2014]
- 6.832 Underactuated Robotics - MIT OCW
- 6.834J Cognitive Robotics - MIT OCW
- 6.837 - Computer Graphics - Spring 2017 - MIT
- 6.838 - Shape Analysis - Spring 2017- MIT
- 6.851 - Advanced Data Structures, MIT
- 6.854 - Advanced Algorithms, MIT
- 6.858 Computer Systems Security - MIT OCW
- 6.874 MIT Deep Learning in Life Sciences - Spring 2021 - MIT
- 6.875 - Cryptography - Fall 2021 - MIT
- 6.889 - Algorithms for Planar Graphs and Beyond (Fall 2011) MIT
- 6.890 Algorithmic Lower Bounds: Fun with Hardness Proofs - MIT OCW
- 6.S081 - Operating System Engineering [Fall 2020]
- 6.S094: Deep Learning for Self-Driving Cars - MIT
- 6.S191: Introduction to Deep Learning - MIT
- 6.S897 Machine Learning For Healthcare
- 60 Cybersecurity Interview Questions 2019 Update
- 60字节 - 无文件渗透测试实验
- 64 Base
- 64 位 elf 的 one_gadget 通杀思路
- 6847b98f36e96c3d967524811409e164746bea5ae021d44fbd6c7bfefe072582.dll
- 687474703a2f2f7778312e73696e61696d672e636e2f6c617267652f62656265646262356c7931666979617775357133366a32306774303766676d722e6a7067
- 687474703a2f2f7778322e73696e61696d672e636e2f6c617267652f62656265646262356c7931666472656271336667756a32306f703064627138702e6a7067
- 687474703a2f2f7778342e73696e61696d672e636e2f6c617267652f62656265646262356c7931666472653235613872316a323065623039773077672e6a7067
- 687474703a2f2f7778342e73696e61696d672e636e2f6c617267652f62656265646262356c7931666472656e776935646d6a3230657030616e77676b2e6a7067
- 68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f6c6963656e73652f416e6775734a6f686e736f6e2f436c697070657232
- 68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f6c6963656e73652f417274696b6173682f54657874726163746f72
- 68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f6c6963656e73652f4175726f72615772696768742f6f776f6372
- 68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f6c6963656e73652f426c696e75652f4d6167706965
- 68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f6c6963656e73652f43687579752d5465616d2f56432d4c544c35
- 68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f6c6963656e73652f43687579752d5465616d2f59592d5468756e6b73
- 68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f6c6963656e73652f496e57494c4c2f4c6f63616c655f52656d756c61746f72
- 68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f6c6963656e73652f506164646c65506164646c652f506164646c654f4352
- 68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f6c6963656e73652f526170696441492f52617069644f63724f6e6e78
- 68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f6c6963656e73652f54504e2d5465616d2f4f4352
- 68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f6c6963656e73652f54737564614b61676579752f6d696e686f6f6b
- 68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f6c6963656e73652f623174672f77696e31312d6f6e656f6372
- 68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f6c6963656e73652f696b6567616d692d79756b696e6f2f6d65636162
- 68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f6c6963656e73652f696c6975732f7079676c6f7373617279
- 68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f6c6963656e73652f6b6f6b6b652f74696e792d4145532d63
- 68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f6c6963656e73652f6c6f62656875622f6c6f62652d69636f6e73
- 68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f6c6963656e73652f6d6963726f736f66742f6f6e6e7872756e74696d65
- 68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f6c6963656e73652f6d6974792f6d643463
- 68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f6c6963656e73652f6e616e6f6b696e612f656279726f6964
- 68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f6c6963656e73652f6f70656e63762f6f70656e6376
- 68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f6c6963656e73652f726170696466757a7a2f726170696466757a7a2d637070
- 68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f6c6963656e73652f737769676765722f7765636861742d6f6372
- 68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f6c6963656e73652f75796a756c69616e2f41746c61735472616e736c617465
- 68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f6c6963656e73652f787570656665692f4c6f63616c652d456d756c61746f72
- 68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f6c6963656e73652f7a78796163622f6e746c6561
- 68747470733a2f2f7777772e676f6f676c652e636f6d2f73322f66617669636f6e733f646f6d61696e3d687474703a2f2f646174696e672e7275
- 68747470733a2f2f7777772e676f6f676c652e636f6d2f73322f66617669636f6e733f646f6d61696e3d687474703a2f2f656e2e67726176617461722e636f6d2f
- 68747470733a2f2f7777772e676f6f676c652e636f6d2f73322f66617669636f6e733f646f6d61696e3d687474703a2f2f666f72756d2e33646e6577732e72752f
- 68747470733a2f2f7777772e676f6f676c652e636f6d2f73322f66617669636f6e733f646f6d61696e3d687474703a2f2f6a616e64616e2e6e65742f
- 68747470733a2f2f7777772e676f6f676c652e636f6d2f73322f66617669636f6e733f646f6d61696e3d687474703a2f2f70726f6d6f646a2e636f6d2f
- 68747470733a2f2f7777772e676f6f676c652e636f6d2f73322f66617669636f6e733f646f6d61696e3d687474703a2f2f72656163742d6368696e612e6f72672f
- 68747470733a2f2f7777772e676f6f676c652e636f6d2f73322f66617669636f6e733f646f6d61696e3d687474703a2f2f7777772e6f70747a6d782e636f6d
- 68747470733a2f2f7777772e676f6f676c652e636f6d2f73322f66617669636f6e733f646f6d61696e3d68747470733a2f2f776f726470726573732e636f6d2f
- 68747470733a2f2f7777772e676f6f676c652e636f6d2f73322f66617669636f6e733f646f6d61696e3d68747470733a2f6562696f2e6767
- 6abd
- 6badf0748ca6cbd4a1f1175dbb8a6dbbee1656c7086378418e1397bce025aa60.exe
- 6mile
- 6uhrmittag
- 7 Best Practices for Writing Kubernetes Operators: An SRE Perspective
- 7 Habits of Highly Successful Site Reliability Engineers
- 7 Linux Shells Using Built-in Tools
- 7 Tips for Fuzzing Firefox More Effectively
- 7-Zip
- 7.32 Systems Biology, Fall 2014 - MIT OCW
- 75380fa6-2089-11e7-8a4a-4a8ae9c06e24.png
- 79a56ca8a7fdeed1f09466af66c24ddef5ef97ac026297f4ea32db6e01a81190.dll
- 79款 Netgear 路由器遭远程接管0day
- 7chan
- 7Rocky
- 7snovic
- 8 Useful Commands to Monitor Swap Space Usage in Linux
- 8.1.2
- 8.1.3
- 8a5041d41c552c5df95e4a18de4c343e5ac54845e275262e99a3a6e1a639f5d4.vbs
- 8ctopus
- 9 APIs for real time cryptocurrency data
- 9 techniques for your blockchain analysis tool
- 9 Years of Failure: How Racing Crappy Cars Made Me a Better SRE
- 9.520 - Statistical Learning Theory and Applications, Fall 2015 - MIT
- 91237a76e43caa35e3fbd42d47fbaca5d6b5ea7a96c89341196d070b628122ce.bat
- 92naMoN
- 945a1276860fc4904ca23ed86b22e1782cd5761bc6c47f1cf331d9ae02cde0db.ps1
- 97 Things Every Cloud Engineer Should Know
- 97 Things Every SRE Should Know
- 98e4695eb06b12221f09956c4ee465ca5b50f20c0a5dc0550cad02d1d7131526.xlm
- 996.Leave
- 99845076-5b20a980-2b74-11eb-9312-986867034cc9.png
- 9gag
- A Beginners Guide To Hacking Computer Systems
- A bit of a qUACkery – how to elevate… w/o doing a single thing ;)
- A bunch of proof-of-concept exploits for the Linux kernel
- A Burglar's Guide to the City
- A Car Hacking Experiment: When Connectivity Meets Vulnerability
- A Case Study of the Capital One Data Breach
- A close look at a daily dataset of malware samples
- A collection of dashboards related to Ethereum
- A collection of full-stack resources for programmers.
- A compact multi-step framework for packing identification in portable executable files for malware analysis
- A comparative analysis of classifiers in the recognition of packed executables
- A comparative analysis of software protection schemes
- A comparative assessment of malware classification using binary texture analysis and dynamic analysis
- A Comparison of Commercial and Military Computer Security Policies
- A Complete Practical Approach To Malware Analysis And Memory Forensics - 2022 Edition
- A complexity measure
- A Comprehensible Guide to Controller Area Network
- A comprehensive guide to setting up NextDNS
- A comprehensive solution for obfuscation detection and removal based on comparative analysis of deobfuscation tools
- A consistently-executing graph-based approach for malware packer identification
- A control flow graph-based signature for packer identification
- A curated list of crypto project trackers and analytics dashboards.
- A Customer Service Approach to SRE
- A data-driven dynamic ontology
- A Day in the Life of a New Relic SRE
- A day in the life of… Cat S (Head of Reliability Engineering)
- A Deep Dive into Crypto Custody
- A Deep Dive into iOS Code Signing
- A Deep Dive Into Seamless Blue/Green Deployment Using AWS CodeDeploy
- A deeper dive into our May 2019 security incident
- A Detailed Guide on OSCP Preparation – From Newbie to OSCP
- A Detailed Guide on OSCP Preparation – From Newbie to OSCP
- A distributed secure system
- A Distributed Trust Model
- A dynamic heuristic method for detecting packed malware using naive bayes
- A fast flowgraph based classification system for packed and polymorphic malware on the endhost
- A fast randomness test that preserves local detail
- A few things about Redis security
- A fine-grained classification approach for the packed malicious code
- A first course in Linear Algebra - N J Wildberger - UNSW
- A forensics repo?
- A framework for dynamic subversion
- A generic approach to automatic deobfuscation of executable code
- A Generic Sidecar Injector for Kubernetes
- A Gentle Introduction to Ethereum Programming, Part 1
- A glimpse into GitHub's Bug Bounty workflow
- A Graduate Course in Applied Cryptography
- A graph visualization of Bitcoin transactions using Sigma.js
- A Graph-Based System for Network-Vulnerability Analysis
- A Guide to Attacking Domain Trusts
- A Guide to Blockchain Analysis Tools
- A guide to Linux Privilege Escalation
- A Guide to Open Source Intelligence (OSINT) - Columbia Journalism Review
- A guide to searching LinkedIn by email address
- A Guide to Understanding Audit in Trusted Systems
- A Guide to Understanding Covert Channel Analysis of Trusted Systems
- A Guide to Understanding Identification and Authentication in Trusted Systems
- A Guide to Understanding Security Modeling in Trusted Systems
- A Hardware Architecture for Implementing Protection Rings
- A heuristic approach for detection of obfuscated malware
- A heuristics-based static analysis approach for detecting packed PE binaries
- A History of SRE at Uber’ with Rick Boone of Uber
- A Journey Into SRE
- A large scale empirical comparison of state-of-the-art search-based test case generators
- A lattice model of secure information flow
- A learning model to detect maliciousness of portable executable using integrated feature set
- A Linear Time Algorithm for Deciding Subject Security
- A little more fun with Mach-O headers: adding and spoofing a constructor
- A machine-learning-based framework for supporting malware detection and analysis
- A Methodical Approach to Browser Exploitation
- A New Chapter for OSS-Fuzz
- A New Debug Server for Supporting GDB on Embedded Platforms - GNU Tools Cauldron 2019
- A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages!
- A New Tool to Detect Known Malware from Memory Images – impfuzzy for Volatility –
- A note on the confinement problem
- A penetration tester’s guide to sub-domain enumeration
- A postmortem for a time sharing system
- A Process Mining-Based Method for Attacker Profiling Using the MITRE ATT&CK Taxonomy
- A Provably Secure Operating System
- A Quick and Efficient Method For Locating the main() function of Linux ELF Malware Variants
- A Quick Look at Volatility 1.4 RC1 - What's New?
- A response
- A Roadmap for Node.js Security
- A run-time approach for pentesting iOS applications
- A Sankey diagram of the monetary flows example
- A scientist's guide for submitting data to ZFIN
- A script to scan for unsecured Laravel .env files
- A Secure and Reliable Bootstrap Architecture
- A Security Study of Chrome’s Process-based Sandboxing
- a single rule per sample
- A small discovery about AppLocker
- A static, packer-agnostic filter to detect similar malware samples
- A study of the packer problem and its solutions
- A survey of Android exploits in the wild
- A survey of dimensionality reduction techniques
- A Survey of Remote Automotive Attack Surfaces
- A Survey of Remote Automotive Attack Surfaces, 2014
- A survey on adversarial attacks for malware analysis
- A survey on machine learning-based detection and classification technology of malware
- A survey on malware analysis techniques: Static, dynamic, hybrid and memory analysis
- A survey on run-time packers and mitigation techniques
- A Systematic Approach to Uncover Security Flaws in GUI Logic
- A Systematic Review of Online Bitcoin Visualizations
- A Tale of (prototype) Poisoning
- A Tale of Two Postmortems: A Human Factors View
- A Tale of Two Rotations: Building a Humane & Effective On-Call
- A Terrible, Horrible, No-Good, Very Bad Day at Slack
- A testimonial for using PagerDuty at Scribd
- A Theory and Tools for Applying Sandboxes Effectively
- A token strengthened encryption packer to prevent reverse engineering PE files
- A tool for organizing info
- A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components
- A Unified Debug Server for Deeply Embedded Systems and GDB/LLDB - Simon Cook - ORConf 2019
- A unpacking and reconstruction system-agunpacker
- A Visual Explanation of GPG Subkeys (2022)
- A Volatility Plugin Created for Detecting Malware Used in Targeted Attacks
- A VSCode extension for inspecting solidity smartcontracts using Forge
- A Vulnerability in Modern Automotive Standards and How We Exploited It
- A Windows 95 themed UI for interacting with Ethereum smart contracts
- A-AFTAHI
- A-collection-of-configuration-file-paths:国内各种软件的配置文件目录
- A-Rat
- a-urth
- a-vincent
- A-YATTA
- a.out (FreeBSD manual pages)
- A.out binary format
- a0rtega
- A1 Website Download
- a1346054
- a1ext/auto_re
- a1ext/labeless
- a1gx
- A1S0N
- A1vinSmith
- A2SV
- a5bc8c8b89177f961aa5c0413716cb94b753efbea1a1ec9061be53b1be5cd36a.msi
- a7t0fwa7
- Aa-tools
- aa419 Fake Sites Database
- AabyssZG
- AADInternals
- aagor
- aahutsal
- aancw
- aandergr
- aanm
- AAPG - Android application penetration testing guide
- aarmam
- AaronChen0
- aaronjanse
- AaronOpfer
- aarontorres0
- aarontp
- aarush-dev
- Aashish683
- aaslamin
- AAVE V2 安全审计手册
- Aayush-Goel-04
- Aazhen-v3.1:自研JavaFX图形化漏洞扫描工具,支持ThinkPHP 2.x RCE,Thinkphp5 5.0.22/5.1.29RCE,ThinkPHP5 5.0.23RCE和ThinkPHP5 SQL注入漏洞和敏感信息泄露漏洞的漏洞检测,以及命令执行的功能
- Abbas-MG
- abcnews/data-life
- abdelrahmanbadr
- abdrakhmanov
- abdullah2993
- abheektripathy
- abi guesser
- abi-decompiler
- abi-lity
- Abinator
- Abine
- ABK Scrambler
- ABN Search
- About anti-debug tricks
- About MemLabs
- AboutDFIR - Challenges & CTFs
- ABPTTS
- Abracadabra Money white hat attack
- abrignoni/dfir-sql-query-repo
- Absent extreme learning machine algorithm with application to packed executable identification
- absolutelabs.io
- Abstraction and Refinement of Layered Security Policy
- abuango
- aburgh/disk-arbitrator
- abuse-ssl-bypass-waf-使用不同的ssl加密方式来寻找防火墙不支持但服务器支持的加密方式来绕过waf
- abuse.ch
- AbuseIPDB
- Abusing Exchange one Api call from DA
- Abusing SUDO
- Abusing Support Portal
- Abusing Token Privileges
- abuyusif01
- Abyss-W4tcher
- ABYZNewsLinks
- ac-pm/inspeckage
- Academia
- Academic Journals
- ACC
- Accelerating incident response using generative AI
- Accelerating Investigations Using the Crypto Analysis Transaction Visualization
- Accepting risk with exceptions
- Access
- Access and Data Brokers
- Access Control Model For Distributed Conferencing System
- Access Controls
- access requests
- accessible hacking tool
- Accessing Volume Shadow Copies within a forensic image
- Accidentally destroyed production database on first day of a job...
- Account Abstraction Security Audit Checklist
- Account Creation Date Bot
- Account Model
- Account Takeover
- Accounts
- Accuranker
- ace
- AceLdr:Cobalt Strike UDRL 用于内存扫描bypass
- Achieving Excellence: SLO Thresholds That Transform Service Quality
- Achieving observability in async workflows
- achton
- Acid
- Acid Reloaded
- acidanthera/lilu
- acidanthera/VirtualSMC
- ACLight
- aclpwn.py
- aconite33
- Acount takeover checklist
- ACP SUMMER SCHOOL 2023 on Machine Learning for Constraint Programming
- ACProtect
- Acra
- ACSC (Australian Cyber Security Centre) Logging and Fowarding Guide
- ACSC 2021 Qual - Cowsay as a Service
- ACSC CTF 2023 - easyssti
- ACSC-CyberLab
- acskurucz
- ACT
- ACT 460 / STA 2502 – Stochastic Methods for Actuarial Science - University of Toronto
- ACT mapi
- Actions
- Actions Automate any workflow
- actions-user
- Active
- Active Directory
- Active Directory Basics
- Active Directory Cheat Sheet
- Active Directory Exploitation Cheat Sheet
- Active Directory Methodology
- active questions by our community
- Active-Active Shared-Nothing Database Architecture
- active-cve-check
- ActiveDirectory BloodHound
- ActiveDirectory Enumeration & Attacks
- ActiveDirectory Enumeration & Attacks
- ActiveDirectory LDAP
- ActiveDirectory Powerview
- Actively developed since 2012!
- Activity
- Actual complete User's manual
- Actual short User's manual
- ActuatorExploit:SpringBoot Actuator未授权自动化利用,支持信息泄漏/RCE
- Acunetix acuart
- Acunetix acublog
- Acunetix acuforum
- Acunetix SecurityTweets
- acunniffe
- aczietlow
- AD Module
- AD-Attack-Defense
- Ad-Bean
- AD-Pentest-Notes:内网渗透(域渗透)学习记录
- Adalanche
- adam-m
- adamculpepper
- adamenger
- Adamkadaban
- AdamKobi
- AdamKorcz
- adamluk
- adamtagscherer
- Adannaya
- ADAPE-Script
- Adaptive Cyberdefense for Survival and Intrusion Tolerance
- Adaptive unpacking of Android Apps
- Adarsh A @adarsh-a-tw
- AdAway
- adb
- ADB-Toolkit
- Adblock
- adbsploit-一个基于Python3和ADB的安卓设备漏洞利用和管理工具
- ADD GROUPS
- Add the repository
- Add this
- addenial
- Addict-o-matic
- adding new features
- Adding something to scope
- Additional instructions on Wiki-pages
- addMemShellsJSP:通过jsp注入valve内存马,可以忽略框架影响,通用tomcat789
- address tx search by web3rekt
- Addresses.com
- Addressing GitHub’s recent availability issues
- Addressing the Lack of Comparability & Testing in CAN Intrusion Detection Research: A Comprehensive Guide to CAN IDS Data & Introduction of the ROAD Dataset
- adeebshihadeh
- Adelaide - South Australia
- Ademking
- adesnos
- ADF
- ADFS
- ADFSDump
- AdGuard
- AdGuardHome
- adguardteam/adguardforwindows
- adguardteam/adguardhome
- Adhrit - Android Security Suite for in-depth reconnaissance and static bytecode analysis based on Ghera benchmarks
- adiantek
- ADIDNS Revisited
- adidnsdump
- adilsoybali
- adindrabkin
- Adinfo:域信息收集工具(用 golang 二开goddi)
- adiranas
- adisbladis
- Adithyan AK
- adityanandanx
- Adium
- adivinaelnombre
- admin panal.md
- admin panal.md
- admin-panel-finder
- Adobe - The Good, the Bad and the Ugly: The 3 Learnings of an SRE
- adolfintel/windows10-privacy
- Adopting the practice of SRE
- adoptopenjdk/jitwatch
- adoxa
- ADRecon
- adriang-90
- adrianherrera
- adrianosela
- AdriiiPRodri
- ADS-B Exchange
- adulau
- adulau/dcfldd
- Advanced 3G and 4G Wireless Mobile Communications - IIT Kanpur
- Advanced Android Development
- Advanced Background Checks
- Advanced Bash-Scripting Guide - /dev
- Advanced CAN Message Injection, 2016
- Advanced Computer Vision - CBCSL OSU
- advanced configuration
- Advanced Data Structures
- Advanced Deep Learning for Computer vision (ADL4CV) (IN2364) - TU Munich
- Advanced Docker orchestration workshop
- Advanced Engineering Mathematics - Notre Dame
- Advanced feature engineering for static detection of executable packing
- Advanced Features
- Advanced Forensics File Format: AFF4
- Advanced Machine Learning, 2021-2022, Sem I - by Prof. Madhavan Mukund, CMI
- Advanced Napkin Math: Estimating System Performance from First Principles
- Advanced Penetration Testing
- Advanced preprocessing of binary executable files and its usage in retargetable decompilation
- Advanced Procmon Part 1 – Filtering exclusions
- Advanced Procmon Part 2 – Filtering inclusions
- Advanced Programming in the UNIX Environment
- Advanced SQL Injection Hacking and Guide
- Advanced Topics in Communication Networks, Fall 2022 - ETH Zürich
- Advanced Topics in Quantum Info Th.
- Advanced Usage
- Advanced Vision 2014 - University of Edinburgh
- Advanced Visualization UC Davis
- Advanced x86: Introduction to BIOS & SMM
- Advanced x86: Virtualization with Intel VT-x
- Advanced XSS Detection Suite
- Advanced-SQL-Injection-Cheatsheet:一个有关 SQL 注入的检查 payload 清单
- Advangle
- Adventures in Automotive Networks and Control Units
- Adventures in Automotive Networks and Control Units (aka car hacking)
- Adventures in the Windows NT Registry: A step into the world of Forensics and Information Gathering
- Adversarial attacks against windows PE malware detection: A survey of the state-of-the-art
- Adversarial EXEmples: A survey and experimental evaluation of practical attacks on machine learning for windows malware detection
- Adversarial learning on static detection techniques for executable packing
- Adversarial malware binaries: Evading deep learning for malware detection in executables
- Adversarial ML Threat Matrix
- Adversarial tool for breaking static detection of executable packing
- Adversaries: Know Thy Opponent (from Saydjari's book)
- advice from cert-cwatch
- Advisory: Java/Python FTP Injections Allow for Firewall Bypass
- adwind_string_decoder
- adysec
- aeflores
- AEM misconfiguration
- aeneasr
- aenima-x
- Aeon
- AEP
- Aerial Robotics - University of Pennsylvania (UPenn)
- Aetf
- Aetherinox
- af3556
- afaal
- afaerber
- afdesk
- AFE
- afghanistan.liveuamap.com
- afk-procrastinator
- AFL's Blindspot and How to Resist AFL Fuzzing for Arbitrary ELF Binaries
- AFL++
- AFR
- African Journal Online
- Agave Finance attack
- ageis
- Agence France-Presse (AFP)
- Agent Execution Quick Start Guide
- Agent-Based Systems 2015/16- University of Edinburgh
- AgentInjectTool:改造BeichenDream/InjectJDBC加入shiro获取key和修改key功能
- AgentTesla data exfil through SMTP
- agentzh's Nginx Tutorials
- aggregate
- AggressorScripts_0x727:Cobalt Strike AggressorScripts For Red Team
- AggressorScripts-适用于Cobalt Strike 3.x & 4.x 的插件【信息搜集/提权/定位域管/读取密码/内网扫描/RDP相关/添加用户/内网穿透/权限维持/日志清除/辅助模块/】
- Agile threat modeling
- agile6v
- agnivesh/aft
- AGOA Data Center
- agraf
- agrawalarpit14
- agrepravin
- agshaidun
- aguilajesus
- aguinetqb
- agustingianni
- AheadLib-x86-x64:DLL 劫持源码生成器
- AheadLib64:类似Aheadlib的DLL 劫持源码生成工具
- aHenryJard
- Ahmed-Sharaf-Mohammed
- AhmedBafkir
- Ahmia
- AHPack
- ahrefs
- AI Assistance Guide
- AI code translator
- AI-for-Security-Learning
- ai-ho-j3ssie
- AI-Powered Fuzzing: Breaking the Bug Hunting Barrier
- AI:Web:1
- AI:Web:2
- AI+Blockchain Tracking
- AidData
- AIDE
- AIEngine
- aim4r/voldiff
- aimarket
- AINEXE
- Aiodnsbrute
- aiohttp
- AIOps tools and solutions
- Air gaps (post by Bruce Schneier)
- air-hammer
- Airbnb – When Bypassing JSON Encoding, XSS Filter, WAF, CSP, and Auditor turns into Eight Vulnerabilities
- Airbnb Donates $999 to the 2016 Volatility Plugin Contest!
- Airbnb上的OSINT信息收集
- airbus-cert/regrippy
- airbus-seclab/bincat
- Aircrack-ng
- AirDoS: remotely render any nearby iPhone or iPad unusable
- Airfield Search
- airgeddon
- AirNav RadarBox
- airob0t/idcardgenerator 身份证图片生成工具
- airodump-ng
- Airpods firmware Discord Bot
- Airport Webcams
- AIS3 EOF 2019 Quals - echo
- aizatsky-at-google
- AI安全的威胁风险矩阵
- ajcollins0
- ajdumanhug
- ajgon
- ajm4n
- ajmartel/irtriage
- ajread4
- ajvb
- ajvn
- ak1t4 machine
- AK5123
- akabe1
- Akerbeltz, industrial robot ransomware
- akhal3d96
- akhil-reni
- akhilmhdh
- akijakya
- akindyakov
- akpsgit
- Akropolis attack
- akshaj65
- Akshit-Chilkoti
- aksk_tool:AK利用工具,阿里云/腾讯云 AccessKey AccessKeySecret,利用AK获取资源信息和操作资源,ECS/CVM操作,OSS/COS管理,RDS管理,域名管理,添加RAM账号等
- Aktaion2 Data
- AKtools-Java版的aliyun-accesskey-Tools
- akula.app Node
- Al-khaser
- al0ne
- Alaharon123
- Alamot
- Alan Vivona
- alan707
- AlanFoster
- Alaska Airlines - Capacity Prediction in External Services
- Alberto Garcia Illera
- AlbertoFDR
- albertomn86
- alchzh
- aldou
- alebcay
- aleeamini
- aleemladha
- AleexMzz
- Alejandro Caceres
- AlekKras
- aleks-s
- aleksey0xffd
- alemagio
- Aleph Open Search
- aleph.occrp.org
- alephsecurity/xnu-qemu-arm64
- alephsecurity/xnu-qemu-arm64-tools
- alert(1) to win
- Alerting
- Alerting Framework at Airbnb
- Alerting on SLOs like Pros
- alessandrogario
- alessandroz/lazagneforensic
- Alethio
- Alex Bender @alex-bender
- Alex Ionescu
- alex-kovoy
- alex-shpak
- alex1704
- Alexa Top 1 Million
- Alexa Top 1 Million Security - Hacking the Big Ones
- alexandear
- AlexanderCecile
- alexandernst
- AlexandraC0
- Alexandre-Bartel
- AlexandreVandamme59
- Alexey Vishnyakov
- alexhude/friend
- alexhude/uemu
- alexmaloteaux
- AlexNDRmac
- alfonso-cabrera
- alfredodeza
- Algebraic Coding Theory - Stanford University
- algoexplorer.io
- Algorithmic Game Theory, Winter 2020/21 - Uni Bonn
- Algorithms - Aduni
- Algorithms for Big Data - IIT Madras
- Algorithms for Big-Data (Fall 2020) - Saket Saurabh
- Algorithms for Data Science spring 2021, by Anil Maheshwari
- Algorithms: Design and Analysis 1 - Stanford University
- Algorithms: Design and Analysis 2 - Stanford University
- alias454
- Alibab-Nacos-Unauthorized-Login: Alibab Nacos <= 2.2.0 未授权访问「默认key生成jwt token」
- Alibaba Sentinel 前台 SSRF
- AlienVault Open Threat Exchange
- Alienyze
- aLIEz-java杀内存马工具
- AliMilani
- AlisaLm
- Aliseeks
- All about ISTIO-PROXY 5xx Issues
- All contributors
- All features
- All Jobs Australia
- All of Our ML Ideas Are Bad (and We Should Feel Bad)
- all the contributors
- All Vehicle Data
- All Version
- All you need to know about SSRF and how may we write tools to do auto-detect
- All-Catalog Telegram
- All-Defense-Tool:优秀开源攻防项目集合
- All-in-One
- All-in-one framework for detection, unpacking, and verification for malware analysis
- allanlw
- AllatoriCrack:破解 Java 混淆工具 Allatori
- allcontributors
- Alleba
- Alleba (Philippines)
- AlleCam
- ALLES CTF 2020 - Push
- alleycat
- AlliN:python单文件,无依赖的快速打点的综合工具
- AllinOne SocialMedia Attack
- ALLMediaServer 0.8 SEH&DEP&ASLR
- AllMyTweets
- allonhadaya
- allow_url_fopen
- allow_url_include
- allowed-scripts
- allowing install via adb
- Allsafe
- AllsafeCyberSecurity/awesome-ghidra
- AllStocksLinks
- AllTheInternet
- AllthingsTimesketch
- Alltop
- AllYouCanRead
- alnr
- alonbl
- alonemonkey/frida-ios-dump
- alonemonkey/monkeydev
- alphadelta/clearbytes
- Alphalog:DNSLog、httplog、rmilog、ldaplog、jndi 等都支持
- alphaRed03
- alphasec @alphasecio
- Alpine
- Alpine-secdb
- alright21
- alrs
- Alt Decoder
- AltayAkkus
- altcensored
- AlteredCoder
- alterix
- Alternate EXE Packer
- alternatexp
- AlternativeShellcodeExec:通过回调函数执行 shellcode
- alterx
- alufers
- Alumni.net
- alvarofe
- alxchk
- alxndrv
- AM 207 - Stochastic Methods for Data Analysis, Inference and Optimization, Harvard University
- Am I unique?
- AM:bypass amsi resurrection whit code payload link
- am0nt31r0/osint-search
- amacheema
- amadejpapez
- Amadey bot with payloads and check-in
- amalmurali47
- Aman Sharma
- Aman1513
- Amass
- Amass:深入的攻击面映射和资产发现
- amazing homebrew
- Amazing mind reader reveals his ‘gift’
- amazing pwn series
- Amazon - Confessions of a Systems Engineer: Learning from My 20+ Years of Failure
- Amazon Australia
- Amazon AWS EC2 Forensic Memory Acquisition - LiME
- Amber
- amber:一种新的 PE 壳 - 反射式 PE 壳
- AmberData
- amccarthy-figma
- Amdocs - SREs at Telecom and Media Industry: Bridging between Legacy and Cloud Native Apps
- Amejonah1200
- American Society of Civil Engineers
- AMExtractor
- AMIDuOS
- amimo/dcc
- AmineDiro
- amitshekhariitbhu/android-debug-database
- AML Toolbox
- amlbot.com
- amnestyusa.org/sites/default/custom-scripts/citizenevidence
- Amodem
- amoniaka-knabino
- ampotos/dynstruct
- amrawadk
- Amsi-Killer:Lifetime AMSI bypass-终极AMSI bypass
- AMSI-Unchained:通过修补提供程序未受监控的内存空间来取消对AMSI的锁定
- Amun
- Amxx
- An Abstract Interpretation-Based Deobfuscation Plugin for Ghidra
- An accurate packer identification method using support vector machine
- An AKS Performance Journey: Part 1 — Sizing Everything Up
- An AKS Performance Journey: Part 2 — Networking It Out
- An Android Hacking Primer
- An application of machine learning to analysis of packed mac malware
- An approach to air-gapped deployment
- An efficient algorithm to extract control flow-based features for ioT malware detection
- An efficient block-discriminant identification of packed malware
- An empirical evaluation of an unpacking method implemented with dynamic binary instrumentation
- An example why NAT is NOT security
- An Experimental Security Analysis of an Industrial Robot Controller
- An experimental study on identifying obfuscation techniques in packer
- An implementation of a generic unpacking method on Bochs Emulator
- An improved method for packed malware detection using PE header and section table information
- An Interesting Privilege Escalation vector (getcap/setcap)
- An Interesting Solution for MEV Backrunning Using TEEs and MPC
- An interesting, fun and well written article about AML
- An Introduction to Environment Variables and How to Use Them
- An Introduction to Exploratory Data Analysis with Network Forensics
- An Introduction to Kernels. The Heart of Computing Devices. (original)
- An Introduction to Mac memory forensics
- An introduction to Optimization on smooth manifolds (with book) - EPFL
- An Introduction to Performance Tuning
- An Introduction To Systems Biology
- An Intuitive Node.js Client for the Kubernetes API
- An Investigation into Methods for Taint Analysis
- An original entry point detection method with candidate-sorting for more effective generic unpacking
- An overview of Automotive Defensive Engineering
- An Overview of Variational Analysis 2021 by Tyrrell Rockafellar
- Ana06
- anakin1028
- Analogue Network Security
- Analougepond
- analybits
- Analysing cryptocurrencies and Investigating blockchains by BitQuery
- Analysing meterpreter payload with Ghidra
- Analysing On-chain Data
- Analysing RPC With Ghidra and Neo4j
- Analysis and Defense of Automotive Networks
- Analysis of an In-vehicular network: From CAN bus to infotainment
- Analysis of an old Subaru Impreza - Subaru Select Monitor v1 (SSM1)
- Analysis of Boolean Functions at CMU
- Analysis of machine learning approaches to packing detection
- Analysis of recent downtime & what we’re doing to prevent future incidents
- Analysis of Stack Traces (OTG-ERR-002)
- Analysis of the LTE Control Plane
- Analysis on Internet Explorer's UXSS
- AnalystUnknown Cyber Range
- analytically
- AnalyticsRelationships
- analyze person accounts
- AnalyzeID
- analyzeMFT介绍
- Analyzing and Attacking Apple Kernel Drivers
- Analyzing ARM Cortex-based MCU firmwares using Binary Ninja
- Analyzing Emotet with Ghidra — Part 1
- Analyzing Emotet with Ghidra — Part 2
- Analyzing Mobile Device Malware - Honeynet Forensic Challenge 9 and Some Tools
- Analyzing the Linux boot process
- Analyzing Tweets with NLP in minutes with Spark, Optimus and Twint
- anandg112
- AnarKyx01
- anaseqal
- Anatomy of an event
- Anatomy of the Rolljam Wireless Car Hack
- Anatomy of UAC Attacks
- anboo
- anbox/anbox
- Ancestry
- Ancestry Australia
- anchain.ai
- anchore-actions-token-generator
- Anciliainc
- and a lot more!
- And many more
- AndBug
- andj
- ANDRAX
- Andrea Lamonato
- andreademurtas
- andreafortuna/autotimeliner
- andreafortuna/malhunt
- andrericardo
- andresito00
- Andrew-Chen-Wang
- AndrewFasano
- andrewkolos
- AndrewMohawk
- andrewpollock
- AndrewRathbun
- AndrewSpecial
- andreyglauzer
- AndroBugs
- AndrODet: An adaptive Android obfuscation detector
- AndroFuzz
- Androguard
- Android - Official Tutorial
- Android APK Decompiler
- Android App Development for Beginners Playlist - thenewboston
- Android App Reverse Engineering 101
- Android Application Development Tutorials - thenewboston
- Android Applications Reversing 101
- Android Check – Static Code analysis plugin for Android Project
- Android Cookbook
- Android Dev Summit 2019
- Android Device Rooting Lab
- Android FakeID Vulnerability Walkthrough
- Android Forensic Toolkit
- Android Forensics & Security Testing
- Android formats
- Android Hacker's Handbook
- Android Malware Adventures
- Android Malware and Analysis
- Android Memory Analysis (II) - Extracting the memory and analyzing with Volatility
- Android Mind Reading - Memory Acquisition and Analysis with LiME and Volatility
- Android Mobile Device Forensics with Mobile Phone Examiner Plus
- Android Native Library Analysis with QBDI
- Android Observatory APK Scan
- Android on pongoOS
- Android packers: Separating from the pack
- Android Penetration Testing Courses
- Android Pentesting for Beginners
- Android Pentesting Labs - Step by Step guide for beginners
- Android Quality Starter
- Android Repackaging Lab
- Android Root Detection Bypass Using Objection and Frida Scripts
- Android security architecture
- Android Security Cookbook
- Android Security Guidelines
- Android Security Internals
- Android Security Labs
- Android Security: Attacks and Defenses
- Android Storage Extractor
- Android Studio
- Android Studio’s Emulator
- Android Tamer
- Android WebView Vulnerabilities
- android_virtual_cam:xposed安卓虚拟摄像头-可绕过部分人脸检测
- android-device-check - a set of scripts to check Android device security configuration
- android-hacker/exposed
- android-hacker/virtualxposed
- Android-InsecureBankv2
- Android-Reports-and-Resources
- Android-security
- Android-vts
- Android: Access to app protected components
- Android: arbitrary code execution via third-party package contexts
- Android: Gaining access to arbitrary* Content Providers
- android.googlesource.com
- Android4
- Androidqf
- AndroidSecNotes
- AndroidSecurityStudy-安卓应用安全学习(主要包括Frida&&FART系列)
- AndroidToolbox: 软件管理、文件管理、ADB终端以及多设备切换一站式管理Android
- AndroidViewClient
- Android勒索病毒分析(上)
- Android取证: 使用ADB和DD对文件系统做镜像
- Android取证:使用ADB和DD对文件系统做镜像
- Android平台下二维码漏洞攻击杂谈
- Android智能终端系统的安全加固(上)
- Androl4b
- Andromeda
- AndroPyTool
- AndroRat
- Androspy
- AndroTotal
- Androwarn
- andy5876/volatility-plugin-manager
- andygrunwald
- andylizi
- andypost
- Anemosx
- Anevicon
- anew: 像文本添加不重复的内容(行)类似于 tee -a 命令
- ANG13T
- angea/pocorgtfo
- Angel List
- AngelKitty
- angelomirabella/linux_coredump
- angelystor
- Angler EK from Alexu.edu.eg
- angr
- Angr and me
- angr/angr-doc
- Angry IP Scanner
- angryFuzzer
- AngryGhidra
- angr解题
- angstromCTF 2021 - Spoofy
- AngularJS
- anhkgg/superdllhijack
- anhlqn
- animeshshaw/chromeforensics
- animetauren
- anishathalye
- anishathalye/obfuscated-gradients
- Anitanalysis - open in TorBrowser
- AniYa:免杀框架
- ankitrohatgi
- Ankush12389
- anmx
- Annoraaq
- Annotation
- announcement listserv
- Announcing CatchIT - Source Code Secret Scanner
- Announcing OSS-Fuzz: Continuous fuzzing for open source software
- Announcing Security Monkey — AWS Security Configuration Monitoring and Analysis
- Announcing the 2014 Volatility Plugin Contest Results!
- Announcing the Volatility 3 Public Beta!
- Annual Reports
- ANogin
- Anomaly Detection in Blockchain Networks: A Comprehensive Survey
- Anomaly Detection on Golden Signals
- Anon-Exploiter
- AnonCatalyst
- Anonmously Surf
- Anonymity/OpSec/Privacy
- AnonymousSMBServer:一个红队脚本,可以快速对指定文件夹开启和关闭匿名SMB共享,适合搭配 PrintNightmare 漏洞使用
- AnonymousWP
- anorov/cloudflare-scrape
- Another Dune Manual
- Another link
- Another Network Forensic Tool for the Toolbox - Dshell
- Another XSS in Google Colaboratory
- another-tmp-mailbox:部署在线匿名邮箱服务
- anouarbensaad
- Ansearch
- Ansible
- ansible-os-hardening
- ansicon
- ansjdnakjdnajkd/ios
- ANSSI
- ansuz
- Answers.com
- Anteater
- AnthonyDevlop
- anthonyprintup
- anthraxx
- Anti debugging protection techniques with examples
- Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers
- Anti-forensic and File-less Malware
- Anti-forensics, COFEE vs. DECAF
- Anti-Forensics: How to Clear Evidence Like Hillary Clinton
- Anti-Frida
- anti-honeypot-一款可以检测WEB蜜罐并阻断请求的Chrome插件
- anti-trojan-source
- Anti-unpacker tricks
- Anti-unpacker tricks - Part 14 (and previous parts)
- Anti-Virus-PHP:【随机动态生成】php免杀webshell
- Antimalware Scan Interface Provider for Persistence
- antinalysis.org
- antinet
- Antivirus Event Analysis Cheat Sheet
- Antivirus Forensics Tools
- antiVirusCheck:cobaltstrike 直接判断目标beacon存在的杀软
- Antiweather
- antoinet
- Antonio Davide
- Antonio Prado
- antox/antox
- anttikurittu/kirjuri
- AntyMew
- AnubisDB
- anudeepND
- anvaka/yasiv-youtube
- Any car brand / platform port
- Any car model port
- Any protection against dynamic module import?
- ANY.RUN
- Anycast
- Anymail Finder
- AnyRun
- AnyWho
- AnyWho Phone Lookup
- AOL
- Aol Videos
- Aopo:内网自动化快速打点工具|资产探测|漏洞扫描|服务扫描|弱口令爆破
- AOrps
- aozhimin/ios-monitor-platform
- AP
- Apache (HTTP Server)
- Apache ActiveMQ 5.11.1目录遍历/ Shell上传
- Apache Flink任意Jar包上传导致远程代码执行
- Apache Kylin 3.0.1命令注入漏洞
- Apache Log4j 2 v. 2.15.0 - User's Guide
- Apache Log4j Security Vulnerabilities
- Apache Metron (incubating)
- Apache Skywalking远程代码执行漏洞分析
- Apache Solr Injection Research
- Apache Solr SSRF(CVE-2021-27905)
- Apache Solr Velocity 模板注入漏洞深度分析
- Apache solr Velocity模版远程命令执行漏洞分析
- Apache Spot (incubating)
- Apache Tomcat 8.x vulnerabilities
- Apache Ultimate Bad Bot Blocker
- apache-afl:使用 AFL++ 对 Apache httpd 进行 Fuzz 的自动化配置
- Apache-Solr-8.3.1-RCE: Apache Solr 8.3.1 admin panel RCE (Windows)
- Apache-uaf
- apache/geode
- apache2_BackdoorMod-apache后门模块
- ApacheTomcatScanner: 针对tomcat漏洞扫描脚本
- aPack
- apehex
- Apereo CAS 4.X execution参数反序列化漏洞分析
- Apereo CAS 反序列化漏洞分析及回显利用
- AperiSolve
- Apertium
- ApeWorX/ape: Python
- Apfell
- aphtrinh
- API and IP Location Lookup Database
- API Authentication
- API AUTHORIZATION
- API deobfuscator: Resolving obfuscated API functions in modern packers
- API for OSINT purposes
- API Security in Action
- api.checknft.io
- api0cradle/ultimateapplockerbypasslist
- Apify's Google Maps Scraper
- APIKiller:API漏洞扫描、检测工具
- apiraino
- apis-guru/graphql-voyager
- apitool:Windows Api调用【添加用户,添加用户到组,更改用户密码,删除用户,列出计算机上所有用户,列出计算机上所有组】
- apitrace/apitrace
- APIVoid
- apk-analyzer
- Apk.sh
- Apk2Gold
- ApkAnalyser
- ApkEasyTool
- APKiD
- apkinfo: 安卓apk信息提取,敏感信息搜集
- APKinspector
- ApkLab
- APKMirror
- APKProtect
- APKPure
- ApkTool
- apkunpacker
- aPLib
- Apollo.io
- App Critique
- App Design and Development for iOS
- App Usage
- app.blockpour.com
- app.bubblemaps.io
- app.dexani.io/explore
- app.rawgraphs.io
- AppAudit - A bare-metal analysis tool on Android devices
- AppAudit - Online tool ( including an API) uses dynamic and static analysis
- AppInfoScanner:移动端(Android、iOS、WEB、H5、静态网站)信息收集扫描工具
- AppKnox
- AppKnox Vulnerable Application
- Apple APFS Reference
- Apple Australia
- Apple Censorship
- Apple CTF / Compact Type Format
- Apple FSEvents 取证。文章从较高的角度介绍了 Apple 存储在磁盘上的文件系统事件,包括 FSEvents 的背景信息、日志位置、记录结构、行为、事件解析、值得注意的事件以及事件说明等。
- Apple FSEvents相关的取证问题总结
- Apple IMA ADPCM
- Apple IPC by Ian Beer
- Apple Newsroom Bot
- Apple Open Source
- Apple platform security
- Apple Platform Security - Trust caches
- Apple Sandbox Guide v1.0
- Apple security-announce
- Apple SUpport Discord Bot
- Apple to stop default practice of keeping Siri recordings
- Apple TV and Apple Watch Forensics 01: Acquisition
- Apple TV Forensics 03: Analysis
- Apple TV和Apple Watch的取证分析
- Apple Watch Forensics 02: Analysis
- apple-oss-distributions's Github profile
- Apple's GitHub profile
- Apple's statement
- Apple's XNU Tarballs
- apple/darwin-xnu
- apple/swift-lldb
- Application
- Application and Network Usage in Android
- Application Checker
- Application Level Dos
- Application of string kernel based support vector machine for malware packer identification
- Application Protector
- Application Resilience Engineering and Operations at Netflix with Hystrix
- Application Security
- Application whitelisting: Software Restriction Policies vs. AppLocker vs. Windows Defender Application Control
- Applied Crypto Hardening
- Applied Cryptography: Protocols, Algorithms and Source Code in C
- Applied Deep Learning 2022 - TU Wien
- Applied Deep Learning Maziar Raissi
- Applied Incident Response
- Applied Machine Learning (Cornell Tech CS 5787, Fall 2020)
- Applied Time Series Analysis
- appliedsec/forensicscanner
- Applocker and PowerShell: how do they tightly work together?
- AppLocker Bypass — presentationhost.exe
- ApplyCalleeType
- Applying Netflix DevOps Patterns to Windows
- Applying the TCSEC Guidelines to a Real-time Embedded System Environment
- Approachable threat modeling
- approvals.xyz
- apps.obtainium.imranr.dev
- apps.sentinel-hub.com/sentinel-playground
- AppSec/Programming Stuff
- Appsecco - The art of subdomain enumeration
- AppSpear
- AppSpear: Bytecode decrypting and DEX reassembling for packed Android malware
- AppVerifier
- APriestman
- April Threat Reports
- APRR
- APS Gazette
- APT
- APT Labs
- APT Sidewinder: Tricks powershell, Anti Forensics and execution side loading
- APT 分析及 TTPs 提取
- APT-Hunter
- apt17scan.py
- apt2
- Aptoide
- APTOS MOVE 智能合约审计入门
- APTRS
- Aqua Vulnerability Database
- aquasecurity/vuln-list
- AQUATONE
- Aquilao
- aquynh
- aqzt/kjyw
- AR Investigations Concept
- Ar3h
- Arachni
- arainho
- arale61
- Aralhi
- arandomdev/DyldExtractor
- arangoDB (unsupported, incomplete,
- aranhams
- Aravindha
- Arbitrary File Upload
- Arbor.js
- Arcadia Finance attack
- ArcGIS
- ArcGIS WayBack
- Arch Linux Penetration Tester
- Arch-Audit
- Archidoit
- ArchiMoebius
- Architecting cybersecurity (from Saydjari's book)
- Architecting for Resiliency
- Architecture 1001: x86-64 Assembly
- Architecture and Concepts
- Architecture and Practices of Bilibili's Real-time Platform
- Architecture of x64dbg
- Archival
- Archive Nodes - Everything You Need to Know
- Archive TV News
- Archive-Bot
- Archive-It
- Archive.fo
- Archive.is
- Archive.org
- archive.org/web/web.php
- Archive.ph
- Archlinux
- ARChon
- ArchStrike
- Arctic Shift
- Ardan Labs
- Arduino
- arduino-canbus-monitor
- Are SSL certificates bound to the servers ip address?
- Are We Getting Better Yet? Progress Toward Safer Operations
- Are Your Dropwizard Latency Metrics Misleading You?
- aref2008
- Areizen
- arekbulski
- aress31
- argp vs com.apple.security.sandbox
- argtracker
- Argumentinjectionhammer
- Argus
- Argus-SAF
- Aries-ckt
- aringo
- aristorechina
- aristosgi
- Arivify
- ArjanOnwezen
- arjun-1
- ArkeiStealer sample with data exfil
- Arkham
- Arkham - Twitter Search Beta
- arkhamintelligence
- Arknights
- arkrwn
- ARM Architecture Reference Manual ARMv8-A
- ARM Based Development - IIT Madras
- ARM Clang PAC ABI
- Arm DDS Security library: Adding secure security to ROS2
- ARM EXP 开发 - 绕过 DEP 执行 mprotect()
- ARM Exploitation - Defeating DEP - execute system()
- ARM Exploitation - Defeating DEP - executing mprotect()
- ARM Software Standards
- Armadillo
- armmbed/mbedtls
- Armor:浏览器反蜜罐插件
- ARMv8-A Tools
- ARM汇编之堆栈溢出实战分析(GDB)
- ARM汇编之堆栈溢出实战分析三(GDB)
- ARM汇编之堆栈溢出实战分析二(GDB)
- ARM汇编之堆栈溢出实战分析四(GDB)
- arnasab
- arnerak
- ArnoStiefvater
- arons
- Around 1000 exploitable cybersecurity vulnerabilities that MITRE & NIST ‘might’ have missed but China or Russia didn’t.
- Around 1000 exploitable cybersecurity vulnerabilities that MITRE & NIST ‘might’ have missed but China or Russia didn’t.
- ARP spoofing - Man-in-the-middle
- arp-scan
- ARP+DNS spoof - fake page redirect to credential harvester
- arpspoof
- Arquivo
- Arquivo.pt: pesquise páginas do passado!
- arr00
- Arrests
- Arronax
- Arsenal
- Arsenal-Cobalt Strike直接生成payload插件免杀360和火绒
- arsenal:常用黑客程序的命令补全快速启动工具
- Art Loss (Stolen Art)
- Art of Memory Forensics
- Artbreeder
- Artemis
- artemis.xyz
- Artful Persuasion – How to command attention, Change minds and influence People – Harry Mills
- arthur4ires
- arthurscchan
- artifactcollector
- ArtifactExtractor
- Artificial Intelligence - Hochschule Ravensburg-Weingarten
- Artificial Intelligence - IIT Kharagpur
- Artificial Intelligence - IIT Madras
- Artificial Intelligence: How Much Will It Cost You?
- Artificial Intelligence: Knowledge Representation and Reasoning - IIT Madras
- Artificial Intelligence(Prof.P.Dasgupta) - IIT Kharagpur
- ArtificialImmunity
- Artikash
- ArtsHub Australia
- arttnba3
- ArturFormella
- arxiv.org
- arxsys/dff
- Ary 是一个集成类工具,主要用于调用各种安全工具,从而形成便捷的一键式渗透
- Arya
- as77c
- Asahi Linux for M1
- Asahi: Introduction to Apple Silicon
- asamy/ksm
- AScan:基于python开发的主动漏洞扫描工具
- ASDC12-Smart_Bombs_Mobile_Vulnerability_and_Exploitation
- asecuritysite
- asgh
- ashang
- ashemery/linuxforensics
- ashishb/android-malware
- ashishb/android-security-awesome
- ashishb/osx-and-ios-security-awesome
- Ashley Madison
- ashutosh1206
- asiamina/a-course-on-digital-forensics
- Asian Ave
- ASIC Search
- asis_2019_unicorn_shop
- Ask
- Ask questions or report issues
- AskDNS
- askew
- aslody/andhook
- aslody/legend
- aslody/whale
- ASlookup
- ASM Guard
- asmjit/asmjit
- AsmShellcodeLoader:汇编语言编写Shellcode加载器源代码
- asn_lookup
- asn&ephemeral=true&show=terminal
- ASNlookup
- asolino
- ASP.NET resource files (.RESX) and deserialisation issues
- ASP.NET-Memshell-Scanner:asp.net内存马检测工具
- ASPack
- AsparagusEduardo
- aspiers
- ASProtect 32
- ASProtect 64
- ASREPRoast
- ASRG
- assafcarlsbad
- Assembler
- Assessing static and dynamic features for packing detection
- Assessing the impact of packing on machine learning-based malware detection and classification systems
- Assigning pager duty to developers
- Assiste (Packer)
- Assuring cybersecurity: getting it right (from Saydjari's book)
- ast_tools:ast基础框架-基于babel
- ast-hook-for-js-RE:浏览器内存漫游解决方案(JS逆向)
- AsteriskPassword: 基于C++&MFC开发的星号密码查看器
- astr0baby
- Astra
- Astral-PE
- AstraNmap
- Astroinformatics 2019 Conference - Caltech
- Astronomical data analysis using Python 2021 - NRC IUCAA
- Astronomy - Sun - Moon - Eclipses
- asukaminato0721
- Asymptotics and perturbation methods - Prof. Steven Strogatz
- asyncio
- AsyncRAT-C-Sharp
- Asyncrone | Multifunction SYN Flood DDoS Weapon
- AT&T Microcell FAIL - fail0verflow (Older blog article, but still a good read)
- AT4RE Protector
- ata4/bspsrc
- atcuno
- aternyx
- atezet
- athanasiosem
- Athena: Our automated build health management system
- Athorcis
- athre0z
- Atlas
- Atlas: Our journey from a Python monolith to a managed platform
- Atlas:帮助你快速筛选测试能够绕过 waf 的 sqlmap tamper
- AtlasC2:C#写的C2远控工具
- Atlasify
- atlasos-admin
- Atlassian(Jira、Confluence、Bitbucket)产品和 Jenkins、Solr、Nexus 的 PoC 集合
- Atlassian产品漏洞整理
- Atom
- atom feed
- Atomic
- Atomic Threat Coverage
- atomiku
- AtomLdr:一个具有高级规避功能的DLL加载器
- AtomPePacker:多功能PE加壳工具,可用来bypass AV
- ATPMiniDump:通过PssCaptureSnapShot来 dump lsass 进程
- ATSCAN
- att/docker-forensics
- ATT&CK
- ATT&CK Stuff
- Attack and Defend: LinuxPrivilege Escalation Techniques of 2016
- Attack and Defense Around PowerShell Event Logging
- Attack Planning in the Real World
- Attack Secure Boot of SEP - blackbird
- Attack Surface Management
- Attack trees (from Bruce Schneier)
- Attack_Code:云安全入门材料
- Attack_range
- Attackers incriminate a signed Oracle process for DLL hijacking, running Mimikatz
- Attacking .NET deserialization
- Attacking & Securing Active Directory
- Attacking Active Directory: 0 to 0.9
- Attacking Active Directory: 0 to 0.9
- Attacking iPhone XS Max
- Attacking JavaScript Engines - A case study of JavaScriptCore and CVE-2016-4622
- Attacking Logitech Wireless Presenters (German Article)
- Attacking Private Networks from the Internet with DNS Rebinding
- Attacking SSL VPN - Part 1: PreAuth RCE on Palo Alto GlobalProtect, with Uber as Case Study!
- Attacking SSL VPN - Part 2: Breaking the Fortigate SSL VPN
- Attacking Wireless Keyboards
- attacking-java-rmi-services-after-jep-290
- Attackintel
- AttackIQ
- attackRmi:使用socket直接发送数据包来攻击rmi
- AttackRuleMap - Mapping of Atomic Red Team tests and Sigma Rules
- Attacks from a New Front Door in 4G & 5G mobile networks
- Attacks via a Representative Sample : Myths and Reality
- AttackSurfaceAnalyzer
- Attacktive Directory
- atucom
- Atul9
- atz-spe
- Audacity
- audibleblink
- Audiense
- Audio/Video Recordings and Podcasts of Professor Raj Jain's Lectures - Washington University in St. Louis
- Audit and Evaluation of Computer Secuirity: System Vulnerabilities and Controls II
- Audit Checklist
- Audit Hero
- Audit logs
- Audit Policy Recommendations
- Audit Twitter Followers
- auditjs
- Audits
- August Threat Reports
- AugustoL
- augustoproiete-bot
- Aunali321
- AUR package
- aurel32
- ausmaster
- Aussie Finder
- Austin Taylor (@HuntOperator)
- austinsonger
- Australian Border Force
- Australian Broadcasting Corporation Archives
- Australian Capital Territory Job Search
- Australian Capital Territory Transport
- Australian Criminal Intelligence Commison
- Australian Cyber Security Centre
- Australian Defence Force Recruiting
- Australian Defence Intelligence Organisation
- Australian Federal Police
- Australian Geospatial-Intelligence Organisation
- Australian Government Job Search
- Australian Military Service Records
- Australian Person Lookup
- Australian Public Records
- Australian Public Service Job Search
- Australian Secret Intelligence Service
- Australian Security Intelligence Organisation
- Australian Signals Directorate
- Australian Transaction Reports and Analysis Centre
- Australian War Memorial
- autergame
- auth0/simplekeychain
- autheliabot
- Authentication
- Authentication (from Saydjari's book)
- authentik-automation
- authentik-bot
- Author
- Authorization (from Saydjari's book)
- Authorstream
- auto bid master (auction)
- Auto scaling Pinterest
- Auto_proxy:利用IP地址池进行自动切换Http代理,防止IP封禁
- AutoBlue-MS17-010
- autodeauth:用于自动解除本地网络身份验证的工具
- AutoDroid
- autofix-ci
- AutoGPT
- AutoIT
- AutoLocalPrivilegeEscalation
- AutoMacTC: Automating Mac Forensic Triage
- AutoMacTC:一款针对macOS环境的自动化取证分类采集器
- Automate Application Monitoring with Slack
- Automate AWS Infrastructure with Boto 3: AWS Health Check
- Automate the scanners you need
- Automate threat response with playbooks in Microsoft Azure with Sentinel
- Automated Android Malware Analysis: CuckooDroid
- Automated Failure Testing
- Automated Generation and Analysis of Attack Graphs
- Automated Incident Management Through Slack
- Automated Incident Response Infrastructure in GCP
- Automated Memory Analyzer For Malware Samples: VolatilityBot
- Automated Red Team Infrastructure Guide
- Automated Software Testing - ETH Zürich | Spring 2024
- Automated static analysis of virtual-machine packers
- AUTOMATED TESTING FOR LEAGUE OF LEGENDS
- Automated testing: 5 lessons from Atlassian’s Kubernetes team on testing infrastructure as code
- Automated unit test generation for classes with environment dependencies
- Automated Volatility Plugin Generation with Dalvik Inspector
- Automated Website Takedown | Online Fraud & Phishing Prevention
- Automatic analysis of malware behavior using machine learning
- Automatic Emergency Braking
- Automatic generation of adversarial examples for interpreting malware classifiers
- Automatic retraining for machine learning models: tips and lessons learned
- Automatic static unpacking of malware binaries
- Automatické vytvoření dokumentace k databázi s využitím nástroje SchemaSpy
- Automating Configuration Management at Scale
- Automating Data Protection at Scale, Part 1
- Automating Data Protection at Scale, Part 2
- Automating Data Protection at Scale, Part 3
- Automating Indeed’s Release Process
- Automating local DTD discovery for XXE exploitation
- Automating malware analysis, cuckoo api + postfix
- Automating OS/Platform Upgrades for Service Owners
- Automating OSINT blog
- Automating Performance Standards
- Automating the Management of the Operational Health of Cloud Accounts at Scale
- Automating Your Oncall: Open Sourcing Fossor and Ascii Etch
- Automobile Driver Fingerprinting, 2016
- Automotive Security Research Group
- Autonomic features
- Autonoscope
- AutoPixieWps
- Autopsy
- AutoRemove-自动卸载360
- Autorob Winter 2022 - University of Michigan
- Autoscaling in Kubernetes: Why doesn’t the Horizontal Pod Autoscaler work for me?
- Autoscaling Monzo: How we optimise our platform to be just the right size
- Autoscanner-一款自动化扫描器,其功能主要是遍历所有子域名、及遍历主机所有端口寻找出所有http服务,并使用集成的工具(oneforall、masscan、nmap、crawlergo、dirsearch、xray、awvs、whatweb等)进行扫描,最后集成扫描报告
- AutoShun
- AutoSploit
- autotest/autotest
- AutoTimeliner: automatically extract forensic timeline from memory dumps
- Autowasp
- Autowini (Vin Search International)
- autrilla
- AUXILE
- Auxscan
- AV_Evasion_Tool:掩日 - 免杀执行器生成工具
- Availability and Security: Choose One
- Availability—Thinking beyond 9s
- Available commands
- avast/retdec-idaplugin
- AVC Undroid
- AVClass
- Ave-Maria/Warzon RAT
- AverCryptor
- avet
- aviadtamir
- avicoder
- AVML
- AVPack
- Avscript
- Awakari
- Awasu
- AWEL
- AWEL Flow Usage
- awesome
- Awesome Analytics
- Awesome ARM Exploitation
- Awesome Blockchain Bug Bounty
- Awesome Blockchain Visualisation
- Awesome Blogs
- Awesome Bluetooth Security
- Awesome bug bounty resources by EdOverflow
- Awesome CAN Bus - an awesome list just for CAN Bus-related tools (hardware, software, etc.)
- Awesome Censys Queries
- Awesome Chaos Engineering
- Awesome Container Security
- Awesome Crypto Papers
- Awesome CTF Cheatsheet
- Awesome Electron.js Hacking
- Awesome Ethereum staking
- Awesome Event IDs
- Awesome EVM Security
- Awesome executable packing
- Awesome Industrial Control System Security
- Awesome LIN Bus - an awesome list just for LIN-Bus related tools (hardware, software, etc.)
- Awesome Linux Containers
- Awesome MLOps
- Awesome Monitoring
- Awesome Object Capabilities and Capability-based Security
- Awesome Observability
- Awesome OSINT
- Awesome PCAP Tools
- Awesome Penetration Testing
- Awesome Privacy
- Awesome Security Hardening
- Awesome Security Newsletters
- Awesome Self-Hosted
- Awesome Shodan Search Queries
- Awesome Site Reliability Engineering Tools
- Awesome SOAR
- Awesome Solidity Gas Optimizations
- Awesome SRE
- Awesome Sysadmin
- Awesome Threat Detection and Hunting
- Awesome Threat Modeling
- Awesome Translations list
- Awesome Web Hacking
- Awesome WebSocket Security
- awesome-anti-forensic
- awesome-awesome
- awesome-awesomeness
- awesome-browser-exploit-浏览器漏洞集合
- awesome-bug-bounty
- awesome-burp-extensions
- awesome-cloud-security:收集一些国内外不错的云安全资源,主要是国内
- Awesome-CobaltStrike-cobaltstrike的相关资源汇总
- awesome-computer-history
- Awesome-DevSecOps
- awesome-engineering
- awesome-forensics
- Awesome-Fuzzing
- Awesome-Hacking
- Awesome-Hacking Lists
- Awesome-Hacking-Resources (Privilege escalation section)
- awesome-iot-hacks
- awesome-java-security:Java安全☞代码审计/漏洞分析/武器化
- awesome-lockpicking
- awesome-mac
- awesome-macOS
- Awesome-POC:一个各类漏洞POC知识库
- awesome-privacy
- Awesome-RCE-techniques:在各种应用程序上实现远程代码执行的步骤和技术
- Awesome-RedTeam-Cheatsheet:Active Directory & Red-Team Cheat-Sheet
- awesome-security-weixin-official-accounts
- Awesome-serverless
- awesome-threat-intelligence
- awesome-windows-security
- AwesomeXSS
- awesomeYG
- AWS Cloud: Proactive Security and Forensic Readiness – part 4
- AWS Cloud: Proactive Security and Forensic Readiness – part 5
- AWS Incident Response Runbook Samples
- AWS Observability Recipes
- AWS PENETRATION TESTING PART 1. S3 BUCKETS
- AWS PENETRATION TESTING PART 2. S3, IAM, EC2
- AWS Public Datasets
- AWS Public ECR
- AWS re:Invent 2016: From Resilience to Ubiquity - #NetflixEverywhere Global Architecture (ARC204)
- AWS re:Invent 2017 - Nora Jones Describes Why We Need More Chaos - Chaos Engineering, That Is
- AWS re:Invent 2017: A Day in the Life of a Netflix Engineer III (ARC209)
- AWS re:Invent 2017: Performing Chaos at Netflix Scale (DEV334)
- AWS re:Invent 2018: Epic Games Uses AWS to Deliver Fortnite to 200 Million Players
- AWS re:Invent 2019: A day in the life of a Netflix engineer (NFX202)
- AWS Security
- AWS takeover through SSRF in JavaScript
- aws_pwn
- AWS-IAM-Privilege-Escalation
- Aws-nuke
- aws-vault
- Awseye
- awsKeyTools:aws云平台 accessKey 泄漏利用工具
- AWVS-13-SCAN-PLUS_一个基于Acunetix Web Vulnerability Scanner 13 (AWVS13)扫描引擎的辅助软件
- awvs13_batch_py3:针对 AWVS扫描器开发的批量扫描脚本,支持联动xray、burp、w13scan等被动批量
- ax
- ax0nes
- AxDSan
- AXE
- axi0mX/ipwndfu
- axiom:集合诸如nmap、ffuf、masscan、nuclei、meg等众多开源安全测试工具的集合框架
- Axis2 Web service and Tomcat Manager
- axonasif
- axpatito
- AxProtector
- axrwl
- axtmueller/windows-kernel-explorer
- ay-kay
- AyaseFile
- AymenAbb
- ayoubfaouzi
- Ayrx
- AzeemIdrisi
- azenla
- aziem
- AzizKpln
- azmaveth
- Azorult drops AsyncRat, REMCOS possible others
- Azorult drops Blackout Ransomware
- AZSecure-data
- Azucar
- azuisleet
- Azult
- Azure CLI credentials
- Azure DevOps audit log
- Azure Monitor Activity log
- Azure OpenAI
- Azure Security
- Azure Tenant Resolution by PingCastle
- b068931cc450442b63f5b3d276ea4297
- b0q1
- B0rrA
- B1anda0
- b1gb1t
- b1rdex
- b1rdfree
- b1tg
- b2dfir/b2response
- B2R2
- b3eb576e02849218867caefaa0412ccd
- B3nac
- b3nac/android-reports-and-resources
- b3nguang
- b3nj5m1n
- b4dmojr
- b4dnewz
- babbaj
- Babelfish
- Bablic
- BABY AGI
- Babylon
- bacher09/pwgen-for-bios
- Back in Time Memory Forensics
- Back To The Future: Unix Wildcards Gone Wild
- BackBox
- Backdoor
- Backdoorin pe files
- Backdoorme
- backend/whatsapp-web-backend.py
- Backstab:通过加载恶意的驱动文件干掉杀软
- Backtrace Bypass
- Backtrack Forensics: Memory analysis with volatility
- Backup file with .bak before filename extension
- backupGen:根据域名生成备份文件字典(不扫描)
- Bacon Protocol attack
- baconmania
- Bad Peggy
- BadDNS 是一款使用 Rust 开发的使用公共 DNS 服务器进行多层子域名探测的极速工具
- baderj/domain_generation_algorithms
- badflare:查找 cloudflare 网站背后的真实 IP
- BadJS
- BadLibrary
- BadMod
- badmojr
- Badoo
- badrelmazaz
- badsecrets
- badspin: Android Kernel内存错误引用漏洞
- BadStore
- badtouch
- BadUSB Script To Exfiltrate Passwords
- BAF
- BafS
- bagusindrayana
- Baidu
- Baidu (China)
- Baidu Image
- Baidu Images
- Baiduyun Link
- bakaemon
- baldurk/renderdoc
- balestek
- ballensans
- ballessay
- balotdealer
- Balsn CTF 2020 - L5D
- Balsn CTF 2021 - 2linephp
- Balsn CTF 2021 - 4pple Music
- Balsn CTF 2022 - 2linenodejs
- Balsn CTF 2023 - ginowa
- BalsnCTF 2019 - 卍乂Oo韓國魚oO乂卍
- baltpeter
- Bamboofox
- ban-sensitive-files
- BangCle
- Bank for International Settlements Statistics
- BankaiNoJutsu
- Banking on Continuous Delivery - Capital One
- Banli:一款简单好用的高危资产和高危漏洞扫描工具
- bannsec
- Bantam
- BarakAharoni
- Barcode Generator
- Barcode Reader
- barcrange
- BarehSolok
- BareUnpack: Generic unpacking on the bare-metal operating system
- Barf
- Barkov.net
- Barley Finance attack
- BaRMIe: Java RMI enumeration and attack tool.
- bartblaze
- baruchiro
- baryy100
- Base
- BASE (Bielefeld Academic Search Engine): Basic Search
- base-goerli.blockscout.com
- base32_custom_decode
- base32_custom_encode
- BASE64 Decode and Encode
- base64_custom_decode
- base64_custom_encode
- base64_decode
- base64_encode
- Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stack
- Basecamp 2 and Basecamp 3 search outage report
- BaseModule
- BaseQuery
- BaseSAFE: Baseband SAnitized Fuzzing through Emulation
- Bash
- bash-c
- bashFuck: 针对Linux终端 bashshell 的无字母命令执行payload生成脚本
- Bashfuscator
- Basic Concepts
- Basic Concepts and Taxonomy of Dependable and Secure Computing
- Basic iOS Apps Security Testing lab
- Basic Linux Privilege Escalation
- Basic Malware Analysis with Cuckoo Sandbox
- Basic OpenID Provider
- Basic penetration
- Basic Pentesting : 2
- Basic SELinux Troubleshooting in CLI
- Basic tutorial made by Null Byte
- Basics of Memory Forensics
- basil00/divert
- Basmahmad
- BASS
- basvdijk
- Batch decompilation with IDA / Hex-Rays Decompiler
- Batch Transaction
- Batchgeo
- Battle of the Internet Giants
- baumhoto
- Bayesian Data Analysis
- Bayesian Machine Learning and Information Processing
- bayonet是一款src资产管理系统,从子域名、端口服务、漏洞、爬虫等一体化的资产管理系统
- bazaar.abuse.ch
- Bazaman
- BB9z
- BBB Scam Tracker
- BBC News
- BBOT Internal Architecture
- BBOTCore
- bbqsql
- bburky
- bcarrier
- BCELCodeman:BCEL编码/解码
- bcoles
- BcryptCrack_Jenkins:针对于Jenkins控制台用户的暴力破解工具
- bdbubble
- bdrogja
- Be careful what you copy: Invisibly inserting usernames into text with Zero-Width Characters
- BE5B35APO - Computer Architectures, Spring 2022, CTU - FEE
- Beaconator:CS becaon 生成
- BeaconEye:搜寻 CobaltStrike 信标并记录操作员命令输出
- Beaker
- beanshooter:JMX 枚举和攻击工具
- Bearer
- Bearer.com
- Beast 2
- beauthi
- beautifulsoup4
- becojo
- Become a sponsor via Cryptomator's sponsors website.
- Becoming a Rockstar SRE
- Becoming SRE, First Steps Toward Reliability for You and Your Organization
- Bed Page
- bedazzlinghex/disk-analysis
- bedazzlinghex/memory-analysis
- bee-san
- Beebyte Deobfuscator plugin
- BeEF
- BeEF Tips
- BeeLogger
- BeenVerified
- beerisgood
- beeware/bugjar
- Befunky
- Begin RE: A Reverse Engineering Tutorial Workshop
- Beginner’s guide to web analytics
- Beginners Guide to DevOps: How to Make It into the Industry
- Beginning Scientific Computing - Steve Brunton
- Behind the Name
- Behind the Scenes of iOS Security
- BehroozAbbassi
- Being Just Reliable Enough
- Belati
- BelkaImager
- Bellingcat
- bellingcat - A Beginner's Guide To Flight Tracking - bellingcat
- Bellingcat Online Researcher Survey: Tool Wishes
- Bellingcat OSM search
- Bellingcat's Online Investigation Toolkit
- Ben de Haan @bendehaan
- Ben Greenberg
- Ben-grmbl
- bendehaan
- Bendobrown
- BenediktMKuehne
- Benefits of benchmarking with Go
- Benefits of Taking the Less Traveled Road with Containers Infrastructure
- BenGardiner
- bengl
- benjaminvanrenterghem
- benjeems/packetstrider
- benoccrp
- benolot
- benrubson
- Beosin Twitter
- bergabman
- berggren
- Berkantdemirci
- Berkely Library: Data Lab
- bernardoamc
- bernardosulzbach
- Bero
- BeRoot
- Bert-JanP
- BeryJu
- BerylEnigma:一个为渗透测试与CTF而制作的工具集,主要实现一些加解密的功能
- besendorf
- Best Linux Penetration Testing Distributions @ CyberPunk
- Best Log Management Tools: 51 Useful Tools for Log Management, Monitoring, Analytics, and More
- Best of Computer Forensics Tutorials
- Best of the Web Blog Directory
- Best PHP Obfuscator
- Best Practice
- Best practices for change management in the age of DevOps
- Best Practices for UNIX chroot() Operations
- Best Practices on Email Protection: SPF, DKIM and DMARC
- Best Tools For Directory Bruteforcing
- bestagini
- bestplayerbotphone
- bet4it/hyperpwn
- Betaface
- bethlogic
- Better Business Bureau
- Bettercap
- Bettercap Tips
- betterdefaultpasslist
- BeVigil
- BeVigil-CLI
- bevry/getmac
- Beyarz
- Beyond
- Beyond Windows Forensics With Built-in Microsoft Tooling - Thomas Fischer
- BeyondCorp I: A new approach to enterprise security
- BeyondCorp II: Design to deployment at Google
- BeyondCorp III: The access proxy
- BeyondCorp: The user experience
- Bfinject
- BFT (Browser Forensic Tool )
- BFU Extraction: Forensic Analysis of Locked and Disabled iPhones
- BGP Update Reports
- BGPTools
- BGPView
- bgwastu
- Bhargav Tandel
- bhavsec
- bhuthesh
- bi0s Wiki
- Bibsonomy
- BiFang:自动化生成loader,实现加密、混淆、bypass沙箱、多种现有进程注入技术,动态编译生成
- Bifrozt
- Big Bugs Podcast Episode 1: Auto Bugs - Critical Vulns found in Cars with Jason Haddix
- Big Data Systems (WT 2019/20) - Prof. Dr. Tilmann Rabl - HPI
- BiG-SLiCE: A highly scalable tool maps the diversity of 1.2 million biosynthetic gene clusters
- BigBountyRecon
- BigDataCloud
- biggiesmallsag/nighthawkresponse
- BigNerd95
- bigsinger/androididchanger
- Bigtable: A Journey from Binary to Service and the Lessons Learned along the Way
- bileltechno
- billdenney
- billfodl.com
- Billu : B0x
- Billy Madison
- BIMI Group
- Bin Laden Maintained Computer Security with an Air Gap
- BIN-crypter
- BIN-Lock
- Binary Analysis with Jupyter and Radare2
- Binary Ninja
- Binary Ninja Disassembler
- Binary Ninja Hexagon
- Binary Ninja: IPython and the Python Console
- Binary-code obfuscations in prevalent packer tools
- Binary-Learning:二进制安全相关的学习笔记
- binary-security-check
- Binaryanalysis-ng
- binaryanalysisplatform/bap
- BinaryEdge
- binaryen
- binarymist
- binarypig
- Bind FUD Payload with JPG and Hack over WAN with TheFatRat
- BinDiff / BinNavi User Forum
- Binee
- Bing
- Bing Chat
- Bing Images
- Bing Maps
- Bing News
- Bing Translator
- Bing Videos
- Bing Visual Search
- Bing Webmaster Tools
- Bing 地图
- bing-ip2hosts
- bing.com
- bing.com/maps
- binglot
- BinGoo
- Binja插件
- BinNavi v2 and PHP !
- Binpad
- BinStat tool for recognition of packed executables
- BinText
- Bintropy
- BinUnpack
- Binutils
- BinWalk
- Bio 84 - Your Genes and Your Health, Stanford University
- BIO410/510 Bioinformatics - California State University, Monterey Bay
- BIO412: Comparative Genomics - California State University, Monterey Bay
- Bioischanged
- BioMedical Informatics 231 Computational Molecular Biology, Stanford University
- BioMedical Informatics 258 Genomics, Bioinformatics & Medicine, Stanford University
- Biometrics - IIT Kanpur
- BIOS Master Password Generator for Laptops
- BIOS/UEFI/Firmware Attacks/Defense
- BioTheWolff
- Birds of a feature: Intrafamily clustering for version identification of packed malware
- Bistroo attack
- Biswa96
- bitaml.com
- BitBlaze
- BitBlaze: A new approach to computer security via binary analysis
- Bitbucket
- Bitchute
- Bitcoin analysis from bitquery
- Bitcoin and Cryptocurrency Forensic Investigation
- Bitcoin and Ethereum address extraction
- Bitcoin Investigations
- Bitcoin Prefixes Address List
- bitcoin visualizations
- bitcoinabuse.com
- Bitcoinwhoswho
- bitcoinwhoswho.com
- BitCrack
- bitfury.com
- bitinfocharts
- bitinfocharts.com
- bitlisten.com
- BitLocker
- BitLok
- BitMEXResearch
- Bitquery Explorer
- Bitref
- bitsadmin
- BitsByWill
- bitscout 介绍
- bitscrunch.com
- bitsofinfo/comms-analyzer-toolbox
- bitter smile
- bittor7x0
- bivashpandey
- biweekly community meetings
- Biz Yellow Pages, USA Business & People Directory
- Bizeurope
- Bizint
- Biznar
- BJNFNE
- bjoernricks
- Björn Kimminich
- Björn Kimminich @bkimminich
- BjornRuytenberg
- Bkhive and Samdump2
- blaCCkHatHacEEkr/OSINT_TIPS
- black
- Black Binary
- Black Block Recorder: Immutable Black Box Logging via rosbag2 and DLTs
- Black Book of Viruses and Hacking
- Black Book Online
- Black Hat
- Black Hat GraphQL - No Starch Press
- Black Hat USA 2016 Intra-Process Memory Protection for App on ARM & X86 Leveraging the ELF ABI
- Black Hat USA 2016 Memory Forensics Using Virtual Machine Introspection for Cloud Computing
- Black Hat, Asia
- Black Hat, EU
- Black Hat, Europe
- Black Hat, MEA
- Black Hat, USA
- Black Hat, USA (Demigod)
- Black Hills Information Security
- Black-Hole专辑
- Black-Hydra
- black-white-zero
- BlackArch
- BlackArch Linux
- BlackB0lt
- blackbagtech/sleuthkit-apfs
- Blackbird
- blackbox
- BlackBox Protobuf Burp Extension
- Blackhat
- BlackHat Python - Appendix
- BlackHat USA Arsenal 2019 Slides
- BlackHat USA Arsenal 2021 Slides
- blackhat-arsenal-tools
- BlackHat2017热点之DefPloreX---大规模网络犯罪取证的机器学习工具
- blackHatMonkey
- BlackHole
- BlackHosts - Command Line Installer/Updater
- blacklanternsecurity
- Blacklight:1
- BlackMartapk
- blackMasterLord
- BlackNET 3.7.0.0 source code found in an opendir
- blackorbird
- BlackPhish
- BlackRose:1
- blacksphere/blackmagic
- blacktop/docker-cuckoo
- blacktop/docker-volatility
- blacktop/ipsw
- BlackWidow
- BlackYuzia
- blahpy
- blaklisctf - chall3
- Blameless Incident Reviews at Udemy
- Blameless PostMortems and a Just Culture
- blankeer/mdwechat
- blankie
- blastentwice
- blaster23
- BlastWithCaptcha:验证码识别 爆破 本地ocr 多线程爆破
- Blaze SlideShow
- BLAZESCAN – digital forensic open source tool | By Brian Laskowski
- BlazeVideo HDTV Player 6.6 Professional SEH&DEP&ASLR
- Blazy
- Blazy(Also Find ClickJacking)
- bleachbit
- Blind SQL Injection Discovery & Exploitation
- Blind-Sql-Bitshifting
- BlindElephant
- Blinkx
- Blinky-Keys
- Blisqy - Exploit Time-based blind-SQL injection
- Bliss
- Block ads and malware via local BIND9 DNS server
- Block ads, malware, and deploy parental controls via local DualServer DNS/DHCP server
- Block ads, trackers or malware domains
- Block Chair
- Block Explorer
- Block Together
- Block Trail
- Blockchain - Foundations and Use Cases
- Blockchain analysis techniques
- Blockchain Analysis Tools List
- Blockchain analysis tools review
- Blockchain Analytics and its Use Cases
- Blockchain Data Analysis from the Perspective of Complex Networks
- Blockchain for Developers Decal - Spring 2018 - Berkeley DeCal
- Blockchain Fundamentals Decal 2018 - Berkeley DeCal
- Blockchain Hacking QuickStart Guide
- Blockchain Info
- Blockchain Investigations 101: An Intro to Ethereum
- Blockchain OSINT In-Depth
- blockchain-etl
- Blockchain, Solidity, and Full Stack Web3 Development with JavaScript
- Blockchain.com
- blockchain3d
- Blockchair
- blockchair.com
- BlockCypher
- blockdaemon.com
- blockfence
- blockhead.info
- Blocking ads and malwares with unbound
- blocknative.com
- Blockonomics
- Blockpath
- blockpath.com
- blockpour.com
- blocks.wizb.it
- blockscan.com
- BlockScout Walkthrough
- blockscout.com
- blockstream
- blocktorch
- BlockTrace AI Robot for Bitcoin transactions tracking
- Blocktrace introduces AI chatbot for easy blockchain transaction tracking
- blocktrace.com
- BlockTracker
- Blog
- Blog by Misttrack.io
- Blog Directory - BlogDire
- Blog Directory - Submit Your Blog to the Blogville Directory
- Blog Directory, Submit your blogs today, Blog directories search engine
- Blog Flux
- Blog of Osanda
- Blog on Gopherus Tool -SpyD3r
- Blog post
- Blog Search
- Blog Search : Blog Search Engine Directory
- Blog Top Sites - Directory of the Best Blog Sites
- Blog: 10 Pointers on Secrets Management
- Blog: Capturing RDP NetNTLMv2 Hashes: Attack details and a Technical How-To Guide
- Blog: PyRDP 1.0
- Blog: PyRDP on Autopilot
- BLOG:wonderkun.cc
- Blogarama - Blog directory
- Blogging Fusion - Blog Directory - Article Directory - RSS Directory - Web Directory
- Blogs Directory - Blogs-Collection.com
- BlogSearchEngine
- Blogspot Blog Search
- BLOK Capital attack
- BloodHound
- BloodHound.xpab — Applocker bypass
- BloodHound官方使用指南
- Bloodiko
- Bloomberg
- blotus
- BlowFish
- Blowing the Cover of Android Binary Fuzzing (Slides)
- bloxy.info
- Bloxy.info Example
- blsaccess
- blshkv
- bltsec/violent-python3
- Blu3train
- Blue Botnet
- Blue Team Field Manual (BTFM)
- Blue Team Labs Online - Cyber Range
- BlueBorne - Android Exploit
- bluefly000
- BlueGate
- BlueIce
- blueming:备份文件扫描,并自动进行下载
- BlueShell:一个Go语言编写的持续远控工具,拿下靶机后,根据操作系统版本下载部署对应的bsClient,其会每隔固定时间向指定的C&C地址发起反弹连接尝试,在C&C端运行bsServer即可连接bsClient,从而实现对靶机的持续控制
- BlueStacks
- blueswirl
- Bluetooth Honeypot GUI Framework
- blunden
- Blurity!
- blus
- Bluto
- bmaia/rekall-profiles
- bmartin5692
- bmc-tools:从RDP连接的缓存文件中还原图片
- BMCLeech: Introducing Stealthy Memory Forensics to BMC Tobias Latzo
- bmdyy
- bmobile.in (India)
- BNB Brokers attack
- bnpy - A python architecture plugin for Binary Ninja
- bnugent
- boar24
- board
- Boardreader
- Boat Info World
- Bob:1.0.1
- BoBeR182
- BodgeIt Store
- BOF-Builder:C# .Net 5.0 project to build BOF (Beacon Object Files) in mass
- BOF-RegSave:使用BOF转储 SAM / SECURITY / SYSTEM 注册表配置单元
- BOF.NET:A .NET Runtime for Cobalt Strike's Beacon Object Files
- Bof2PIC:BOF/COFF obj file to PIC(shellcode)
- BofA Forensics and Volatility for the Win (DerbyCon 9)
- BOFRunPortable: BOF内存运行exe
- bogadana
- BokuLoader:Cobalt Strike User-Defined Reflective Loader written in Assembly & C for advanced evasion capabilities
- bolens
- bonedaddy
- Bonn Algorithms and Uncertainty summer 2021, by Thomas Kesselheim
- bontchev/pcodedmp
- bonzini
- Boofuzz
- boojack
- boomerangdecompiler/boomerang
- Boopkit
- boopkit:Linux eBPF backdoor over TCP
- boost.org
- Boosting scalability in anomaly-based packed executable filtering
- Boot Security Modes
- bootleg/ret-sync
- bootloaders.io
- bootstrap
- boppreh/keyboard
- Borch
- borismol
- borjamerino/doublepulsar-volatility
- borkmann
- born2c0de
- Born2Root
- Born2Root2
- Bornunique911
- BOSSLive
- bossplayersCTF 1
- Boston Key Party CTF
- Bot Challenge: Dexter
- BOtB
- botherder
- BotLIST.ru
- Bots for Telegram
- Bottlenose
- bottotl
- Bounty Targets Data
- BountyHunter
- bourne
- Bournemouth University - CERT
- boveus
- boxcryptor
- BoxedApp Packer
- BoxyHQ
- BoynChan
- BozoCrack
- BP Statistical Review of World Energy
- bp0lr
- bplaxco
- bpsizemore
- braa
- brad-sp/cuckoo-modified
- bradchristensen
- bradenhilton
- bradley-evans/cfltools
- BradlySharpe
- brainplot
- Brakeing Security 2021-007
- Brakeman
- BramEsposito
- BramSuurdje
- branchvincent
- Brand Checker
- Branding
- brandomr
- Brandwatch
- branneman
- brant-ruan
- brarcher
- Brave
- Brave browser repo
- Brave 劫持链接插入返利代码
- Brave 称自动插入返利代码是失误所致
- brave/Muon
- Bravery
- brb
- Breach 1.0
- Breach 2.1
- breach_email
- BreachCheck.io
- Breachdirectory.tk
- Breacher
- Breaches
- BreachForums
- BreadCrumbs Investigator Directory
- BreadCrumbs Tools List
- breadcrumbs.app
- Break circuits, save Kong 🦍
- Breaking down zero downtime deployments in Kubernetes
- Breaking out of rbash using scp
- Breaking ROS 2 security assumptions: Targeting the top 6 DDS implementations
- Breaking the Laws of Robotics: Attacking Industrial Robots
- Breaking UC Browser
- Breaking_LTE_on_Layer_Two
- Breaking-Parser-Logic-Take-Your-Path-Normalization-Off-And-Pop-0days-Out
- BrendanGrant
- Brent-Hickey
- brentozarultd/sql-server-first-responder-kit
- BRETT BUERHAUS
- Brett-Kavanaugh
- briandbecker
- brianteeman
- brianwrf/WinSystemHelper
- Bridge:无回显漏洞测试辅助平台,平台使用Java编写,提供DNSLOG,HTTPLOG等功能
- Bridge.Leslibres
- Bridge.Suumitsu
- bridgeythegeek/editbox
- bridgeythegeek/ndispktscan
- brightio
- Bring Your Own Shell
- Bringing VandaTheGod down to Earth: Exposing the person behind a 7-year hacktivism campaign
- Brisbane - Queensland
- briskets
- BriteVerify Email Verification
- brkzlr
- Bro
- Broadband Networks: Concepts and Technology - IIT Bombay
- Broadcastify
- Broadpwn
- brogowski
- Broken 2020:1
- Broken Browser
- Broken Link Hijacking
- Broken: Gallery
- BrokenBrowser
- broo2s
- brookst
- Brosec
- Brown CSCI 1380 Distributed Computer Systems spring 2016, by Tom Doeppner & Rodrigo Fonseca
- brownbook
- Brownie
- Browse the archives
- browse.ai
- browse.digitalglobe.com/imagefinder
- Browser security: lessons from Google Chrome
- Browser's-XSS-Filter-Bypass-Cheat-Sheet
- BrowserGhost-一个抓取浏览器密码的工具,后续会添加更多功能
- Browserleaks
- brunoaduarte
- brunoais
- brunoribeiro94
- BrunoZell
- Brutal
- brute
- Brute force directories and files in webservers using dirsearch
- Brute Forcing Admin Passwords with UAC
- Brute Forcing Your Facebook Email and Phone Number
- Brute-forcing a RF Device: a Step-by-step Guide
- BruteCookie
- BruteShark Issues
- BruteSharkCli
- BruteSharkCli Windows 10 Executable
- BruteSharkDesktop Windows Installer (64 Bit)
- brutespray
- BruteX
- Bryan-Herrera-DEV
- bryanmcnulty
- bryant1410
- Bryzizzle
- bsauce
- bscan-bscan的是一款强大、简单、实用、高效的HTTP扫描器。(WebAliveScan的升级版本)
- bscheck
- Bscscan
- BSI/CERT-Bund
- BSides Canberra 2017 CTF Writeup – Forensics – Capture This Challenge
- BSides London 2017
- BSides Vancuver: 2018
- bstrings
- BT - Challenges of Starting an SRE Team from Scratch in an Enterprise
- BTC List
- BTC Wallet Recovery Tool
- btc.com
- btcparser.com
- btcrecover
- BTRSys 1
- BTRSys:dv 2.1
- BubblyOrca
- buckets.grayhatwarfare.com
- Buer loader
- Buffer
- Buffer Overflow Exploitation Megaprimer for Linux
- Buffer overflow in Xiongmai DVRs
- Buffer-Overflow Vulnerability Lab
- bufferfly
- buffermet
- Bufferover
- bufferoverflow
- bug
- Bug Bounty Hunter
- Bug Bounty Reference
- Bug Bounty Report Generator
- bug report
- Bug Reports
- Bugcrowd
- Bugcrowd Crowdstream
- BugId
- BugMeNot
- Build from source
- Build iOS on QEMU
- build.assets/Makefile
- Builder
- Building
- Building a Healthy On-Call Culture
- Building a Secure Computer System
- Building a smart and automated tool for packed malware detections using machine learning
- Building Actionable Code Ownership
- Building an iOS App Without Xcode’s Build System by Vojta Stavik
- building dynamorio
- Building executable
- Building Internet Firewalls - Packet Filtering
- Building Locator
- Building Multi-Region Resiliency with Amazon RDS and Amazon Aurora
- Building Netflix’s Distributed Tracing Infrastructure
- Building On-Call Culture at GitHub
- Building organization-wide governance and re-use for CI/CD and automation with GitHub Actions
- Building Platforms for Data Engineering
- Building Resilience: How to Learn More from Incidents
- Building Scalable Real Time Analytics, Alerting and Anomaly Detection Architecture at Dream11
- Building Secure & Reliable Systems
- Building Secure and Reliable Systems
- Building the SRE Culture at LinkedIn
- buildwith.com
- Built With Flarum
- built-in rules
- builtwith
- BuiltWith - Check what tech a site is using
- buixor
- Bulk extractor
- Bulldog
- Bulldog 2
- Bullmask
- Bulma
- Bumble Dating App
- BunkerWeb
- Bureau Van Dijk
- BurgerSwap attack
- BurgerZ
- Burial Records
- Burner
- Burner Mobile Numbers
- BurnEye
- Burp Suite
- Burp2Malleable:burp 的 HTTP 请求转换为 Cobalt Strike Malleable C2 profiles
- BurpSuite
- Burpsuite Professional 2.x integration
- Burpsuite Professional 2.x integration
- Burpsuite你可能不知道的技巧
- BurpSuite多重代理
- burrbank
- Buscador
- buserror/simavr
- busindre/dumpzilla
- Business Logic
- Business Logic Errors
- Business Process Compliance (WT 2013/14) - HPI University of Potsdam
- Business Source
- BUSMASTER
- buster
- But how does bitcoin actually work?
- butter1125
- Butterfly Security Project
- butterproject/butter-desktop
- buuctf_2018_online_tool
- buymeacoffee.com/AnonyminHack5
- buymeacoffee.com/orhun
- buymeacoffee.com/six2dez
- buymeacoffee.com/soxoj
- Buzz sumo
- BUZZ.IM
- BuzzFeed - Optimizing for Learning
- Buzzglobe.com
- Buzzweb
- bvdberg01
- bvsg.org
- bWAPP
- bwillis
- bx80
- bxl1989 APFS Remount
- bXSS
- Bye-Bye-IMSI-Catchers
- byeintegrity2-uac:利用 Windows IE 浏览器加载安装程序 bypass UAC
- BYOB
- Bypass 2FA
- Bypass 403
- Bypass 429
- Bypass Captcha
- bypass CSP
- Bypass Fix of OOB XXE Using Different encoding
- Bypass Windows DefenderAttack Surface Reduction
- Bypass_AV:Bypass_AV msf免杀,ShellCode免杀加载器 ,免杀shellcode执行程序 ,360&火绒&Windows Defender
- Bypass_WindowsDefender
- bypass-av-note:免杀技术大杂烩---乱拳打死老师傅
- BypassAV_Script:绕过杀软学习的项目
- bypassAV:免杀 defender 360 cobalstrike shellcode
- BypassAV【免杀】Cobalt Strike插件,用于快速生成免杀的可执行文件
- bypassAVNote:免杀死亡笔记
- ByPassBehinder4J:冰蝎Java WebShell免杀生成
- Bypassing Android Anti-Emulation
- Bypassing anti-analysis of commercial protector methods using DBI tools
- Bypassing anti-incognito detection in Google Chrome
- Bypassing AppLocker as an admin
- Bypassing ASLR and DEP - Getting Shells with pwntools
- Bypassing CSRF Protection
- Bypassing Docker Authz Plugin and Using Docker-Containerd for Privesc
- Bypassing GitHub's OAuth flow
- Bypassing LSA Protection in Userland
- Bypassing Mobile Browser Security For Fun And Profit
- Bypassing NGFW/WAFs using data format obfuscations
- Bypassing Rate Limit Protection
- Bypassing root detection
- Bypassing the Same Origin Policy - The Browser Hacker’s Handbook (2014)
- Bypassing Web Cache Poisoning Countermeasures
- Bypassing Windows Defender Runtime Scanning
- Bypassing Xamarin Certificate Pinning
- bypassuac
- ByPassUACTools: Windows 平台下的UAC(User Account Contro) 绕过工具
- BypassUserAdd:通过反射DLL注入、Win API、C#、以及底层实现NetUserAdd方式实现BypassAV进行增加用户的功能,实现Cobalt Strike插件化
- bypasswaf-云锁数字型注入tamper/安全狗的延时、布尔、union注入绕过tamper
- bypass沙箱
- byt3bl33d3r
- Bytebase API
- Bytebase Console
- Bytebase vs CloudBeaver
- Bytebase vs DBeaver
- Bytebase vs Flyway
- Bytebase vs Jira
- Bytebase vs Liquibase
- Bytebase vs Metabase
- Bytebase vs Navicat
- ByteBoozer
- Bytecode_graph
- Bytecode-viewer
- ByteCodeViewer - Android APK Reverse Engineering Suite (Decompiler, Editor, Debugger)
- bytegraph.xyz
- bytepack/IntroToiOSReverseEngineering
- ByteScout Barcode Reader
- ByteWise: A case study in neural network obfuscation identification
- C cheatsheet
- C for Everyone: Programming Fundamentals
- C_Shot-shellcode远程加载器
- C.R.E.A.M. Finance attack
- C.XSS Guide
- C# Implementation of CVE-2021-1675
- C++ API
- C++ core
- C0axx
- c0d3sh3lf/android_forensics
- c0f
- C0m80
- C0NtRiVER
- C0nw0nk
- C2_Demo:golang+c#乱写了一个基于http的垃圾远控(支持团队协同作战,功能很少)(三端)
- C2concealer:生成用于 Cobalt Strike 的随机 C2 可延展配置文件
- c354467ec5d323fecf94d33bc05eab65f90a916c39137d2b751b0e637ca5a3e4.exe
- c3l3si4n
- C3n7ral051nt4g3ncy
- C3TV page
- c5c0394c-cc8f-11e6-99be-16175b741c2a.PNG
- c5c3db2e-cc8f-11e6-834f-1312e566a7ed.png
- c5c4a982-cc8f-11e6-9b12-147fa7630e0f.png
- C64LoaderWV - Loading C64 programs into Ghidra
- C99
- caarlos0
- cabana
- Cách export data trong IDA
- Cache poisoning and other dirty tricks
- Cached websites check from Google webcache and Archive org
- CachedPages
- CachedView
- CachedViews
- Cacoo
- Caddy
- Caddy's main.go
- Caddyfile
- cadosecurity
- CaduRoriz @CaduRoriz
- Caesar:一个全新的敏感文件发现工具
- Caesar:全新的敏感文件发现工具
- Caesars Cipher
- Caesium:JAVA 字节码混淆工具
- caffix
- cagriulas
- caheckman
- CAIDA ASRank
- CAINE
- CainYzb
- Cairo 0 安全审计实践指南
- cairoeth
- CakeCTF 2022 - ImageSurfing
- CakeFuzzer
- Calastrophe
- CALDERA
- Caldera for OT
- Caldera's blog
- calebfenton/dex-oracle
- calebfenton/simplify
- Call for Papers - 4th annual Forensics and Incident Response Summit EU
- CallerID Test
- CallStackSpoofer:用于在进行系统调用时欺骗任意调用堆栈的 PoC 实现(例如,通过 NtOpenProcess 获取句柄)
- CallumBaston
- CalTack
- camandel
- camas
- camaya
- Cambridge Principles of Statistics 2020, by Alberto J. Coca
- Cambridge Statistical Learning in Practice 2021, by Alberto J. Coca
- camdavidsonpilon/probabilistic-programming-and-bayesian-methods-for-hackers
- Camel project
- Camel theory
- CameraHack:批量扫描破解海康威视、大华等摄像头的常见漏洞
- CamFind
- CamOver:摄像头漏洞利用工具
- CampusCareerCenter
- CampusX Data Science Mentorship Program 2022-23 (Hindi)
- Can anyone explain precisely what IOWait is?
- CAN bus
- CAN Bus protocol Penetration testing and forensics
- CAN DoS Fuzzing Attack Video
- Can I Jailbreak?
- CAN MITM Bridge by MUXSCAN
- Can one use libSegFault.so to get backtraces for SIGABRT?
- CAN Simulator
- Can you help me with my capacity planning?
- Can You Trust Autonomous Vehicles?
- can_print_changes.py
- CAN-bus protocol pentesting and forensics
- CAN-D: A Modular Four-Step Pipeline for Comprehensively Decoding Controller Area Network Data
- can1357
- Canada411
- Canadian Business Research
- Canadian Business Resource
- Canadian Institute for Cybersecurity datasets
- CANalyzat0r
- CANard
- canarytokens.org
- CANBadger
- Canberra - Australian Capital Terrority
- CANBus Triple
- canbushack: Hack Your Car
- CanCat
- Cancel Ethereum Transaction
- CANdevStudio
- CANdiy-Shield
- CandyPotato:烂土豆提权,增加自动化利用
- canh
- CanIUse.com
- CanLaw
- canmatrix
- CANNiBUS
- canopen
- CanoPy
- CANSPY
- CANtact
- cantools
- CANToolz
- canTot
- Canva
- CAP 5415 - Computer Vision - University of Central Florida
- CAP 6412 - Advanced Computer Vision - University of Central Florida
- CAP_SYS_PTRACE
- CAP5415 Computer Vision - UCF Fall 2023
- CAP6412 Advanced Computer Vision - UCF Spring 2024
- CAP6673 - Data Mining and Machine Learning - FAU
- Capa
- capa 2.0: Better, Stronger, Faster
- capa v4: casting a wider .NET
- capa-bot
- capa-rules repository
- capa-rules rule format
- capa: Automatically Identify Malware Capabilities
- Capabilities
- Capability myths demolished
- Capability Security Model
- Capacity Planning and Performance Enhancement with Page Reference Sampling
- Capacity Planning at Scale
- cape2.sh
- CAPEC
- CAPEv2
- capital
- Caplets
- capnspacehook
- Capstone
- capsule8/capsule8
- captain-woof
- Captain0x23
- captainarash/the_holy_book_of_x86
- Captcha Bypass
- captf
- CaptfEncoder是一款可扩展跨平台网络安全工具套件,提供网络安全相关编码转换、古典密码、密码学、非对称加密、特殊编码、杂项等工具,并聚合各类在线工具
- Captin Fact
- CapTipper
- Capture the Ether
- Capture the Flag
- Capture the Flag CheatSheet
- Car Hacking 101
- Car Hacking for Poories
- Car Hacking in 30 Minutes or Less
- Car Hacking on the cheap
- Car Hacking Scene in the PH: How Far We've Come
- Car Hacking Videos
- Car Hacking with Craig Smith
- Car Hacking: The definitive source
- Car Infotainment Hacking Methodology and Attack Surface Scenario
- Carberp
- Carbon Brief
- Carbylamine
- Cards and Chipsets
- Care2
- CareerBuilder
- CareerJet Australia
- CareerOne Australia
- carellamartina
- caribpa
- Caring Caribou
- Caring Caribou Next
- carlin-q-scott
- Carloop
- Carloop Community
- carlosgprado
- carlosmarq
- carlosmonastyrski
- carlospolop
- carlospolop/autovolatility
- carlpulley/volatility
- carlsmedstad
- carmaa/interrogate
- Carnet AI
- carolineLe
- carougen
- carpedm20
- carr0t2
- CarrierLookup
- Carrot2
- CartoDB
- Cartography
- Cartoon vector created by vectorjuice - www.freepik.com
- Casa de PPL by Levin
- casbin/casbin
- Case Study: Extracting And Analyzing Messenger Data With Oxygen Forensic Detective | By Nikola Novak
- Case Study: Implementing SLOs for a New Service
- Caselaw Access Project
- CasExp-Apereo CAS 反序列化利用工具
- CashedPages
- Casino Royale
- Casino Security and Gaming Surveillance
- Casino Surveillance and Security: 150 Things You Should Know
- Casino Surveillance: the Eye That Never Blinks
- cast
- Castrick
- Catalog-Telegram.info
- CatalogTelegram
- catatonicprime
- Catch Me If You Can
- Category Theory for Programmers, 2014 - Bartosz Milewski
- catenacyber
- Catfish
- catmandx
- catphish
- Catpro
- CatTails
- Causal Inference -- Online Lectures (M.Sc/PhD Level)
- Causal Inference Course - Brady Neal
- Causal Inference Jonas Peters
- CauseWay Compressor
- Cavalier-HudsonRock
- cbastienbaron
- cbjrobertson
- cblichmann
- CC BY 4.0
- CC BY-SA 4.0
- CC Pro
- CC-Driver
- CCAT
- CCC - Horror Stories From the Automotive Industry
- cccs-kevin
- cccs-mog
- cclauss
- CCleaner
- CcRemote:一个基于gh0st远程控制的项目
- cdb-wds:利用白名单文件 cdb.exe 执行 shellcode
- cdCon
- cdCon 2020 Playlist
- cdCon 2021 Playlist
- cddmp
- CDK:一款为容器环境定制的渗透测试工具,在已攻陷的容器内部提供零依赖的常用命令及PoC/EXP
- cdn-proxy:克隆目标网站并禁用CDN+WAF
- cdnCheck_go:快速判断目标解析的IP是否为CDN
- CDNCheck:CDN 检测
- cdnlookup:一个使用 Edns-Client-Subnet(ECS) 遍历智能CDN节点IP地址的工具
- cdntest:CDN外部访问与回源可用性状态批量检测
- cDogScan:又一款多服务口令爆破、内网常见服务未授权访问探测,端口扫描工具
- cdpsnarf
- cdstelly/nugget
- cdump
- cdxy-Blog
- cecio
- Cedar
- ceeac
- cefdebug
- CEH – Hacking Database Secrets and Exploit
- CEHv10 Module 06 System Hacking.pdf
- CEHv10 Module 17 Hacking Mobile Platforms.pdf
- Celeb-DF (v2)
- celenityy
- CelineSebe
- Cell and Molecular Biology for Engineers ETH Zurich
- Cell Phone Investigations: Search Warrants, Cell Sites and Evidence Recovery
- cellebrite-srl/FunctionInliner
- cellebrite-srl/ida_kernelcache
- cellebrite-srl/PacExplorer
- CellIdFinder
- cemetery.canadagenweb.org/search.html
- CENG 465 - Introduction to Bioinformatics (Spring 2020-2021)
- CengBox:1
- CengBox:2
- Censseo
- Censys
- Censys API integration
- Censys Search - Certificates
- Censys.io
- CentBrowser
- Center for International Earth Science Information Network
- Center for Internet Security (CIS)
- CentOS 7 Server Hardening Guide
- Central and Eastern European Business Directory
- Central Ops
- Centralize your vulnerability data
- CentralOps
- CentralOps - DomainDossier
- Cenzic crackmebank
- CEPII
- Cerber ransomware with check-in
- CERBERE: Cybersecurity Exercise for Red and Blue Team Entertainment, Reproducibility
- CERT-EU
- Certgraph
- Certi
- Certificate Management
- certificate pinning
- Certificate Transparency
- certificatedetails
- Certified Information Systems Security Professional (CISSP)® Common Body of Knowledge (CBK)® Review
- Certified robustness of static deep learning-based malware detectors against patch and append attacks
- Certik Alert
- CertPotato
- certs.io
- CertSpotter
- certxlm
- CeWL
- Cewlkid:1
- CEXE
- cf:云环境利用框架 Cloud Exploitation Framework 方便红队人员在获得 AK 的后续工作
- cfabianski
- CFF Explorer
- CFGScanDroid
- cfi-gb
- CFR
- cg31/shadowsocks-windows-gui-rust
- cgdb/cgdb
- cgdecker
- cgeopapa
- cgimenes
- CGO ELF loader
- cgoecknerwald
- CGrex
- Ch0pin
- CH26 Managing the Development of Secure Systems (from Anderson's book)
- CH27 Assurance & Sustainability (from Anderson's book)
- Ch3nYe
- ch4inrulz:1.0.1
- chaihahaha
- Chain Radar
- ChainAbuse
- Chainalysis NFT tool Storyline
- chainalysis oracle docs
- ChainAware.ai
- ChainBeat
- chainbound
- chainbroker.io
- chainedge.io
- chaineye.tools
- ChainFuzz
- Chainlink VRF
- chainlist.org
- ChainPaint attack
- Chainsaw
- chainsec.io/defi-hacks
- chainspot.io
- chainway.xyz/prove
- chaitin/passionfruit
- Chakra-2016-11
- challenges.re
- challenges.re
- Challenging anti-virus through evolutionary malware obfuscation
- Challenging Your Forensic Readiness with an Application-Level Ransomware Attack
- chamber
- Champlain College DFIR CTF
- Chan9390
- ChangeDetect
- ChangeDetection
- ChangeDetection.io
- ChangeDetection.io Open Source
- Changelog
- Changelog/Information
- changelogs
- Changeme
- changeofpace/viviennevmm
- ChangeTimestamp: 一键修改exe、dll的编译时间、创建时间、修改时间和访问时间
- Channel Update + Let's Hack: Sniper Elite 4 (Cheat Engine and x64dbg Tutorial)
- channel, #testing-guide
- ChannelGram
- Chaos
- Chaos Engineering Newsletter
- Chaos Engineering Observability
- Chaos Engineering Upgraded
- Chaos Engineering: Site reliability through controlled disruption
- Chaos Engineering: System Resiliency in Practice
- Chaos Public Bug Bounty Programs
- Chaos Testing an Application on AWS
- CHAOS:开源远控管理工具
- ChaosConf
- Chaosdata - Ghost in the Droid: Possessing Android Applications with ParaSpectre
- ChAP: Chaos Automation Platform
- chapinb
- chaplin89
- Chapter 20. I/O Redirection
- Charles
- Charles Proxy
- charlesdaniels
- charlesrocket
- charlotte:又一款免杀 C++ Shellcode加载器
- charsetinspect
- charsets.jar
- chart-studio.plotly.com
- Chart.js
- chartblocks
- Charts
- charts.cointrader.pro
- Chasing the Joker
- chatGPT-CodeReview: 调用chatGPT进行代码审计的工具
- ChatSearchRobot
- Chatsecure
- chatViewTool:基于Java实现的图形化微信聊天记录解密查看器
- chdalski
- Cheat Engine
- Cheat Sheets
- cheat-engine/cheat-engine
- cheatsheet
- Check
- Check Browsers' LNK
- Check for susceptibility to sub-domain hijacking
- Check Point Forensic Files: A New Monero CryptoMiner Campaign | Check Point Software Blog
- Check Point Forensic Files: GandCrab Returns with Friends (Trojans) | Check Point Software Blog
- Check Point取证报告:SandBlast客户端能够监测到无文件GandCrab
- Check team
- Check That (Vin Search)
- Check That Vin
- Check User Names
- check-my-headers
- Check-The-Sum
- Checkdesk
- checkmedia.org
- Checkov
- CheckPhish
- checkpointsw/karta
- checkra1n
- checkra1n 1337
- checkra1n jailbreak
- checkra1n/toolchain
- Checkrain fake iOS jailbreak leads to click fraud
- Checksec.rs
- checksec.sh
- Checkstyle – A tool for checking Java source code
- CheckURL
- Checkuser
- CheckUsernames
- chedabob
- cheeky4n6monkey/4n6-scripts
- cheeky4n6monkey/ios_sysdiagnose_forensic_scripts
- chef-koch/android-vulnerabilities-overview
- chef-koch/regtweaks
- chemamartinez
- chen-keinan
- chengr28/revokechinacerts
- chenhuitao
- chenjunyu19
- chenrui333
- chenxiancai/stcobfuscator
- cheriejw
- CherryFramework
- chfl4gs
- ChiChou
- chichou/bagbak
- Chiggins
- Chili:1
- ChillerDragon
- Chimay-Red
- Chimera
- china
- Chinese | 中文文档
- chinmaynehate
- chipitsine
- CHIPSEC
- ChipWhisperer
- Chisel-Strike:使用.NET 的 XOR 加密实现适用于 cobalt strike的 socks5代理工具
- cHJlaXpoZXI
- ChkEXE
- Chkrootkit
- chlbc
- chloedia
- choco.bat
- Chocolatey
- Chosen-instruction attack against commercial code virtualization obfuscators
- chou1551
- chowmean
- Chris
- Chris Elbring Jr. @neatzsche
- Chris Hadnagy - 7 Jedi Mind Tricks Influence Your Target without a Word
- Chris Hadnagy - Decoding humans live
- Chris Hadnagy - Social Engineering for Fun and Profit
- Chris-Ju
- chrisbrown-01
- ChrisCarini
- chrisgacsal
- chrisk44/hijacker
- chrislee35/flowtag
- ChrisPritchard
- chrissparksnj
- ChrisTheCoolHut
- Christian Burkard (@phantinuss)
- Christian Heitman
- christian-intra2net
- christianboyle
- Christina Hasternath - GraphQLConf 2021
- Christopher Thompson
- Christopher-Hayes
- christophetd
- Chrome
- Chrome Keylogger
- Chrome Sandbox Design Doc
- Chrome Sandbox Design FAQ
- Chrome-Android-and-Windows-0day-RCE-SBX:chrome 的 Windows 和 Android 版本RCE+SBX(沙箱逃逸)漏洞
- chrome-bandit:在 Mac 上通过 chrome 自动填充获取保存的密码
- chrome-is-bad
- chrome-url-dumper
- chrome.png
- ChromeCacheView
- Chromium tracker
- Chromium-based-XSS-Taint-Tracking:Cyclops 是一款具有 XSS 检测功能的浏览器
- Chromium: Multi-process Architecture
- ChromiumOS design docs
- Chronic-Dev/syringe
- Chronos
- chuckx
- chujDK
- Chunk-Proxy:通过 http chunk 传输代理(类似 reGeorg)
- chunsou: (春蒐)Python3编写的多线程Web指纹识别工具,适用于安全测试人员前期的资产识别、风险收敛以及企业互联网资产风险摸查
- chuxi
- chuyu-team/mint
- ChYing: 一款安全工具箱,集成了目录扫描、JWT、Swagger 测试、编/解码、轻量级 BurpSuite、杀软辅助功能
- CI actions
- CI build
- CI/CDay 2024: What makes a good CI/CD platform?
- CIA World Factbook
- cicd-goat
- cielo.finance
- CIFv2
- CinCan
- cindylindeed
- ciph3rz
- Cipher Design
- cipher387
- cipherblade.com
- Cipherscan
- ciphersuite.info
- ciphertrace.com
- Ciphey
- CIRCL
- circl/forensic-tools
- circl/volatility-misp
- Circom 验证合约输入假名漏洞
- Circos
- cirosantilli/x86-bare-metal-examples
- cirt-fuzzer
- CIS 4930/ CIS 5930 - Offensive Computer Security, Florida State University
- CIS 522 - Deep Learning - U Penn
- CIS Benchmarks
- CIS Docker Benchmark
- CIS Top 18 Critical Security Controls
- CISA - Certified Information Systems Auditor
- ciscn_2019_web_northern_china_day1_web1
- ciscn_2019_web_northern_china_day1_web2
- ciscn_2019_web_northern_china_day2_web1
- Cisco CCNA
- Cisco Live – Requires a CCO login but has most videos from Cisco Live events.
- Cisco Security Advisories
- Cisco Talos
- Cisco Talos Intelligence
- Cisco-Talos/GhIDA
- cisco's cources
- cisco/joy
- CISM - Certified Information Security Manager
- CISOfy/lynis
- CISSP - Certified Information Systems Security Professional
- Citadel
- citadel_decryptor
- Cite this work
- CiteSeerX
- Citizen Desk
- Citrix Gateway/ADC 远程代码执行漏洞分析
- CitrixHoneypot
- citronneur/volatility-wnf
- City Mapper
- ckennelly
- ckieschnick
- CKIM2024
- ckuethe
- cl1p
- cla7aye15I4nd
- ClamAv
- Clamp 1.0.1
- Clamscan Unpacker
- Clarify
- ClassHound:利用任意文件下载漏洞循环下载反编译 Class 文件获得网站 Java 源代码
- Classification of packed executables for accurate computer virus detection
- Classified Ads
- Classifying packed malware represented as control flow graphs using deep graph convolutional neural network
- Classifying packed programs as malicious software detected
- Classmates
- ClassNameDeobfuscator
- ClaudiuHKS
- clausing
- claustromaniac
- Clcanny
- cle1000
- cleanhive
- CLEANLY ESCAPING THE CHROME SANDBOX
- clear
- clear_err
- clem9669
- clems4ever
- CLI commands
- CLI tool to get the implementation address from a proxy contract
- click here
- Clickjacking
- ClickJacking Attack Lab
- Clickjacking-Tester
- Clickjackings in Google worth 14981.7$
- client/js/main.js
- climacros – IDA productivity tool
- Climbing the Production Mountain: Practical CI/CD Attacks Using CI/CD Goat
- Clip Blast
- Cloak and dagger: Unpacking hidden malware attacks
- cloaksec
- Clober attack
- Clojure
- Cloning RSA tokens with Frida
- Cloud
- Cloud Custodian
- Cloud Forensics: Why, What and How to Extract Evidence
- Cloud Security Risks (Part 1): Azure CSV Injection Vulnerability
- Cloud-pcap
- cloud-ranges-部分公有云IP地址范围
- CloudFail:利用配置错误的 DNS 和旧数据库记录来查找 CloudFlare 网络背后的隐藏 IP
- CloudFlair
- Cloudflare
- Cloudflare - Support Operations Engineering: Scaling Developer Products to the Millions
- Cloudflare dashboard
- CloudFlare Radar
- Cloudflare_enum
- cloudflare-bypass:使用Cloudflare Workers来绕过Cloudflare 的机器人验证
- cloudflare-origin-ip
- cloudfox
- CloudFoxable
- CloudGoat
- Cloudlock - My Life as a Solo SRE
- CloudMapper
- Cloudmare
- CloudScraper
- cloudSec: 云平台AK/SK-WEB利用工具
- CloudStorageFinder
- Cloudy-kraken
- clr2of8
- clubby789
- Cluster analysis
- Clustering algorithms
- Clustering transactions in Bitcoin and other cryptocurrencies
- Clustermaps
- Cluuz
- clviper
- CMake
- CMNatic
- CMPSC 431W Database Management Systems, Fall 2015 - Penn State University
- CMS 165 Foundations of Machine Learning - 2019 - Caltech
- CMS 165 Foundations of Machine Learning and Statistical Inference - 2020 - Caltech
- Cms-explorer
- CmSc 150 - Introduction to Programming with Arcade Games, Simpson College
- CMSCheck:可以对多个网站进行批量CMS识别,寻找网站指纹,进行漏洞利用
- CMSeeK
- CMSmap
- CMU 10 703 Deep Reinforcement Learning & Control fall 2022, by Katerina Fragkiadaki
- CMU 10 801 Advanced Optimization and Randomized Algorithms spring 2014, by Suvrit Sra and Alex Smola
- CMU 11 492 Speech Processing fall 2021, by Alan W. Black
- CMU 11 751 / 18 781 Speech Recognition and Understanding fall 2023, by Shinji Watanabe
- CMU 15 150 Principles of Functional Programming summer 2023, by Brandon Wu
- CMU 15 388 / 15 688 Practical Data Science, by Zico Kolter
- CMU 15 440 / 640 Distributed Systems Spring 2022, by Mahadev Satyanarayanan, Padmanabhan Pillai
- CMU 15 859 Algorithms for Big Data fall 2020, by David Woodruff
- CMU 15-462/662: Computer Graphics
- CMU 16 299 Introduction to Feedback Control Systems spring 2022, by Chris Atkeson
- CMU 16 745 Optimal Control and Reinforcement Learning spring by Zac Manchester
- CMU 16 899 Adaptive Control and Reinforcement Learning fall 2020, by Changliu Liu
- CMU 16-715 Robot Dynamics 2022 - CMU
- CMU 16-745 Optimal Control 2024 - CMU
- CMU 17-445 Software Engineering for AI-Enabled Systems summer 2020, by Christian Kaestner
- CMU 21 228 Discrete Mathematics spring 2021, by Po-Shen Loh
- CMU 21 738 Extremal Combinatorics spring 2020, by Po-Shen Loh
- CMU Advanced NLP Fall 2024
- CMU CS11-711 - Advanced Natural Language Processing
- CMU CS11-737 - Multilingual Natural Language Processing
- CMU Neural Nets for NLP 2021
- CMU's Multimodal Machine Learning course (11-777), Fall 2020
- cn-kali-team
- CNCF Slack channel
- CNIT 120 - Network Security
- CNIT 121 - Computer Forensics
- CNIT 123 - Ethical Hacking and Network Defense
- CNIT 124 - Advanced Ethical Hacking
- CNIT 126 - Practical Malware Analysis
- CNIT 127 - Exploit Development
- CNIT 128 - Hacking Mobile Devices
- CNIT 129S: Securing Web Applications
- CNIT 140: IT Security Practices
- CNIT 40: DNS Security
- CNN
- CNVD-2020-10487(CVE-2020-1938), tomcat ajp 文件读取漏洞poc
- CNVD-2020-25078:D-link 敏感信息泄漏,可以直接获取账户密码查看监控
- CNVD-2021-10543:MessageSolution 企业邮件归档管理系统 EEA 存在信息泄露漏洞
- CNVD-2021-14544:Hikvision 海康威视流媒体管理服务器任意文件读取
- CNVD-2022-60632 畅捷通任意文件上传漏洞复现
- cnvd.org.cn
- CO 642 Graph Theory - University of Waterloo
- coalfire-research/ios-11.1.2-15b202-jailbreak
- Coalition Exploit Scoring System
- Cobalt Strike Aggressor 插件包
- Cobalt Strike Spear Phish
- Cobalt Strike在线手册
- Cobalt Strike插件 - RDP日志取证&清除
- Cobalt_Strike_Bot:CobaltStrike上线通知,飞书群聊机器人、server酱通知
- Cobalt_Strike_wiki-Cobalt Strike系列
- Cobalt-Clip:Cobaltstrike addons to interact with clipboard
- cobalt-strike-default-modules-via-named-pipe检测
- Cobalt-Strike-Start:可能是最详细的 Cobalt Strike 中文 Wiki
- Cobalt-Strike:常用 CS 脚本
- cobaltfusion/debugviewpp
- Cobaltstrike
- Cobaltstrike_4.3源码
- CobaltStrike_CNA:使用多种WinAPI进行权限维持的CobaltStrike脚本,包含API设置系统服务,设置计划任务,管理用户等(CVE-2020-0796+CVE-2020-0787)
- CobaltStrike_RedTeam_CheatSheet:一些实战中CS常用的小技巧
- cobaltstrike-beacon-data:Open Dataset of Cobalt Strike Beacon metadata (2018-2022)
- cobaltstrike-bof-toolset:在cobaltstrike中使用的bof工具集,收集整理验证好用的bof
- cobaltstrike4.5_cdf:CS4.5破解版
- CobaltStrikeParser
- cobaltstrikescan
- cobaltstrike后渗透插件,偏向内网常用工具(目前包含1.定位域管理员2.信息收集(采用ADfind)3.权限维持(增加了万能密码,以及白银票据)4.内网扫描(nbtscan(linux/windows通用))5.dump数据库hash(支持mysql/mssql(快速获取数据库的hash值)))
- CobblePot59
- COBIT - Control Objectives for Information and Related Technologies
- cobra obfuscator
- CobraDroid
- coc-markmap
- CocoaSPDY
- CoColi
- Coda
- codahale/bcrypt-ruby
- codatify
- Code Finder
- Code Inspector
- Code Review
- Code Review Manage code changes
- Code Search
- Code Search Find more, search less
- Code Virtualizer
- code-review-doctor
- code-review-lab:代码审计☞Go/PHP/Python/.NET
- Code-Yellow: Helping Operations Top-Heavy Teams the Smart Way
- Code0x58
- Code2pdf
- code6-码小六是一款 GitHub 代码泄露监控系统,通过定期扫描 GitHub 发现代码泄露行为
- CodeAnalysis:腾讯开源的静态代码扫描器
- codearranger
- CodeBerg
- CodeEngn
- Codegate 2020 - CSP
- Codegate CTF
- Codegate2018 prequal - simpleCMS
- CodeQL team uses AI to power vulnerability detection in code
- codeql_compile:自动反编译闭源应用,创建codeql数据库
- CodeQL:深入理解CodeQL
- CodeqlNote:Codeql学习笔记
- CodeQLRule:个人使用CodeQL编写的一些规则
- CodeQwen1.5-7B-Chat
- CodeReviewTools:通过正则搜索、批量反编译特定Jar包中的class名称
- CoderStats
- codeslaw.app
- Codespaces
- Codespaces Instant dev environments
- codevbus
- Coding Interview University
- Coding Theory - IIT Madras
- codingllama
- codingo
- Coerced potato
- CoffeeLdr:Beacon Object File Loader
- COFFLoader2:Load and execute COFF files and Cobalt Strike BOFs in-memory
- Cognito Scanner
- COGSCI 1 - Intro to Cognitive Science Summer 2022 - UC Berkeley
- Cohda Wireless
- CoIMS
- CoIMS_Wiki
- coinalyze.net
- coinapi.io
- coinbase/dexter
- coinfirm.com
- coinmetrics.io
- CoinPath
- coins95.web.app
- cointool.app
- CoinTracking
- Coises
- coj337
- cokeBeer
- Col-E
- COL718 - Architecture of High Performance Computers - IIT Delhi
- cola_dnslog:Cola Dnslog v1.3.1 更加强大的dnslog平台/无回显漏洞探测辅助平台
- Colab notebook
- Coldfire
- ColdHeat
- colin-stubbs
- colindomoney
- colinmckaycampbell/rapidfilehash
- Collection of OSCP scripts
- Collection of the most common vulnerabilities found in iOS applications
- Collections
- Collective classification for packed executable identification
- Collective Mindfulness for Better Decisions in SRE
- Collectors – Routeviews
- College Recruiter
- collision-webshell:制作相同 MD5的 webshell 文件绕过基于缓存文件 webshell 检测
- colorama
- Colorbrewer
- colton-gabertan
- Columbia COMS W4119 Computer Networks fall 2004, by Vishal Misra
- Columbia ELEN E4703 Wireless Communications spring 2006, by Angel Lozano
- Columbia ELEN E4710 An Introduction to Network Engineering fall 2004, by Dan Rubenstein
- Columbia ELEN E6711 Stochastic Models in Information Systems fall 2005, by Yuliy Barsyhnikov
- Columbia ELEN E6717 Information Theory fall 2003, by Vittorio Castelli
- Columbia ELEN E6820 Speech and Audio Processing spring 2006, by Dan Ellis
- Columbia IEOR E4004 Introduction to Operations Research: Deterministic Models summer 2005, by Jay Sethuraman
- Columbia IEOR E4007 Optimization Models and Methods 2005, by Garud Iyengar
- Columbia IEOR E4106 Introduction to Operations Research: Stochastic Models spring 2005, by Ward Whitt
- Columbus Project
- COM binary format
- COM2EXE
- COM4509/COM6509 Machine Learning and Adaptive Intelligence 2015-16
- comaeio/porosity
- comaeio/swishdbgext
- comawill
- Combinatorics - IISC Bangalore
- Combinig LUAFV PostLuafvPostReadWrite Race Condition PE with DiagHub collector exploit -> from standard user to SYSTEM
- Combot
- comex/substitute
- Comixify
- comma
- comma 3X
- commaCarSegments
- Command
- Command Injection
- Command Line Interface Definition
- Command line Process Auditing
- Command-line Interface
- command:红队常用命令速查
- Command2API:将执行命令的结果返回到Web API上
- CommandLineParser
- Commando-vm
- Commands manual
- Commenter123321
- Commercial Product Evaluations
- commial
- Commix
- commix:命令注入自动化检测工具
- commjoen
- Common Azure Security Vulnerabilities and Misconfigurations
- Common Crawl
- common errors
- Common object file format (COFF)
- common operations
- Common Platform Enumeration (CPE) based Scan
- common questions and answers
- Common Weakness Enumeration (CWE) Top 25
- Common Windows Privilege Escalation Vectors
- Common-substr
- CommonCrawl
- CommonCrawl Index
- communication protocol
- community server
- community-maintained Discord channel
- community-scripts-pr-app
- Comnir
- Cómo documentar tus bases de datos con SchemaSpy
- Comodo Dragon
- COMP2804: Discrete Structures II
- COMP300E - Programming Challenges, Prof Skiena, Hong Kong University of Science and Technology - 2009
- COMP510 - Computational Finance - Steven Skiena - 2007 HKUST
- Companies House service
- Companieshouse
- Company Registration Round the World
- Company Research Resources by Country Comparably
- Comparing malware samples for unpacking: A feasibility study
- Comparison of command shells
- Comparison of executable file formats
- Comparison of our tool afro (APFS file recovery) with Blackbag Blacklight and Sleuthkit
- Comparison of two Files for forensics investigation by Compare IT
- Comparison to Other Tools
- Compart
- Compass
- CompassSecurity
- Compatibility
- CompeteShark
- Compiler Design - IISC Bangalore
- Compiler Design - IIT Kanpur
- Compiler Design by Sorav Bansal
- Compiling NASM Assembly with Xcode in a C/C++ Project
- Complete Free Hacking Course: Go from Beginner to Expert Hacker Today
- complete testsuite
- completedns.com/dns-history
- Complex Network : Theory and Application - IIT Kharagpur
- Complexity kills security
- Complexity-based packed executable classification with high accuracy
- Component Structure
- Comprehensive Experimental Analyses of Automotive Attack Surfaces, 2011
- Comprehensive Guide on Dirsearch
- Comprehensive Guide on Dirsearch Part 2
- Comprehensive List of Crypto Research & Analytics Tools
- Comprehensive, Multi-Source Cyber-Security Events
- Compromised Server--取证挑战
- Compromising IPv4 networks via IPv6
- COMProtector
- CompTIA A+
- CompTIA Advanced Security Practitioner
- CompTIA Cloud+
- CompTIA Linux+
- CompTIA Network+
- CompTIA Security+
- Computational Astrophysics - AstroTwinCoLo, 2015
- Computational Finance - Universität Leipzig
- Computational Finance Course - Prof Grzelak
- Computational Geometry - IIT Delhi
- Computational Linear Algebra - fast.ai
- Computational Physics Course in Python, Rutgers 2021
- Computational-intelligence techniques for malware generation
- Computer Algorithms - 2 - IIT Kanpur
- Computer and Hacking Forensics
- Computer Architecture - ETH Zürich - Fall 2019
- Computer Architecture - IIT Delhi
- Computer Architecture - IIT Kanpur
- Computer Architecture - IIT Madras
- Computer Communication Networks, Rensselaer Polytechnic Institute - Fall 2001
- Computer Forensic Tutorials || Install Dumpzilla on Kali Linux
- Computer Forensics Courese Learning Path - Infosec Institute
- Computer Forensics Courses | Coursera
- Computer Forensics Jobs: Are there jobs available?
- Computer Forensics Jobs: How to get a job, and what you should know
- Computer Forensics Jobs: Is it really that difficult to enter the field?
- Computer Forensics Training and Courses | X-Ways
- Computer Forensics Training Courses | Udemy
- Computer Graphics - IIT Madras
- Computer Graphics 2012, Wolfgang Huerst, Utrecht University
- Computer Graphics Fall 2011, Barbara Hecker
- Computer Hacking - Cyber Laws Harvard
- Computer Hacking & Malware Attacks for Dummies
- Computer Memory Forensic Tutorial
- Computer Networking: A Top-Down Approach
- Computer Networks - IIT Kharagpur
- Computer Networks, Tanenbaum, Wetherall Computer Networks 5e - Video Lectures
- Computer Organization - IIT Madras
- Computer Science 169- Software Engineering - Fall 2019 - UCBerkeley
- Computer Science 70, 001 - Spring 2015
- Computer Security Technology Planning Study
- Computer Security Threat Monitoring and Surveillance
- Computer Security: Art and Science
- Computer Systems Security, Fall 2020, Vinod Ganapathy, IISc Bangalore
- Computer Systems Security, MIT
- Computer Systems: A programmer's Perspective
- Computer Vision for Visual Effects - RPI
- Computer Vision I: Variational Methods - TU München
- Computer Vision II: Multiple View Geometry (IN2228), SS 2016 - TU München
- Computer Vision III: Detection, Segmentation and Tracking (CV3DST) (IN2375) - TU Munich
- Computerphile
- Computing for Computer Scientists - University of Michigan
- COMS 4281 - Introduction to Quantum Computing -Columbia University
- COMS W4241 Numerical Algorithms spring 2006, by Henryk Wozniakowski - Columbia
- COMS W4995 - Applied Machine Learning - Spring 2020 - Columbia University
- Conceptual and empirical comparison of dimensionality reduction algorithms (PCA, KPCA, LDA, MDS, SVD, LLE, ISOMAP, LE, ICA, t-SNE)
- conda
- condret
- ConDroid
- Conduct Search Engine Discovery and Reconnaissance for Information Leakage (OTG-INFO-001)
- Conf42
- Conf42 2022 Premiere
- confidant
- Config adapters
- Configuration
- Configure Safely and Use Safe Defaults
- configure system firewall
- Configuring Burp Suite With Android Nougat
- Conflict, power and persuasion – Ben Hoffman
- Confluence
- Confluence Servers RCE 漏洞(CVE-2021-26084)分析
- Confluent Sigma
- confused
- ConfuserEx
- congon4tor
- Conic Finance attack
- conitrade-as
- Connect The Dots:1
- Connor McKinnon
- Conpot
- ConPtyShell:适用于 Windows 的反弹互式 shell工具
- consensys/smart-contract-best-practices
- consensys/surya
- Consistent Network Device Naming
- console
- Console 58
- Construct
- Constructing a high assurance mail guard
- Contact
- Contact GitHub Support
- ContactOut
- Contagio
- Container Ready Applications with Twelve-Factor App and Microservices Architecture
- Container security notes
- container-escape-check:容器逃逸检测脚本
- container-tracking (Cargo)
- Containing the Hype
- content-security-policy.com
- Continuous Chaos — Introducing Chaos Engineering into DevOps Practices
- Continuous Chaos in DevOps - Capital One
- Contract Diff Checker
- contract-diff.xyz
- contract-wizard.streamlit.app
- contractreader.io
- Contribute!
- Contributing
- Contributing & Code of Conduct
- Contributing Guide
- Contributing to Turbinia
- CONTRIBUTING.md
- Contribution
- Contribution Guidelines
- contributor guide
- Control D
- Control flow-based opcode behavior analysis for malware detection
- controlc
- CONTROLLED CHAOS WITH FAULT INJECTION TESTING
- Controller Area Network Prototyping with Arduino
- conversations
- Convert
- Convert Virtual Machine to Raw Images for Forensics (Qemu-Img)
- Convertcsv
- Converting an EXE to a DLL
- coofee
- cookbook.dev
- cookie attack
- Cookie AutoDelete
- Cookie same origin policy
- Cookie-stealer
- CookieCutter PyPackage
- cookiedecode
- Cookieless cookies
- Cookieless DuoDrop: IIS Auth Bypass & App Pool Privesc in ASP.NET Framework (CVE-2023-36899 & CVE-2023-36560)
- Cool OSINT blog
- cool:Golang Gin 框架写的免杀平台
- CoolApk
- CoolHandSquid
- CoolPlayer bypass DEP(CVE-2008-3408)分析
- coolstar/electra1131
- Cooolis-ms是一个包含了Metasploit Payload Loader、Cobalt Strike External C2 Loader、Reflective DLL injection的代码执行工具,它的定位在于能够在静态查杀上规避一些我们将要执行且含有特征的代码,帮助红队人员更方便快捷的从Web容器环境切换到C2环境进一步进行工作。
- Coowon
- COP 3530 Data Structures and Algorithms, Prof Sahni, UFL
- COP 5536 Advanced Data Structures, Prof Sahni - UFL
- copart (auction)
- Copy Scrape
- copybara-github
- Copying a large directory tree locally? cp or rsync?
- corCTF 2022 - sbxcalc
- corCTF 2023 - crabspace
- corCTF 2023 - force
- corCTF 2023 - pdf pal
- Core
- CORE – Aggregating the world’s open access research papers
- Core WebKit Classes
- core2ELF64:从内存中 dump 并恢复还原64位可执行ELF 程序
- coreb1t
- Coreboot
- CoreDNS Plugin
- Corelan's Exploit writing tutorial part 1 : Stack Based Overflows
- Corelan's Exploit writing tutorial part 1 : Stack Based Overflows
- Corelight CTF
- Corellium's M1 Branch
- Coremail任意文件上传漏洞POC,支持单个或者批量检测
- corentinj/real-time-voice-cloning
- CoreTrustDemo:macOS 12.3.1 上 CVE-2022-26766 的概念验证
- Cornell CS 1110 Introduction to Computing using Python fall 2020, by Walker White
- Cornell ECE 4960 Computational and Software Engineering spring 2017, by Edwin Kan
- Cornell ECE 5545 Machine Learning Hardware and Systems Spring 2022, by Mohamed Abdelfattah
- Cornell MAE 4710/5710 Applied Dynamics spring 2020, by Andy Ruina
- Cornell MAE 4730/5730 Intermediate Dynamics fall 2020, by Andy Ruina
- Cornell MATH 2940 Linear Algebra for Engineers spring 2009, by Andy Ruina
- cornershot:判断主机之间是否可访问以及对应端口状态,类似netspy
- Corporate Cybersecurity Management
- Corporate Information
- Corporate Reconnaissance
- Corporate Website
- Corporation Wiki
- Correctional Facility Design and Detailing
- Correctional Services Northern Territory
- Corrections Victoria
- Corrective Services Western Australia
- Corrosion:2
- Corsy
- cors安全完全指南
- cortantief
- cortesi
- Cortex documentation
- Cortex XSOAR
- Cortex-Analyzers 1.15.3 get ready for URLhaus and Cuckoo
- COS 226 Algorithms, Youtube, Princeton - by Robert Sedgewick and Kevin Wayne
- cosad3s
- Cosign
- cosminstefanxp
- cosmograph.app
- cosmos72/gomacro
- Couchbase
- Counteractive Playbooks
- countercept/volatility-plugins
- Countering entropy measure attacks on packed software detection
- country-ip-blocks
- Course on the Statistical Learning Theory, University of São Paulo, ICMC
- courses
- Court House Direct
- Court Listener
- CourtListener
- courtsystem.com
- Covenant
- coverage-frida
- coverage-pin
- Covering your BASH Shell Tracks- Anti-Forensics
- Coverity
- Covert vs overt vs side channels
- Covfefe
- CowlingBanana
- cowpatty
- Cowrie
- CPCS 663 - Real-Time Systems: Video Material - TAMU
- CPE
- cpendery
- cpholguera
- cppcheck
- CPSC 110 - Systematic Program Design [Racket], University of British Columbia
- CPSC 330: Applied Machine Learning (2020) - UBC
- CPSC 340: Machine Learning and Data Mining (2018) - UBC
- cpscan
- CptGibbon
- cpuu
- cq674350529
- Cr0wTom
- Cr7op
- Crack Station
- crackHashList:爆破fastjson1.2.42版本之后的hash黑名单
- Cracking & Keygen a crackme with x64dbg [Learning Cracking]
- Cracking a simple crackme & bypassing Anti-debugger protection with x64dbg [Learning Cracking]
- Cracking a simple Crackme with x64dbg [Learning cracking]
- Cracking Java’s RNG for CSRF - Javax Faces and Why CSRF Token Randomness Matters
- Cracking some Crackmes with x64dbg [Learning Cracking]
- Cracking the new Steam Stub drm with x64dbg [Learning Cracking]
- Cracking with IDA (redh@wk 2.5 crackme)
- crackle
- CrackMapExec
- Crackmes
- Crackmes.de
- crackmes.one
- crackmes.one
- CrackStop
- Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan
- Craiglist
- craigmarksmith
- Crane-Mocker
- Crash! Bang! Wallop! Practice makes perfect
- CravateRouge
- CrawlBox
- crayfish:更优美、更快速、更全面的渗透测试信息收集工具【闭源】
- crazycat256
- CrazyWolf13
- crc32fix
- crclark96
- Creased
- Create a Desktop Shortcut
- Create a new repository using this template
- Create a pass-phrased GPG master key and subkey
- Create a PE from scratch
- Create an Issue
- Create Provider Guide
- Create SSH-Public/Private-Keys
- create_blob
- creately
- CreateUser:绕过360,火绒添加用户
- Creating a Code Review Culture
- Creating a repository
- creating an issue on GitHub
- Creating Monitoring Dashboards
- Creating signed and customized backdoored macos apps
- Creating the perfect GPG keypair (2013)
- Creative Commons
- CreatureToadz attack
- CredCrack
- Creddump
- Credit Card Fraud
- Credits
- credmap
- CredSniper
- credstash
- creepy
- crifan/android_app_security_crack
- Crime Mapping
- Crime Reports
- Criminal IP
- criminalip.io
- Crimol
- Crims-on
- CrimsonGlory
- Crinkler
- Crips
- cript0nauta
- CRISC - Certified in Risk and Information Systems Control
- Cristian Grigoriu - @crgr
- Critical Windows Event ID's to Monitor
- Crivo
- CRKatri/trustcache
- CRLF Injection
- Crlfuzz
- CrohnEngineer
- crolopez
- cron
- cron2
- crondaemon
- Cronos-Rootkit:适用于 Windows10和11的进程保护、隐藏和权限提升工具
- cross
- Cross Site Request Forgery (CSRF)
- Cross Site Scripting (XSS)
- Cross Site Scripting and Hacking Websites
- Cross-site Request Forgery Attack Lab
- Cross-Site Scripting – Application Security – Google
- Cross-site scripting (XSS) cheat sheet
- Cross-site Scripting Attack Lab
- CrossC2
- Crossfilter
- Crossing The Bridge
- CrossNet-Beta:红队行动中利用白利用、免杀、自动判断网络环境生成钓鱼可执行文件
- Crowd Tangle
- CrowdMap
- CrowdScrape
- CrowdSec
- CrowdSec Academy
- crowdstrike/automactc
- crowdstrike/forensics
- crowell
- Crowley723
- crssi
- crt
- crt.sh
- Crt.sh
- Crt.sh Database (favorite) or Crt.sh HTTP API
- Cruise Mapper
- cruise.supremacy.team
- crumb
- Crunch
- CrunchBase
- Crusin
- Cryakl
- cryps1s/darksurgeon
- Crypt0-M3lon
- crypt0g30rgy
- crypt0rr
- cryptaddress.vercel.app
- cryptax/androidre
- Cryptbot sample
- CryptExec
- CRYPTO & DATA ERASURE: After forensic analysis drives should be securely wiped | By Paul Katzoff
- Crypto Investigation and Forensics
- Crypto Scam Investigation Using SpiderFoot HX For OSINT Automation
- Crypto-Cat
- crypto-correlation
- CryptoAddrs
- CryptoAPI PoC CVE-2020-0601
- CryptoBank:1
- cryptoblacklist.io
- CryptoCTF
- Cryptocurrencies OSINT
- cryptocurrencies-exchangers-wallets-and-explorers
- Cryptocurrency and NFT OSINT Investigations Tips & Techniques
- Cryptocurrency Engineering and Design - Spring 2018 - MIT
- Cryptocurrency Investigations 101
- Cryptocurrency OSINT
- cryptocurrency search OSINT tool
- CryptocurrencyAlerting
- cryptofees.info
- cryptoflows.info
- Cryptographic Keys
- Cryptographic processors – a survey
- Cryptography
- Cryptography and Network Security - IIT Kharagpur
- Cryptography: A Sharp and Fragile Tool (from Saydjari's book)
- CryptoHack
- cryptolok/aslray
- CryptoLyzer
- CryptOMG
- cryptopals
- cryptoscamdb.org
- cryptosheets.com
- CryptoShine Twitter
- cryptostats.community
- cryptotxalert
- cryptowat.ch
- crysal
- crystalblockchain.com
- Crytome
- CS 053 - Coding the Matrix - Brown University
- CS 10 - The Beauty and Joy of Computing - Spring 2015 - Dan Garcia - UC Berkeley InfoCoBuild
- CS 101 - Introduction to Computer Science - Udacity
- CS 106A - Programming Methodology, Stanford University
- CS 106B - Programming Abstractions, Stanford University
- CS 106L - Standard C++ Programming
- CS 106X - Programming Abstractions in C++
- CS 107 - Programming Paradigms, Stanford University
- CS 109 Data Science, Harvard University
- CS 124 - From Languages to Information - Stanford University
- CS 1301 Intro to computing - Gatech
- CS 144 Introduction to Computer Networking - Stanford University, Fall 2013
- CS 15-458/858: Discrete Differential Geometry - Carnegie Mellon University - Spring 2021
- CS 155 - Machine Learning & Data Mining, 2023 - Caltech
- CS 156 - Learning from Data, Caltech
- CS 159 Advanced Topics in Machine Learning, Spring 2021 - Caltech
- CS 159 Data-Driven Algorithm Design - Caltech
- CS 161 - Design and Analysis of Algorithms, Prof. Tim Roughgarden, Stanford University
- CS 161: Computer Security, UC Berkeley
- CS 162 Operating Systems and Systems Programming, Spring 2015 - University of California, Berkeley
- CS 164 Hack your language, UC Berkeley
- CS 164 Software Engineering - Harvard
- CS 168 Introduction to the Internet: Architecture and Protocols, Fall 2022 - UC Berkeley
- CS 170 Algorithms - UCBerkeley
- CS 173 Programming Languages, Brown University
- CS 186 - Database Systems, UC Berkeley, Spring 2015
- CS 188 - Introduction to Artificial Intelligence, UC Berkeley - Spring 2024
- CS 189/289A Introduction to Machine Learning, Prof Jonathan Shewchuk - UCBerkeley
- CS 193p - Developing Applications for iOS, Stanford University
- CS 198-126: Modern Computer Vision Fall 2022 (UC Berkeley)
- CS 205A: Mathematical Methods for Robotics, Vision, and Graphics (Fall 2013)
- CS 206 Evolutionary Robotics Course Spring 2020
- CS 223A - Introduction to Robotics, Stanford University
- CS 224 - Advanced Algorithms, Harvard University
- CS 224N - Natural Language Processing, Stanford University
- CS 224N -Natural Language Processing with Deep Learning - Stanford University
- CS 229 - Machine Learning - Stanford University
- CS 229br Advanced Topics in the theory of machine learning, Spring 2021 - Harvard
- CS 229r - Algorithms for Big Data, Harvard University
- CS 231n - Convolutional Neural Networks for Visual Recognition, Stanford University
- CS 251 - Intermediate Software Design (C++ version) - Vanderbilt University
- CS 251 (2015): Intermediate Software Design
- CS 253 Web Security - Stanford University
- CS 261 - A Second Course in Algorithms, Stanford University
- CS 267 Applications of Parallel Computers, Spring 18 - UC Berkeley
- CS 270. Combinatorial Algorithms and Data Structures, Spring 2021
- CS 281B - Scalable Machine Learning, Alex Smola, UC Berkeley
- CS 282 (2014): Concurrent Java Network Programming in Android
- CS 285 - Deep Reinforcement Learning- UC Berkeley
- CS 285: Deep RL, 2023
- CS 287 - Advanced Robotics, Fall 2011, UC Berkeley
- CS 290 DataMining Lectures
- CS 294 112 - Reinforcement Learning
- CS 330 - Deep Multi-Task and Meta Learning - Fall 2019 - Stanford University
- CS 3650 - Computer Systems - Fall 2020 - Nat Tuck - NEU
- CS 374 - Algorithms & Models of Computation (Fall 2014), UIUC
- CS 377 - Operating Systems, Fall 16 - Umass OS
- CS 411 - Software Architecture Design - Bilkent University
- CS 412 - Introduction to Data Mining - UIUC
- CS 421 - Programming Languages and Compilers, UIUC
- CS 436 - Distributed Computer Systems - U Waterloo
- CS 4400 – Computer Systems Fall 2016 - UoUtah
- CS 4414 - Operating Systems, University of Virginia (rust-class)
- CS 4414 Operating Systems, Fall 2018 - University of Virginia
- CS 446 - Machine Learning, Fall 2016, UIUC
- CS 468 - Differential Geometry for Computer Science - Stanford University
- CS 473 - Algorithms - University of Illinois at Urbana-Champaign
- CS 4789/5789: Introduction to Reinforcement Learning - Cornell
- CS 480/680 Introduction to Machine Learning, Gautam Kamath, University of Waterloo
- CS 480/680 Introduction to Machine Learning, Kathryn Simone, University of Waterloo
- CS 4804: Introduction to Artificial Intelligence, Fall 2016
- CS 485/685 Machine Learning, Shai Ben-David, University of Waterloo
- CS 50 - Introduction to Computer Science, Harvard University
- CS 512 - Data Mining Principles - UIUC
- CS 5140/6140 - Data Mining, Spring 2020, University of Utah by Prof. Jeff Phillips
- CS 5140/6140 - Data Mining, Spring 2023, University of Utah by Prof. Ana Marasović
- CS 5150 - Software Engineering, Fall 2014 - Cornell University
- CS 5350/6350 - Machine Learning, Spring 2024, University of Utah
- CS 543 - Computer Vision – Spring 2017
- CS 5530 - Database Systems, Spring 2016 - University of Utah
- CS 5630/6630 - Visualization, Fall 2016, University of Utah
- CS 577 - Operating Systems, Spring 20 - Umass OS
- CS 5804: Introduction to Artificial Intelligence, Spring 2015
- CS 5955/6955 - Data Mining, University of Utah
- CS 6120: Advanced Compilers: The Self-Guided Online Course - Cornell University
- CS 6150 - Advanced Algorithms (Fall 2016), University of Utah
- CS 6150 - Advanced Algorithms (Fall 2017), University of Utah
- CS 6190 - Probabilistic Modeling, Spring 2016, University of Utah
- CS 61A - Structure and Interpretation of Computer Programs [Python], UC Berkeley
- CS 61B - Data Structures (Java) - UC Berkeley
- CS 61C - Machine Structures, UC Berkeley Spring 2015
- CS 6340/5340 - Natural Language Processing - University of Utah - Spring 2024
- CS 6530 - Graduate-level Database Systems, Fall 2016, University of Utah
- CS 677 - Distributed Operating Systems, Spring 24 - Umass OS
- CS 6785 - Deep Generative Models - Cornell Tech, Spring 2023)
- CS 695: Virtualization and Cloud Computing - IIT Bombay -Spring 2021
- CS 6955 - Clustering, Spring 2015, University of Utah
- CS 75 Building Dynamic Websites - Harvard University
- CS 886: Recent Advances on Foundation Models Winter 2024 - University of Waterloo
- CS S-76 Building Mobile Applications - Harvard
- CS Theory Toolkit at CMU 2020
- CS-224 - Computer Organization, 2009-2010 Spring, Bilkent University
- CS-E4740 - Federated Learning, Spring 2023, Aalto University
- cs-get-last-error:适用于 CS 的Windows 错误代码查询cna 脚本
- CS-Loader-cobalt strike免杀生成
- CS-Remote-OPs-BOF:通过CS 的远程BOF 文件来实现各种实用功能
- CS-Situational-Awareness-BOF:大量已经编译好的 CS 信标文件
- cs-token-vault:此CS BOF 文件为窃取来/重复的Windows访问令牌创建内存存储
- CS/ECE 3810 Computer Organization, Fall 2015, , University of Utah
- CS/ECE 6810 Computer Architecture, Spring 2016, University of Utah
- cs01/gdbgui
- CS1 - Higher Computing - Richard Buckland UNSW
- CS110: Principles of Computer Systems - Stanford
- CS121 - Introduction to Relational Database Systems, Fall 2016 - Caltech
- CS122 - Relational Database System Implementation, Winter 2014-2015 - Caltech
- CS122d - NoSQL Data Management (Spring 21) - Prof. Mike Carey - UC Irvine
- CS124 Operating Systems - California Institute of Technology, Fall 2018 - Youtube
- CS147 - Introduction to Human-Computer Interaction Design - Stanford
- CS149 Introduction to Embedded Systems - Spring 2011 - UCBerkeley
- CS176 - Multiprocessor Synchronization - Brown University
- CS194 Advanced Operating Systems Structures and Implementation, Spring 2013 InfoCoBuild, UC Berkeley
- CS2 - Data Structures and Algorithms - Richard Buckland - UNSW
- CS221: Artificial Intelligence: Principles and Techniques - Autumn 2019 - Stanford University
- CS224U: Natural Language Understanding - Spring 2019 - Stanford University
- CS224w – Social Network Analysis – Autumn 2017 - Stanford University
- CS224W Machine Learning with Graphs | Spring 2021 | Stanford University
- CS225 - Data Structures - University of Illinois at Urbana-Champaign
- CS230: Deep Learning - Autumn 2018 - Stanford University
- CS231n Deep Learning for Computer Vision - Winter 2016 Andrej Karpathy - Stanford University
- CS234: Reinforcement Learning - Spring 2024 - Stanford University
- CS235 - Applied Robot Design for Non-Robot-Designers - Stanford University
- CS246 - Mining Massive Data Sets, Winter 2016, Stanford University
- CS264 Beyond Worst-Case Analysis, Fall 2014 - Tim Roughgarden Lecture
- CS273a: Introduction to Machine Learning
- CS287 Advanced Robotics at UC Berkeley Fall 2019 -- Instructor: Pieter Abbeel
- CS294 - Program Synthesis for Everyone
- CS294 Deep Unsupervised Learning Spring 2024
- CS294-112, Deep Reinforcement Learning Sp17
- CS294-129 Designing, Visualizing and Understanding Deep Neural Networks
- CS294-158 Deep Unsupervised Learning SP19
- cs2modrewrite:将 Cobalt Strike 配置文件转换为 modrewrite 脚本
- CS3 - Design in Computing - Richard Buckland UNSW
- CS322 - Introduction to Artificial Intelligence, Winter 2012-13 - UBC
- CS361 - COMPUTER SYSTEMS - UIC
- CS364A Algorithmic Game Theory, Fall 2013 - Tim Roughgarden Lectures
- CS364B Advanced Mechanism Design, Winter 2014 - Tim Roughgarden Lectures
- CS388: Natural Language Processing - UT Austin
- CS391L Machine Learning, Spring 2025 - UT Austin
- CS461/ECE422 - Computer Security - University of Illinois at Urbana-Champaign
- CS4780/5780 Machine Learning, Fall 2013 - Cornell University
- CS4780/5780 Machine Learning, Fall 2018 - Cornell University
- CS498ABD - Algorithms for Big Data - UIUC, Fall 2020
- CS50 - Introduction to Artificial Intelligence with Python (and Machine Learning), Harvard OCW
- CS50's Introduction to Game Development
- CS50's Understanding Technology
- CS50's Web Programming with Python and JavaScript
- CS50R - Introduction to Programming with R
- CS581 Theory of Computation - Portland State University
- CS60025 Algorithmic Game Theory - IIT KGP - Winter 2020
- CS60083 Parameterized Algorithms - IIT KGP
- CS60094 Computational Number Theory
- CS6038/CS5138 Malware Analysis
- CS7015 - Deep Learning - Prof. Mitesh M. Khapra - IIT Madras
- CS773: Computer Architecture for Performance and Security - IIT Bombay
- CS798: Mathematical Foundations of Computer Networking - University of Waterloo
- CS885 Reinforcement Learning - Spring 2018 - University of Waterloo
- csababarta/ntdsxtract
- csababarta/volatility_plugins
- CSAF/CSAF VEX
- CSAgent:CobaltStrike 4.x通用白嫖及汉化加载器
- CSAW
- CSAW 2021 - gatekeeping
- CSAW CTF
- CSAW CTF 2018 Qual - SSO
- csbruter-爆破Cobalt Strike的服务端密码
- CSC 253 - CPython internals: A ten-hour codewalk through the Python interpreter source code, University of Rochester
- CSC Play on Demand
- CSCE 585 - Machine Learning Systems, University of South Carolina
- CSCGuard
- cschwartz
- CSCI 3110 Advanced Topics in Web Development, Fall 2011 - ETSU iTunes
- CSCI 4974/6974 - Spring '14 Hardware Reverse Engineering
- CSCI 4976 - Fall '15 Malware Analysis
- CSCI 5710 e-Commerce Implementation, Fall 2015 - ETSU iTunes
- CSE 138 - Distributed Systems - UC Santa Cruz, Spring 2020
- CSE 142 Computer Programming I (Java Programming), Spring 2016 - University of Washington
- CSE 199 - How the Internet Works, Fall 2016 - University of Buffalo
- CSE 30341 - Operating Systems, Spr 2008
- CSE 331 Introduction to Algorithm Design and Analysis, SUNY University at Buffalo, NY - Fall 2017
- CSE 351 - The Hardware/Software Interface, Spring 16 - University of Washington
- CSE 373 - Analysis of Algorithms, Stony Brook - Prof Skiena
- CSE 373 - Data Structures and Algorithms, Winter 2024 - University of Washington
- CSE 421/521 - Introduction to Operating Systems, SUNY University at Buffalo, NY - Spring 2016
- CSE 446/546 - Machine Learning, Spring 2020 - University of Washington
- CSE 447/517 - Natural Language Processing - University of Washington - Winter 2024
- CSE 478 – Autonomous Robotics – Winter 2025 - University of Washington
- CSE 490H - Scalable Systems: Design, Implementation and Use of Large Scale Clusters, Autumn 2008 - University of Washington
- CSE 542: Reinforcement Learning - Spring 2024 - University of Washington
- CSE 547 Discrete Mathematics, Prof Skiena, University of Stony Brook
- CSE 571 – AI-Robotics – Spring 2023 - University of Washington
- CSE 579: Reinforcement Learning - Autumn 2024 - University of Washington
- CSE 592 Applications of Artificial Intelligence, Winter 2003 - University of Washington
- CSE 60641 - Graduate Operating Systems, Fall 08
- CSE P 506 – Concurrency, Spring 2011 - University of Washington
- cse-ocd
- CSE/ECE 474 Introduction to Embedded Systems - University of Washington
- CSE154 - Web Programming, Spring 2020 - University of Washington
- CSE341 - Programming Languages, Dan Grossman, Spring 2013 - University of Washington
- CSE474/574 Introduction to Machine Learning - SUNY University at Buffalo
- CSE519 - Data Science Fall 2016 - Skiena, SBU
- CSE549 - Computational Biology - Steven Skiena - 2010 SBU
- cseagle
- cseagle/sk3wldbg
- CSEP 501 - Compiler Construction, University of Washington
- CSEP 505 Programming Languages, Winter 2015 - University of Washington
- CSEP 510 - Human Computer Interaction
- CSEP 521 - Applied Algorithms, Winter 2013 - University of Washington
- CSEP 524 - Parallel Computation - University of Washington
- CSEP 544, Database Management Systems, Au 2015 - University of Washington
- CSEP 546, Data Mining - Pedro Domingos, Sp 2016 - University of Washington
- CSEP 548 - Computer Architecture Autumn 2012 - University of Washington
- CSEP 551 Operating Systems Autumn 2014 - University of Washington
- CSEP 552 - PMP Distributed Systems, Spring 2013 - University of Washington
- CSEP 561 - PMP Network Systems, Fall 2013 - University of Washington
- CSEP 561 – Network Systems, Autumn 2008 - University of Washington
- CSEP545 - Transaction Processing for E-Commerce, Winter 2012 - University of Washington
- CSEP590A - Practical Aspects of Modern Cryptography, Winter 2011 - University of Washington
- csharp-ShellcodeLoader:基于csharp实现的免杀shellcode加载器
- CSharp-Tools:CSharp工具集
- CSI Linux
- CSIRT.MAI
- CSMB_PTH:基于SMB协议进行windows主机远程命令执行的工具 使用纯C进行SMB协议包的构造,实现哈希传递,类似Impacket的实现方式。无回显
- CSN08704 - Telecommunications - Bill Buchanan - Edinburgh Napier
- CSN09112 - Network Security and Cryptography - Bill Buchanan - Edinburgh Napier
- CSN10107 - Security Testing and Network Forensics - Bill Buchanan - Edinburgh Napier
- CSN11117 - e-Security - Bill Buchanan - Edinburgh Napier
- CSN11123 - Advanced Cloud and Network Forensics - Bill Buchanan - Edinburgh Napier
- CSN11128 - Incident Response and Malware Analysis - Bill Buchanan - Edinburgh Napier
- CsomePro
- csOnvps:CobaltStrike4.4 一键部署脚本
- CSP Docs
- csp evaluator
- CSP Scanner
- csp-analyzer
- CSP, SRI and CORS
- CSP: bypassing form-action with reflected XSS
- cspbypass.com
- Csper
- csploit/android
- cspoilt
- Csrf
- CSS Is So Overpowered It Can Deanonymize Facebook Users
- CSS-Exchange_微软自家出品的Exchange server检查工具
- CSS-Keylogging
- CSSE490 Android Development Rose-Hulman Winter 2010-2011, Dave Fisher
- csunny
- csurf
- CSV Injection -> Meterpreter on Pornhub
- csvkit
- CSWSH
- CSx824/ECEx242 Machine Learning, Bert Huang, Fall 2015 - Virginia Tech
- CS基础
- CT 310 Web Development - Colorado State University
- Ct-exposer
- ct-jaryn
- ctags
- CTCaer
- ctdhr
- CTF Challenge
- CTF Cheatsheet
- CTF Example – Forensics
- CTF Field Guide
- CTF KFIOFAN:2
- CTF Learn
- CTF Resources
- CTF Time
- CTF Tools
- CTF write-ups (community)
- ctf_import
- ctf-challenges
- ctf-tools
- CTF-Writeups
- CTF101
- CTFchallenge
- CTFd
- CTFd/config.ini
- CTForge
- CTFTime Scrapper
- ctftool
- CTFZone 2019 qual - Catcontrol
- CTF取证方法总结
- CTLRQ Address Lookup
- ctrlsam
- CTSearch
- CTU-13 Dataset
- cube: 内网渗透测试工具,弱密码爆破、信息收集和漏洞扫描
- cube0x8/chrome_ragamuffin
- Cuckoo & Linux Subsystem: Some Love for Windows 10
- Cuckoo Sandbox
- Cuckoo Sandbox Setup Tutorial
- CuckooDroid
- cuckoosandbox/community
- cuckoosandbox/cuckoo
- cuckoosandbox/monitor
- cueo
- cugu
- cugu/apfs.ksy
- cugu/awesome-forensics
- CuiRi:一款红队专用免杀木马生成器,基于shellcode生成绕过所有杀软的木马
- cujanovic
- Cupidcr4wl
- cupp
- Curated list of Ethereum infographics
- Curated list of Security Talks and Videos
- cure53
- cure53/HTTPLeaks
- Curiefense
- curl
- CURL ERROR: Recv failure: Connection reset by peer - PHP Curl
- Current security threat landscape in robotics
- CursedChrome:Chrome扩展植入程序,可将受害Chrome浏览器转变为功能齐全的HTTP代理,使你能够以受害人身份浏览网站
- Curve attack
- Curve25519
- CurveBall:CVE-2020-0601 ECC证书欺骗漏洞利用工具
- cushon
- custom extensions
- Custom PoC Query Rule
- Custom YARA Rules
- Customer Stories
- Cutter - Free and Open Source RE Platform powered by radare2
- cvandeplas/elk-forensics
- CVE
- CVE Crowd
- CVE Details
- CVE Trends
- CVE-2003-0127
- CVE-2003-0961
- CVE-2007-1860: mod_jk double-decoding
- CVE-2008-1930: Wordpress 2.5 Cookie Integrity Protection Vulnerability
- CVE-2012-????
- CVE-2012-1823: PHP CGI
- CVE-2012-2661: ActiveRecord SQL injection
- CVE-2012-3137
- CVE-2012-6081: MoinMoin code execution
- CVE-2013-2251
- CVE-2014-6271/Shellshock
- CVE-2016-3088
- CVE-2016-5195
- CVE-2017-1000353
- CVE-2017-2446 or JSC::JSGlobalObject::isHavingABadTime.
- CVE-2017-5638
- CVE-2018-0743
- CVE-2018-1000861
- CVE-2018-1000861, CVE-2019-1003005 and CVE-2019-1003029-jenkins-rce
- CVE-2018-1038
- CVE-2018-4878-Adobe-Flash-DRM-UAF-0day
- CVE-2018-6924: FreeBSD ELF Header Parsing Kernel Memory Disclosure
- CVE-2018-6924:解析FreeBSD ELF 头导致内核内存泄露
- CVE-2018-7600
- CVE-2018-8120
- CVE-2018-8440
- CVE-2018-8453
- CVE-2018-8639
- CVE-2018-8897
- CVE-2019-0604
- CVE-2019-0803
- CVE-2019-10758-mongo-express before 0.54.0 is vulnerable to Remote Code Execution
- CVE-2019-11708
- CVE-2019-12103 使用Ghidra分析TP-Link M7350上的预认证RCE
- CVE-2019-12103 – Analysis of a Pre-Auth RCE on the TP-Link M7350, with Ghidra!
- CVE-2019-12409_Apache_Solr RCE
- CVE-2019-1253-Windows权限提升漏洞-AppXSvc任意文件安全描述符覆盖EoP的另一种poc
- CVE-2019-1257
- CVE-2019-1306: ARE YOU MY INDEX?
- CVE-2019-13272:Linux 4.10 < 5.1.17 PTRACE_TRACEME local root
- CVE-2019-1388: Windows UAC权限提升漏洞
- CVE-2019-1405和CVE-2019-1322:通过组合漏洞进行权限提升 Microsoft Windows 10 Build 1803 < 1903 - 'COMahawk' Local Privilege Escalation
- CVE-2019-1458-Win32k中的特权提升漏洞【shell可用-Windows提取】
- CVE-2019-16941: NSA Ghidra工具RCE漏洞
- CVE-2019-17556-unsafe-deserialization-in-apache-olingo(Apache Olingo反序列化漏洞,影响: 4.0.0版本至4.6.0版本)
- cve-2019-17558-apache solr velocity 注入远程命令执行漏洞
- CVE-2019-17564 : Apache Dubbo反序列化漏洞
- CVE-2019-18935
- CVE-2019-19634-class.upload.php <= 2.0.4任意文件上传
- CVE-2019-19781
- CVE-2019-19781-Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway
- CVE-2019-19781.nse---use Nmap check Citrix ADC Remote Code Execution
- CVE-2019-19844-Django重置密码漏洞(受影响版本:Django master branch,Django 3.0,Django 2.2,Django 1.11)
- CVE-2019-2107-Android播放视频-RCE-POC(Android 7.0版本,7.1.1版本,7.1.2版本,8.0版本,8.1版本,9.0版本)
- CVE-2019-2725(CNVD-C-2019-48814、WebLogic wls9-async)
- CVE-2019-6453
- CVE-2020-0618: 微软 SQL Server Reporting Services远程代码执行(RCE)漏洞
- CVE-2020-0674: Internet Explorer远程代码执行漏洞检测
- CVE-2020-0674:Internet Explorer UAF 漏洞exp【在64位的win7测试了IE 8, 9, 10, and 11】
- CVE-2020-0683-利用Windows MSI “Installer service”提权
- CVE-2020-0688
- CVE-2020-0688:微软EXCHANGE服务的远程代码执行漏洞
- CVE-2020-0728-Windows Modules Installer Service 信息泄露漏洞
- CVE-2020-0767Microsoft ChakraCore脚本引擎【Edge浏览器中的一个开源的ChakraJavaScript脚本引擎的核心部分】安全漏洞
- CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost
- CVE-2020-0796 Local Privilege Escalation POC-python版本
- CVE-2020-0932
- CVE-2020-10199、CVE-2020-10204漏洞一键检测工具,图形化界面(Sonatype Nexus <3.21.1)
- CVE-2020-10238【JoomlaRCE <= 3.9.15 远程命令执行漏洞(需要有效的账号密码)】&CVE-2020-10239【JoomlaRCE 3.7.0 to 3.9.15 远程命令执行漏洞(需要有效的账号密码)】
- CVE-2020-10560
- CVE-2020-10673-jackson-databind JNDI注入导致远程代码执行
- CVE-2020-10713-GRUB2 本地代码执行漏洞
- CVE-2020-11651
- CVE-2020-11651-SaltStack Proof of Concept【认证绕过RCE漏洞】
- CVE-2020-11890 JoomlaRCE <3.9.17 远程命令执行漏洞(需要有效的账号密码)
- CVE-2020-12695-UPnP 安全漏洞
- CVE-2020-12753-LG 智能手机任意代码执行漏洞
- CVE-2020-1301
- CVE-2020-1313-Microsoft Windows Update Orchestrator Service权限提升漏洞,可用于Windows提权操作,支持新版的Windows server 2004
- CVE-2020-1337-exploit-Windows 7/8/10上Print Spooler组件漏洞修复后的绕过
- CVE-2020-1350
- CVE-2020-1350-DoS
- CVE-2020-1350-Windows的DNS服务器RCE检测的powershell脚本
- CVE-2020-1362-Microsoft Windows WalletService权限提升漏洞
- CVE-2020-13935-Tomcat的WebSocket安全漏洞可导致拒绝服务攻击
- CVE-2020-14645-WebLogic 远程代码执行漏洞
- CVE-2020-1472: NetLogon特权提升漏洞(接管域控制器)
- CVE-2020-14882_Exploit_Gui:Weblogic 未授权命令执行漏洞GUI 利用工具
- CVE-2020-16898检测工具
- CVE-2020-17519-Apache Flink 目录遍历漏洞批量检测
- CVE-2020-1947-Apache ShardingSphere UI YAML解析远程代码执行漏洞
- CVE-2020-1948 : Apache Dubbo 远程代码执行漏洞
- CVE-2020-2546,CVE-2020-2915 CVE-2020-2801 CVE-2020-2798 CVE-2020-2883 CVE-2020-2884 CVE-2020-2950 WebLogic T3 payload exploit poc python3
- CVE-2020-2551
- CVE-2020-2555-Oracle Coherence 反序列化漏洞
- CVE-2020-2555:WebLogic RCE漏洞POC
- CVE-2020-2696 – Local privilege escalation via CDE dtsession
- CVE-2020-36179-Jackson-databind SSRF&RCE
- CVE-2020-3992 & CVE-2021-21974: Pre-Auth Remote Code Execution in VMware ESXi
- cve-2020-5260-Git凭证泄露漏洞
- CVE-2020-5398 - RFD(Reflected File Download) Attack for Spring MVC
- CVE-2020-5410 Spring Cloud Config目录穿越漏洞
- CVE-2020-5504-phpMyAdmin注入(需要登录)
- CVE-2020-5509-Car Rental Project 1.0版本中存在远程代码执行漏洞
- CVE-2020-5902-F5 BIG-IP 远程代代码执行(RCE)&任意文件包含读取
- CVE-2020-6287-SAP NetWeaver AS JAVA 授权问题漏洞-创建用户EXP
- CVE-2020-7246-PHP项目管理系统qdPM< 9.1 RCE
- CVE-2020-7471-django1.11-1.11.282.2-2.2.103.0-3.0.3 StringAgg(delimiter)使用了不安全的数据会造成SQL注入漏洞环境和POC
- CVE-2020-7961
- CVE-2020-8163 - Remote code execution of user-provided local names in Rails
- CVE-2020-8193-Citrix未授权访问任意文件读取
- cve-2020-8634&cve-2020-8635
- CVE-2020-8813-Cacti v1.2.8 RCE远程代码执行 EXP以及分析(需要认证/或开启访客即可不需要登录)(一款Linux是基于PHP,MySQL,SNMP及RRDTool开发的网络流量监测图形分析工具)
- CVE-2020-8840:Jackson-databind远程命令执行漏洞(或影响fastjson)
- CVE-2020-9547:FasterXML/jackson-databind 远程代码执行漏洞
- CVE-2020-9548:FasterXML/jackson-databind 远程代码执行漏洞
- CVE-2020–1088: Windows wersvc.dll 任意文件删除本地提权漏洞分析
- CVE-2021-1732 Windows 本地权限提升漏洞
- CVE-2021-1965
- CVE-2021-21234:Spring Boot 目录遍历
- CVE-2021-21300:Git符号链接代码执行漏洞
- CVE-2021-21315-PoC-Node.js组件systeminformation代码注入漏洞
- CVE-2021-21972 vCenter 6.5-7.0 RCE 漏洞分析
- CVE-2021-21972-任意文件上传
- CVE-2021-21978- VMware View Planner Harness 4.X 未授权任意文件上传至RCE
- CVE-2021-21985:VMware vCenter Server远程代码执行漏洞
- CVE-2021-22005:VMware vCenter Server任意文件上传漏洞
- CVE-2021-22205:gitlab ce 文件上传 ExifTool导致命令执行 的 RCE 漏洞
- CVE-2021-22986-F5 BIG-IP 远程代码执行漏洞EXP
- CVE-2021-23132-Joomla! 目录遍历导致 RCE 漏洞EXP
- CVE-2021-24499:Workreap Theme 小于2.2.1 未授权任意文件上传导致 RCE
- CVE-2021-26086 :Atlassian Jira Server/Data Center 8.4.0 File Read 漏洞
- CVE-2021-26295-POC
- CVE-2021-26855_PoC
- CVE-2021-26855-ssrf通过golang实现,可读取邮件标题,id,FQND以及下载邮件功能
- CVE-2021-30632:chrome V8越界写入漏洞可至内存损坏
- CVE-2021-31166:HTTP协议栈远程代码执行漏洞
- CVE-2021-31805:S2-062 Apache Struts2 远程代码执行漏洞
- CVE-2021-33044、CVE-2021-33045 大华摄像头POC
- CVE-2021-33739
- CVE-2021-34473:Microsoft Exchange Server Remote Code Execution
- CVE-2021-34527
- CVE-2021-3493:Ubuntu OverlayFS Local Privesc
- CVE-2021-36260:海康威视产品命令注入漏洞
- CVE-2021-36260:海康威视命令注入漏洞
- CVE-2021-36934 (HiveNightmare/SeriousSAM)
- CVE-2021-37580:Apache ShenYu权限认证绕过
- CVE-2021-37980:Google Chrome 沙箱漏洞 POC
- CVE-2021-40444:Windows MSHTML 0day漏洞
- CVE-2021-40539:ManageEngine ADManager Plus 未授权访问RCE
- CVE-2021-41277:Metabase 敏感信息泄露
- CVE-2021-41773 CVE-2021-42013漏洞批量检测工具:Apache 2.4.49 和 2.4.50版本任意文件读取和命令执行漏洞绕过利用工具
- CVE-2021-42321:微软Exchange Server远程代码执行漏洞(需要省份验证)
- CVE-2021-43297:Apache Dubbo Hessian2异常处理时的反序列化
- CVE-2021-44228 (Apache Log4j Remote Code Execution)
- CVE-2021-44228-PoC-log4j-bypass-words
- cve-2021-45232-exp:Apache apisix dashboard unauthcation rce
- CVE-2022-0185:Linux 内核漏洞可导致逃逸Kubernetes中的容器
- CVE-2022-0332:Moodle 3.11 to 3.11.4 - SQL injection
- CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera:chrome 内核系列浏览器泄露环境变量漏洞
- CVE-2022-0540:Atlassian Jira Seraph Authentication Bypass RCE
- CVE-2022-0543:Redis Lua沙盒绕过命令执行
- CVE-2022-0778:openssh DOS 漏洞
- CVE-2022-0847:Linux Dirty Pipe 内核提权漏洞
- CVE-2022-0995:Linux 内核watch_queue内存损坏导致代码执行
- CVE-2022-1015:Linux 权限提升漏洞
- CVE-2022-1040:Sophos XG115w 防火墙 17.0.10 MR-10 - 身份验证绕过
- CVE-2022-1388-EXP:CVE-2022-1388 F5 BIG-IP RCE 批量检测
- CVE-2022-20866:思科自适应安全设备软件和 Firepower 威胁防御软件 RSA 私钥泄漏检查
- CVE-2022-21371:Oracle WebLogic Server LFI
- CVE-2022-21587:Oracle E-Business Suite 未授权RCE
- CVE-2022-2185:gitlab 远程代码执行(需要身份验证)
- CVE-2022-21894:Windows Secure Boot 绕过漏洞
- CVE-2022-21907
- CVE-2022-22639:MAC 权限提升漏洞
- CVE-2022-22947:Spring Cloud Gateway远程代码执行
- CVE-2022-22954-VMware-RCE:VMware Workspace ONE Access RCE
- CVE-2022-22963:Spring-cloud-function-SpEL-RCE
- CVE-2022-22965-POC:CVE-2022-22965 spring-core批量检测脚本
- CVE-2022-22965:spring mvc RCE 的分析
- CVE-2022-22972:VMware 身份验证绕过漏洞
- CVE-2022-22978:Spring Security身份认证绕过漏洞
- cve-2022-23131:zabbix-saml-bypass-exp
- CVE-2022-24122的验证型 payload
- CVE-2022-24734: MyBB论坛后台 RCE
- CVE-2022-25237:Bonitasoft Platform 从认证绕过到RCE
- CVE-2022-25372:Local Privilege Escalation In Pritunl VPN Client
- CVE-2022-25636:Linux kernel越界写入漏洞
- CVE-2022-26133:Atlassian Bitbucket Data Center 反序列化漏洞批量验证和利用
- CVE-2022-26134:Confluence OGNL 注入RCE漏洞
- cve-2022-26809:RPC 高危漏洞
- CVE-2022-27666:Linux local privilege escalation
- CVE-2022-27925-PoC:Zimbra Collaboration 存在路径穿越漏洞最终导致RCE
- CVE-2022-28281:Firefox 越界写入漏洞
- CVE-2022-28346:DjangoSQL注入QuerySet.annotate(), aggregate(), and extra()环境
- CVE-2022-28672: Foxit PDF Reader Remote Code Execution Exploit
- CVE-2022-29968:Linux内核版本号码低于或等于5.17.5 kiocb fs/io_uring.c io_rw_init_file初始化漏洞
- CVE-2022-30075:Tp-Link Archer AX50 Authenticated RCE
- CVE-2022-30190:Microsoft Office Word Rce
- CVE-2022-30525:CVE-2022-30525 Zyxel 防火墙命令注入漏洞 POC&EXPC
- CVE-2022-31101:PrestaShop bockwishlist module 2.1.0 SQLi
- CVE-2022-31269:Nortek Control Linear eMerge E3-Series 信息泄露
- CVE-2022-32275:GRAFANA 8.4.3 DASHBOARD 目录遍历
- CVE-2022-32532:Apache Shiro身份认证绕过漏洞
- CVE-2022-32832:apple macos 的 apfs 导致内核任意代码执行漏洞
- cve-2022-33891:Apache Spark Shell命令注入
- CVE-2022-33980 Apache Commons Configuration 远程命令执行漏洞
- CVE-2022-33980-Apache-Commons-Configuration-RCE
- CVE-2022-34265:Django SQL注入漏洞
- CVE-2022-34718:TCP/IP RCE POC
- CVE-2022-36446-Webmin-Software-Package-Updates-RCE:Webmin 远程代码执行漏洞
- CVE-2022-36537:ZK framework authentication bypass & connectWise r1Soft server backup manager remote code execution.
- CVE-2022-36946:Linux kernel 5.18.14及以前版本存在造成拒绝服务(panic)漏洞
- CVE-2022-39952:FortiNAC keyUpload zipslip 远程代码执行漏洞
- CVE-2022-40127:Apache Airflow < 2.4.0 DAG example_bash_operator RCE POC
- CVE-2022-40684: Fortinet FortiOS, FortiProxy, and FortiSwitchManager身份认证绕过漏洞
- CVE-2022-44666:Windows 联系人远程代码执行漏洞
- CVE-2023-0179: 影响了从5.5到6.2-rc3的所有Linux版本
- CVE-2023-1671: Sophos Web Appliance 远程命令执行漏洞
- CVE-2023-20178: Cisco AnyConnect Secure Mobility Client for Windows 系统权限提升漏洞
- CVE-2023-22527:Atlassian Confluence - Remote Code Execution
- CVE-2023-23333:Contec SolarView Compact命令执行
- CVE-2023-23397-POC-Powershell: Microsoft Outlook权限提升漏洞(危险的约会铃声)Powershell版本poc
- CVE-2023-25690-POC: Apache HTTP Server 请求走私漏洞
- CVE-2023-27326: VM Escape for Parallels Desktop <18.1.1
- CVE-2023-27350: PaperCut NG身份验证绕过导致的RCE
- CVE-2023-27363: Foxit PDF Reader及Editor任意代码执行漏洞
- CVE-2023-27524: Apache Superset中不安全的默认配置
- CVE-2023-27997-check: Fortinet FortiOS SSL-VPN 远程代码执行漏洞
- CVE-2023-28771-PoC: Zyxel firewalls 命令注入漏洞
- CVE-2023-34960: Chamilon命令执行
- CVE-2023-4863
- CVE-2023-7028:GitLab 任意用户密码重置漏洞
- CVE-2024-0204:Goanywhere MFT 未授权创建管理员漏洞
- CVE-2024-21887:ivanti policy secure-22.6命令注入漏洞
- CVE-2024-23897:Jenkins CLI 任意文件读取漏洞可至RCE
- CVE-2024-3400
- CVE-2024-34102:Magento estimate-shipping-methods XXE漏洞
- CVE-2024-37032:Ollama 目录遍历致代码执行漏洞
- CVE-2024-4577:PHP CGI Windows平台远程代码执行漏洞
- CVE-2024-5806:MOVEit 转移身份验证绕过漏洞
- cve-ape
- cve-check-tool
- CVE-Flow
- CVE、CMS、中间件漏洞检测利用合集 Since 2019-9-15
- cvefeed.io
- cvelist
- CVExploits Search
- CVFA-Dev
- CVFox
- CVGadget
- CVSS
- CWE
- cwe_checker
- CWP Certification
- cxnder/bn-dyldsharedcache
- CxxDemangler
- cyan4973/xxhash
- cyb3rjerry
- cyb3rk0tik
- cyb3rmik3
- CYB3RMX
- Cyb3rWard0g's sysmon config file
- Cyber Alert
- Cyber Security @ ASOS.com
- Cyber Security Roadmap
- Cyber Security Training, Certifications, Degrees and Resources | SANS Institute
- Cyber Truck Challenge
- Cyberbro
- CyberCampaigns
- CyberChef
- CyberCrime
- CyberDefenders
- Cyberforensicator
- Cyberforensics
- CyberGordon
- CyberGreg05
- cyberhatcoil/acf
- cybernet
- Cybernetics
- cybernobie
- Cyberowl
- Cyberry:1
- CyberScan
- CyberScan:用于数据包取证的渗透工具
- CybersecLabs
- Cybersecurity - Attack and Defense Strategies
- Cybersecurity & Infrastructure Security Agency CISA
- Cybersecurity Campaign Playbook
- Cybersecurity for Space
- CyberSecurityRepo
- CyberSecurityTV
- Cybersixgill
- CyberSploit:1
- Cybervaca
- Cyberwarfare & Computer Security Playlist
- Cybox:1
- Cybrary - Social Engineering and Manipulation
- cyc4188
- CycleOfTheAbsurd
- Cyclic3
- Cyclomatic complexity density and software maintenance productivity
- CycloneDX
- CycloneDX 1.6 specification
- Cyclonedx-gomod
- Cyclops is a novel browser that can detect vulnerability automatically
- Cycript
- Cydia
- Cydia Impactor
- cydia2020
- Cyfe
- Cygwin
- Cyklodev
- CyLR
- CYNAR2k
- CyNix:1
- Cyotek WebCopy
- cypress-io/cypress-example-recipes
- cyrus-and/gdb-dashboard
- cysinfo/pymal
- cyspad
- Cytoscape.js
- Cyware Threat Intelligence Feeds
- Cyware Threat Response Docker
- Czechball
- D
- D-808
- d-bytebase
- D-Cryp7
- D-Link DIR-859 - RCE UnAutenticated (CVE-2019–17621)
- d-millar
- D-TECT-1
- d0n0x
- d0n601
- D0not5top
- d12fk
- D1T2 - Bypassing GSMA Recommendations on SS7 Networks - Kirill Puzankov
- d3
- d33tah
- d35ha
- d3adm4u5
- d3agle
- d3js
- d3m3vilurr
- D3vil0p3r
- d3vyce
- D4 Project
- D4M - Signal Processing on Databases
- d4mk0
- D4N
- d4nsc4v4
- d4rk-d4nph3
- d4rkc0nd0r
- D9ping
- da13da
- Da2dalus
- daedalus
- daeken
- daenerys-sre/source
- Daenerys: IDA Pro and Ghidra interoperability framework
- daffainfo
- Daily Blog #580: Applocker and Windows 10
- Daily Blog #581: Forensic Lunch Test Kitchen 12/28/18 Syscache Applocker and Server 2012
- Daily Dark Web - Twitter Post
- DailyEarth
- DailyMotion
- dakaneye
- dalfox:一个强大的开源XSS扫描工具和参数分析实用工具
- DalilaSilva
- dallmeyer
- Dalvik Virtual Execution with SmaliVM
- Damian89
- damienjburks
- Damn Small SQLi Scanner
- Damn Vulnerable Android App (DVAA)
- Damn Vulnerable Cloud Application
- Damn Vulnerable FirefoxOS Application (DVFA)
- Damn Vulnerable GraphQL Application - @dolevf
- Damn Vulnerable Hybrid Mobile App (DVHMA)
- Damn Vulnerable iOS App (DVIA) v1
- Damn Vulnerable iOS App (DVIA) v2
- Damn Vulnerable Node Application(DVNA)
- Damn Vulnerable Web Application
- Damn Vulnerable Web Application (DVWA)
- Damn Vulnerable Web Services (DVWS)
- Damn Vulnerable Xebia Training Environment
- damonmohammadbagher/meterpreter_payload_detection
- Dan Gora @devsecops
- Dana James Traversie
- Danabot sample with beaconing
- danberghjohnsson
- Dangerous Google Hacking Database and Attacks
- danghvu
- dangtony98
- danibarranqueroo
- Daniel Miessler | amass — Automated Attack Surface Mapping
- Daniel Redfern
- daniel-corbett
- DanielAsher
- danielchabr
- Daniele Rosetti
- daniele-sartiano
- danielgf3
- DanielHougaard
- danielkrupinski
- daniellimws
- danielmoos
- danielpacak
- DanielRuf
- DanielShemesh
- danigargu/heap-viewer
- daniijal
- Daniil Kuts
- Danny Lloyd @dannylloyd
- dannye
- dannyp303
- Dante
- dantheman827/ios-app-signer
- danwatt
- danybr0
- DAO Tools
- Dapp.tools
- dappradar.com
- darcsec
- Dargle
- Dark Reading
- Dark Search
- Dark Visitors
- DarkAngel:一款全自动白帽漏洞扫描器,从hackerone、bugcrowd资产监听到漏洞报告生成、企业微信通知
- DarkBTCGraph
- DarkCrypt
- DarkEye:渗透测试情报收集工具
- DarkHole:2
- DarkNet Investigations
- Darknets
- darkprof83
- darkquasar/wmi_persistence
- DarkSearch
- darkweak
- darkwebdaily.live
- darlinghq/darling-dmg
- darthton/xenos
- DartVanya
- DarunGrim
- darx0r
- darylseah
- das-labor/panopticon
- Dashboard
- Data
- Data 100: Principles and Techniques of Data Science - UC Berkeley
- Data 102 - Spring 21- UC Berkeley
- Data 144: Foundations of Data Science spring 2021 - Vassar College
- Data 8: The Foundations of Data Science - UC Berkeley
- Data Anaylsis & Visualization
- Data breach searches
- Data Communication - IIT Kharagpur
- Data Privacy
- Data Profiling and Data Cleansing (WS 2014/15) - HPI University of Potsdam
- Data Science and AI for Neuroscience Summer School - Caltech Neuroscience
- Data Science for Biologists - Steve Brunton
- Data Science for Dynamical Systems, by Oliver Wallscheid & Sebastian Peitz
- Data Structures - mycodeschool
- Data Structures - Pepperdine University
- Data Structures And Algorithms - IIT Delhi
- Data to Go
- Data visualization
- Data Visualization Catalogue
- Data Visualization Tools
- data_hacking
- Data-Driven Control with Machine Learning - Steve Brunton
- Data-Driven Dynamical Systems with Machine Learning - Steve Brunton
- Data-Driven Methods and Machine Learning in Atmospheric Sciences - IISC
- data-guardian
- data.chain.link
- Data.com Connect
- Data.gov.uk
- data.paradigm.xyz
- Databasd
- database
- Database Design - IIT Madras
- Database Management Systems, Aduni
- Database Reliability Engineering
- Database Reliability Engineering: What, Why, and How?
- Database Today
- Database: world-check.com
- Databases - start.me
- Databasetools: 一款用Go语言编写的数据库自动化提权工具,支持Mysql、MSSQL、Postgresql、Oracle、Redis数据库提权、命令执行、爆破以及ssh连接
- databasic.io/en
- DataBreaches
- databunker
- DataCon2020题解:通过蜜罐与DNS流量追踪Botnet
- Datadog Dashboard at Scale w / Terraform
- DataGram - Forensic Locksmithing
- Datalux/Osintgram
- Dataset of Packed ELF
- Dataset of Packed PE
- Datasources
- Datasploit
- DataSploit (IP Address Modules)
- datatags/mount-ios-backup
- datatheorem/trustkit
- datatheorem/trustkit-android
- Datawrapper
- datawrapper.de
- DatDraggy
- DateBro
- Datenbank-Analyse mit SchemaSpy
- datetime
- datper_elk
- datper_splunk
- Daum
- Dave van Stein @davevs
- davewongillies
- David Bombal
- david942j
- davidalger
- DavidAngelos
- davidemyers
- DavidKorczynski
- davidkuhta
- davidmcduffie
- davidpany/wmi_forensics
- davispuh
- Dawei Innojoy Patent Search Engine
- Day 19 - Eradication: Forensic Analysis Tools - What Happened?
- dazjo
- db_activity
- db_add
- db_add_ttl
- db_select
- db_update
- DB-GPT-Hub
- DB-GPT-Plugins
- DB-IP
- DBC file
- DBC2
- dbcc
- dbd
- DBeaver
- dbgpts
- DBI
- DBPedia
- DC-1
- DC-2
- DC-3
- DC-4
- DC-5
- Dc:7
- DC:9
- dc3-plaso
- dc3dd
- DC6
- DC8
- dcfldd
- DcRat-C#编写的简易远控工具
- DCSC
- DCSec:域控安全one for all
- DCTF 2018 - Vulture
- ddaniboy
- DDCTF 2020 - Easy Web
- ddd75a650fee04c0ce576c877521c6bd
- DDexec:一种在 Linux 上无文件且隐秘地运行二进制文件的技术,使用 dd 将 shell 替换为另一个进程
- ddkwork
- DDosy
- DDS and ROS 2 cybersecurity
- DDS Dataset Collection
- DE
- DE-ICE:S1.120
- DE-ICE:S1.130
- DE-ICE:S1.140
- De-mixing TornadoCash & RailGun
- de.fi
- de.fi/scanner
- De1CTF2020系列文章
- de4js
- Dead Simple Signing Envelope
- Dead-Hosts
- deadbits
- deadjakk
- DeadLion
- Deadpool2000
- Dealing with difficult people – McGraw Hill
- Dealing with virtualization packers
- deanlee
- Deanonymizing OpenSea NFT Owners via Cross-Site Search Vulnerability
- Dear Blue Team: Forensics Advice to Supercharge your DFIR capabilities by Joe Gray (@c_3pjoe)
- deathmarine/luyten
- deauthentication attack
- DeBank
- debfx
- Debian
- Debian <= buster, Ubuntu <= 19.10
- Debian >= bullseye, Ubuntu >= 20.04, Kali
- Debian Live
- Debian Security Bug Tracker
- Debian/Ubuntu/Kali
- Debinject
- deblaze
- Deblur Image
- debootstrap
- Debrief
- Debugging
- Debugging and Common Errors
- Debugging Linux I/O latency
- Debugging shellcode using BlobRunner and IDA Pro
- Debugging Sidekiq Poison Pills
- Debugging the PostgreSQL query planner
- Debunking the seven most popular Site Reliability Engineering myths
- Debusan13
- Dec1pher445
- DECAF
- decai
- decalage2
- decalage2/oletools
- Deceiving portable executable malware classifiers into targeted misclassification with practical adversarial examples
- December Threat Reports
- Decentraleyes
- Deckard
- Decker
- decode.gif
- decode.gif
- decode/encode
- DecodeMessage.cpp
- decodeObfuscator:免安装一键还原Obfuscator混淆过的代码
- decoder
- Decoding the secrets of machine learning in malware classification: A deep dive into datasets, feature extraction, and model performance
- decompile-ghidra-100k
- decompile.tools
- Decompiler.com
- Decrypt Image Online
- Decrypt_Weblogic_Password:绝大部分weblogic解密方式
- decrypt0r - automatically download and decrypt SecureRom stuff
- Decrypting Malware String Encryption
- Dedaub
- Dedaub Decompiler
- dedaub.com
- Dedicated or Not
- dedigger.com
- Dedotfisecurity
- dedsploit
- Deductive Databases and Knowledge-Based Systems - Technische Universität Braunschweig, Germany
- Deep dive into iOS Exploit chains found in the wild - Project Zero
- Deep dive into Visual Studio Code extension security vulnerabilities
- Deep Learning - Winter 2020-21 - Tübingen Machine Learning
- Deep Learning (Fall 2020) - Georgia Tech
- Deep learning at Oxford 2015 - Nando de Freitas
- Deep Learning CMU
- Deep Learning for Natural Language Processing, 2017 - Oxford University
- Deep Learning, Stanford University
- Deep Learning: CS 182 Spring 2021
- Deep RL Bootcamp - Berkeley Aug 2017
- Deep Unsupervised Learning -- Berkeley Spring 2020
- Deep Web Links
- Deep-dive write-up by Objective See
- Deepce
- DeepdarkCTI
- Deepfence PacketStreamer
- Deepfence SecretScanner
- deepfence.io
- Deepinfo
- DeepRob Winter 2023 - University of Michigan
- DeepSeek-Coder-V2-Instruct
- DeepSeek-Coder-V2-Lite-Instruct
- DeepSeek-R1
- DeepSeek-R1-Distill-Llama-70B
- DeepSeek-R1-Distill-Llama-8B
- DeepSeek-R1-Distill-Qwen-1.5B
- DeepSeek-R1-Distill-Qwen-14B
- DeepSeek-R1-Distill-Qwen-32B
- DeepSeek-R1-Distill-Qwen-7B
- DeepSeek-V3
- deepsource-autofix
- deepsource-io
- deepsourcebot
- Deepstate
- deepweblinks.net
- DeepWiki
- deepzec
- deepzec/bad-pdf
- DEF CON
- DEF CON 26 DATA DUPLICATION VILLAGE - Lior Kolnik - The Memory Remains Cold Drive Memory Forensics
- DEF CON 26 VOTING VILLAGE - Carsten Schurmann - A Comprehensive Forensic Analysis of WINVote Voting
- DEF CON 27 video
- DEF CON CHV - V2GEvil: Ghost in the wires
- Defacto2
- Defacto2 Analyzers Archive
- Defacto2 Packers Archive
- Defacto2 Unpackers Archive
- defarbs
- Default Credentials
- default passwords list
- default-http-login-hunter:超过380种设备的默认凭据扫描
- DefaultCreds-cheat-sheet:默认账号密码列表
- Defcon
- DefCon 2020 Demo Labs
- DefCon 29 Workshop - Modern Malware Analysis for Threat Hunters
- DEFCON Car Hacking Village
- DEFCON CHINA议题解读 | Triton和符号执行在 GDB 上
- DEFCON CTF 2018 Qual - EasyPisy
- DEFCON CTF 2019 Qual - ooops
- DefCon CTFs
- DEFCON, USA
- Defeating anti-forensics in contemporary complex threats
- DefectDojo
- Defence Space
- Defend the Web
- Defender 扫描文件名问题
- DefenderCheck
- Defending Your Castle: Build Catapults, Crossbows, Moats, Bulletproof Shields, and More Defensive Devices to Fend Off the Invading Hordes
- Defensive and offensive robot security
- DeFi Defence DAO Tools
- DeFi MetaLens
- DeFi Toolkit
- defi-lab.xyz
- defillama-extension
- defillama.com/hacks
- Defining Atomicity (and Integrity) for Snapshots of Storage in Forensic Computing
- Defining Modern Software Roles: SREs at New Relic
- definity
- DeFiPie attack
- Defiway attack
- defplorex 介绍
- Defrost Finance attack
- DEFT Linux
- defunctio
- defyield.xyz/rekt-database
- DeHashed
- DeimosC2:用golang开发的后渗透测试C2利用框架
- dejanb
- dekunukem/nintendo_switch_reverse_engineering
- Deleting data distributed throughout your microservices architecture
- delirious-lettuce
- Deltafeed
- Dem0n
- demidovakatya
- Demigod
- demiguise
- Demo
- demonic_browsers.pdf
- demonstration videos (YouTube)
- Demos
- Demostration Video
- demovfuscator
- Demystifying Site Outages
- Demystifying the Mobile Network by Chuck McAuley
- Demystifying the Secure Enclave Processor
- den4uk
- den4uk/andriller
- denandz
- Denial of Ethereum Txpool sERvices
- Denial of Service (DoS)
- Denial-of-service attacks on host-based generic unpackers
- denisidoro/navi
- DenisM3lo
- denniskniep
- DensityScout
- Denyhosts
- Deobfuscation of packed and virtualization-obfuscation protected binaries
- Deobfuscation: recovering an OLLVM-protected program
- dep-scan
- Department for Corrective Services South Australia
- Department of Transport Western Australia
- Dependable Systems (SS 2014)- HPI University of Potsdam
- dependabot
- dependabot-preview
- Dependencies
- Dependency-Track
- Depix
- Deploy to Rainbond
- Deploy to sealos
- Deploying Software at GoCardless: Open-Sourcing our “Getting Started” Tutorial
- Deploying SRE Training Best Practices to Production: How We SRE'ed Our SRE Education Program
- Deploying with Confidence — Minimize Risk, Maximize Resiliency With Canary Deployments on AWS
- Deployment At Scale: Story Behind Dream11’s In-House Blue-Green Deployment Platform ‘OneClick’.
- Deployment reliability at GitHub
- Deploys at Slack
- deps.dev
- Depth
- deralexxx
- DerbyCon 2019 Slides
- derdanu
- DERE-ad2001
- derech1e
- derekselander/lldb
- DeronW
- derpadoo
- DerpNStink
- derrekr/fastboot3ds
- DES
- des.hex-encodefile:Golang:采用随机deskey和hex进行文件加密,常用于加密shellcode
- Descartes Labs
- Desharialize
- Design and Analysis of Algorithms - IIT Bombay
- Design and Analysis of Algorithms - IIT Madras
- Design and development of a new scanning core engine for malware detection
- Design and evaluation of physical protection systems
- Design and performance evaluation of binary code packing for protecting embedded software against reverse engineering
- Design and Verification of Secure Systems
- Design for Multics Security Enhancements
- Design of Digital Circuits - ETH Zürich - Spring 2019
- Design of the EROS Trusted Window System
- Design patterns for building secure systems
- Design principles (from US CERT)
- Design Principles for Tamper-Resistant Smartcard Processors
- Design Thinking for Digital Engineering (SS 2018) - Dr. Julia von Thienen - HPI
- Designing a Better Kubernetes Experience for Developers
- Designing and Implementing the OP and OP2 Web Browsers
- Designing Resilient Systems Beyond Retries (Part 3): Architecture Patterns and Chaos Engineering
- Designing Resilient Systems: Circuit Breakers or Retries? (Part 2)
- Designing Services for Resilience: Netflix Lessons
- Designing the Architecture for Your Ethereum Application
- Designing The Gemsos Security Kernel For Security And Performance
- DET
- Detailed analysis
- Detailed Mimikatz Guide
- detailed process auditing
- Detect Canvas Fingerprint
- detect-it-easy-git
- Detectify
- detectify-cves
- Detecting Deceptive Process Hollowing Techniques Using HollowFind Volatility Plugin
- Detecting Fake 4G Base Stations In Real Time
- Detecting Insecure Code Patterns in Industrial Robot Programs
- Detecting Malicious Processes Using Psinfo Volatility Plugin
- Detecting Malicious Requests with Keras & Tensorflow
- Detecting obfuscated malware using reduced opcode set and optimised runtime trace
- Detecting packed executable file: Supervised or anomaly detection method?
- Detecting packed executables based on raw binary data
- Detecting packed executables using steganalysis
- Detecting packed PE files: Executable file analysis for the Windows operating system
- Detecting Persistence in Memory
- Detecting Service Degradation and Failures at Scale through Distributed Log Processing
- Detecting traditional packers, decisively
- Detecting unknown malicious code by applying classification techniques on opcode patterns
- Detecting Vulnerabilities With Vulnture
- Detection of metamorphic malware packers using multilayered LSTM networks
- Detection of packed executables using support vector machines
- Detection of packed malware
- Detection Rule License (DRL) 1.0
- Detection Studio
- Detection.FYI
- Detekt
- Deterministic Aperture: A distributed, load balancing algorithm
- Deterministically Deterring Timing Attacks in Deterland
- Deterrence and adversarial risk (from Saydjari's book)
- dETH Node
- DethCode
- detiam
- Detox
- Deturl
- dev
- dev747368
- devanshbatham
- devaukz/macho-kit
- Devbreak on Twitter
- develoopeer
- Develop iOS Apps (Swift)
- Developer environment: Achieving reliability by making it fast to reset
- Developer-Y
- Developing an Etherscan clone in 48 hours
- Developing iPad Applications for Visualization and Insight - Carnegie Mellon University
- Developing new Tasks
- Development
- Development guide
- Development guidelines
- development mode
- Development of a new Windows 10 KASLR Bypass (in One WinDBG Command)
- Development Overview
- Developments in Car Hacking
- devendrakajala
- deveyNull
- DevGuru:1
- devhell
- Devices
- Devil Killer
- DevOps and Segregation of Duties
- DevOps at Capital One: Focusing on Pipeline and Measurement
- DevOps Weekly Newsletter
- devplayer55221
- devploit
- DevRandom CTF:1.1
- DevSecOps: What Is It and Why Is It Gaining Momentum in the Industry?
- DevSecOps理念及思考
- DevSkim
- devstein
- devtoolzone
- devttys0/ida
- devxprite
- dex.guru
- dex2jar
- DexGuard
- DexHunter: Toward extracting hidden code from packed Android applications
- dexidp/dex
- Dexofuzzy: Android malware similarity clustering method using opcode sequence-Paper
- DexProtector
- dexterlab.com
- dextools.io
- dfax/dfax
- dfhack/dfhack
- DFIR – The definitive compendium project
- DFIR ORC
- DFIR scripts
- dfir-orc/dfir-orc
- DFIR-SQL-Query-Repo
- dfir.training
- DFIR4vSphere
- DFIRArtifactMuseum
- dfirfpi
- DFIRTriage:针对Windows的事件应急响应数字取证工具
- DFN-CERT
- dForce Network attack
- DFRobot CAN-BUS Shield For Arduino
- Dfte
- DFX Finance attack
- dga-mi-ssi/yaco
- dgelessus
- DGEngine
- dgmcdona
- dgruss
- dguido
- dhauenstein
- DHCP ACK Injection spoofing - Man-in-the-middle
- DHCPig
- dhcpspoof
- dhess/nixos-yubikey
- DhiyaneshGeek
- dhondta
- dhondta/appmemdumper
- DHook:DHook是一个交互式自定义动态hook的工具。通过javaagent+ASM技术对运行时的java应用进行字节码修改,并可以以界面和配置文件的方式来增加hook点,修改执行方法的返回值以及参数等。如破解cs等
- dhsifss
- Diadlo
- Diagnosing a sandbox failure
- Diagram Builder
- diagramify.agiliq.com
- diagrams.net Docs
- Diamond Rivero @diamant3
- Diamondfox opendir w/ several modules and documentation
- Diamorphine:LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
- dibsy
- Dice
- Dice CTF 2022 - no-cookies
- Dice CTF 2022 - shadow
- dickeylth
- dickfickling
- Dict.cn
- DictGenerate:使用Go语言编写的社工字典生成器
- Dictionary.com: Translation
- didroe
- diego-treitos
- DiffChecker
- Difference between 2>&-, 2>/dev/null, |&, &>/dev/null and >/dev/null 2>&1
- Difference between nohup, disown and & (original)
- Difference between Real User ID, Effective User ID and Saved User ID? (original)
- Difference between router and gateway (orignal)
- Differences in /var/log/{syslog,dmesg,messages} log files
- Differences in SRE Implementations across Companies
- Different tools
- Diffie-Hellman DSA-like parameters
- diffs
- Diffy
- dig
- digenaldo
- Digging Up the Past: Windows Registry Forensics Revisited
- DiggReader
- digiKam
- digininja
- Digital Attack Map
- Digital Circuits and Computer Architecture - ETH Zurich - Spring 2017
- Digital Collector
- Digital Communication - IIT Bombay
- Digital Computer Organization - IIT Kharagpur
- Digital Design Course - 2015 - UNCC
- Digital Footprint Check
- Digital Forensic Challenge Images
- Digital Forensics – PlugX and Artifacts left behind
- Digital Forensics – Tracking & Target Locating .Jpegs via Metadata (Exif) | By Hector Barquero
- Digital Forensics and Incident Response: Incident response techniques and procedures to respond to modern cyber threats
- Digital Forensics and Law
- Digital Forensics Case Leads: Passwords in Wills, Google Chrome a Virus, Cybercrime Unit Saving Money and Updates for Sleuthkit and SSDeep.
- Digital Forensics Case Leads: Identifying TrueCrypt volumes with Volatility, Malware that can sneak into VM's and more....
- Digital Forensics Case Leads: Multi-plat RAT, No US Cybersecurity bill, Dropbox drops a doozie, Volatility everywhere
- Digital Forensics Case Leads: SIFT 2.1, Volatility 2.0
- Digital Forensics Case Leads: Skype acting weird, Mircosoft backdooring Skype! Volatility with x64 support... Facebook censoring chats for criminal activities!? A Russian hacker challenge Apple by bypassing Apple Store authentication mechanism and get apps for free!!! All that and more, this week on Case Leadsâ¦
- Digital Forensics Case Leads: Volatility and RegRipper, Better Together
- Digital forensics chronicles: image identification issues on large memory dump with Volatility
- Digital Forensics Distro: CAINE
- Digital Forensics Investigation through OS Forensics (Part 2)
- Digital Forensics Investigation through OS Forensics (Part 3)
- Digital Forensics Investigation using OS Forensics (Part1)
- Digital Forensics Platform: Autopsy
- Digital Forensics Tool Testing Images
- Digital Forensics Toolkit: DEFT
- Digital Forensics Tools, Libraries, and Frameworks
- Digital Forensics, Part 1: Capturing a Forensically Sound Image
- Digital Forensics, Part 10: Mobile Forensics (Android)
- Digital Forensics, Part 11: Recovering Stored Passwords from the Browser
- Digital Forensics, Part 2: Live Memory Acquisition and Analysis
- Digital Forensics, Part 3: Recovering Deleted Files
- Digital Forensics, Part 4: Finding Key Evidence in the Forensic Image
- Digital Forensics, Part 5: Analyzing the Windows Registry for Evidence
- Digital Forensics, Part 6: Analyzing Windows Pre-fetch Files for Evidence
- Digital Forensics, Part 7: Browser Forensics
- Digital Forensics, Part 8: Live Analysis with sysinternals
- Digital Globe
- Digital Image Processing - IIT Kharagpur
- Digital Photo Forensics: How To analyze Fake Photos
- Digital Signal Processing - RPI
- Digital Systems Design - IIT Kharagpur
- Digital Voice & Picture Communication - IIT Kharagpur
- digital world.local: Vengeance
- digital world.local:FALL
- Digitalbank
- DigitalForensicsMagazine
- digitalisx
- DigitalOcean
- DigitalOcean referral link
- digitalruby/ipban
- digitalsleuth
- Digle
- Diligence - Smart Contract Best Practices
- dimorphic
- Dina
- dincaus
- DInjector:shellcode 注入技术集合
- dioh
- Dionach | How to Use OWASP Amass: An Extensive Tutorial
- Dionaea
- diosmosis
- Dirb
- Dirble -快速目录扫描和爬取工具【比dirsearch和dirb更快】
- Direct Flights | Explore all non-stop flights from any airport
- Direct Methods for Sparse Linear Systems - Prof Tim Davis - UFL
- Direct-NtCreateUserProcess
- directionless
- Directory Structure
- dirhunt
- dirkjanm
- dirsearch how to
- Dirsearch to find Hidden Web Directories
- Dirty COW - (CVE-2016-5195) - Docker Container Escape
- Dirty-cow-golang
- Dirtycow
- Dirtycow-vdso
- Dirtycow.cr
- Dirtycow.fasm
- DirtyPipe-Android:Dirty Pipe root exploit for Android
- Dis.cool
- Disable ASLR For Easier Malware Debugging With x64dbg and IDA Pro
- Disabling anti-debugging techniques for unpacking system in user-level debugger
- Disassembler
- Disaster Recovery for Multi-Region Kafka at Uber
- Disasterpiece Theater: Slack’s process for approachable Chaos Engineering
- Disclaimer
- Disclaimer & License
- Disconnect
- disconnect3d
- Discord
- Discord Bot Example
- Discord Community
- Discord Leaks
- Discord OSINT
- Discord server
- discord.id
- Discoshell
- discover
- Discover hidden files & directories on a webserver - dirsearch full tutorial
- discoverscripts
- Discrete Mathematical Structures - IIT Madras
- Discrete Mathematics and Mathematical Reasoning 2015/16 - University of Edinburgh
- Discrete Structures - Pepperdine University
- Discrete Structures (Summer 2011) - Rutgers, The State University of New Jersey
- Discussion
- Discussion Group
- Discussions
- Discussions
- Discussions Collaborate outside of code
- Disk Clone and ISO Image Acquire
- Disk-Arbitrator
- Dismap
- dismember:扫描内存里敏感内容,其实就是类似 OD的内存字符串搜索
- Dispatch
- Dispatch3376
- display_errors
- display_startup_errors
- DissectMalware
- dissertation
- Dissfall
- Distill Web Monitor
- Distributed Algorithms - Jukka Suomela
- Distributed Algorithms, https://canvas.instructure.com/courses/902299
- Distributed Data Analytics (WT 2017/18) - HPI University of Potsdam
- Distributed Data Management - Technische Universität Braunschweig, Germany
- Distributed Data Management (WT 2018/19) - HPI University of Potsdam
- Distributed Data Management (WT 2019/20) - Dr. Thorsten Papenbrock - HPI
- Distributed Denial of Secrets
- Distributed Systems (Prof. Pallab Dasgupta)
- Distributed Systems Lecture Series
- Distributed tracing at Pinterest with new open source tools
- Distributed Tracing at Strava
- Distributed trust model
- DIVA Android
- Dive deep into Android Application Security
- diversenok
- Divyanshu Dev @Novice-expert
- diyan/pywinrm
- DizzyEggg
- Django checklist
- Django-admin-honeypot
- djangohunter
- djinn:1
- djkaty
- djnnvx
- djnym
- djrieger
- djwy
- dkg
- dkhurshudian
- DKMC
- DLAI - Deep Learning for Artificial Intelligence @ UPC Barcelona
- dlcowen/testkitchen
- DLCV - Deep Learning for Computer Vision - UPC Barcelona
- dlford
- dlink-dir610-exploits-Exploits for CVE-2020-9376 and CVE-2020-9377
- Dliv3
- DLL agent
- DLL CryptoMix
- DLL Hijacking
- DLL Hijacking Like a Boss!
- DLL Search Order Hijacking
- dll_inject_vs_binaries:将 dll 注入指定进程
- DLL-Execution.md
- DLL-Execution.md
- DLL-Hijack-Search-Order-BOF:DLL Hijack Search Order Enumeration BOF
- dll-merger:将dll和32位的exe文件进行合并,区别于传统的LoadLibrary方式,通过在exe的pe结构中添加.dlls和.ldr段,实现自动加载dll
- dll1.png
- DLLHijackTest:通过 powershell 脚本查找 dll 劫持
- DLLInjector
- DLLirant:对指定二进制文件进行自动 dll 劫持检测
- Dll注入新姿势:SetThreadContext注入
- DLL注入新姿势:反射式DLL注入研究
- DLL注入那些事
- DloomPlz
- dmaciejak
- dmbaturin
- dmex
- DMFP - Discrete Mathematics and Functional Programming, Wheaton College
- dmfrpro
- DMI Tools
- DmitriyLewen
- DmitriyStoyanov
- dmitry
- Dmitry Litosh @Dlitosh
- dmur1
- DMV :1
- dnadares
- dnides
- dnlib
- dns
- Dns Auto Rebinding
- DNS Enumeration - DNS Dumpster
- DNS Enumeration - Wiki
- DNS Explained - How Your Browser Finds Websites
- DNS History
- DNS leak test
- DNS Lookup (via MxToolbox)
- DNS Rebind Toolkit
- DNS Rebinding Attacks
- DNS Tunneling及相关实现
- DNS Tunnel隧道隐蔽通信实验 && 尝试复现特征向量化思维方式检测
- DNS 域传送tools
- DNS-BH
- Dns-nsec3-enum
- DNS-Persist: 利用 DNS 协议进行远程控制通信
- DNS.BufferOver.run
- DNS66
- dnsc2:一个基于DNS隧道的简单C2
- Dnscap
- DNSChef
- DNSCloak
- dnscrypt-proxy
- DNSdb
- dnsdumpster
- dnsenum
- dnshistory.org
- DNSlivery
- Dnslog
- DNSlog-GO:DNSLog-GO 是一款golang编写的监控 DNS 解析记录的工具,自带WEB界面
- DNSLog-Platform-Golang:一键搭建Dnslog平台的golang版本
- DnslogCmdEcho:命令执行不回显但DNS协议出网的命令回显场景解决方案
- Dnslogger
- Dnslog在SQL注入中的实战
- dnslookup.pro
- DNSlytics
- Dnsmap
- dnsmasq conversion script
- DNSMon: 用DNS数据进行威胁发现
- dnSpy
- dnspython
- dnsrecon
- DnsRedir
- dnsrepo.noc.org
- DNSservices
- dnsspoof
- Dnsspy
- DNSStuff
- dnstake
- Dnsteal
- dnstunnel-一款多会话的二进制DNS隧道远控
- Dnstwist
- DNSTwister
- dnsub:子域名扫描工具
- dnsvalidator
- dnsVerifier: 一款批量验证dns可用性的工具爬网站JS文件,自动fuzz api接口,指定api接口
- DNSViz
- dnsx
- DNS域传送漏洞学习总结
- DNS泛解析是怎么被黑客玩坏的
- DNS隧道检测平民解决方案
- Do it Live! Dynamic iOS Forensic Testing
- Do It Yourself
- Do Not Track
- Do we need hundreds of classifiers to solve real world classification problems?
- doante page
- DOB Search - Death records
- doc
- Doc-Gen
- DocBleach
- dochne
- DocJax | Find Any Document on the Web
- Docker
- Docker API
- Docker Bench for Security
- Docker Breakout
- Docker Build/Push Github Action
- Docker Cheat Sheet
- Docker Compose
- Docker containers
- Docker Desktop
- Docker for Digital Forensic Investgiation
- Docker for pentest
- Docker Hub
- Docker in Practice (2nd edition)
- Docker Login Github Action documentation
- Docker Metasploit
- Docker Security - Quick Reference: For DevOps Engineers
- Docker Security Cheat Sheet
- Docker security checklist
- Docker Tutorials from the Community
- Docker Usage
- Docker_open5gs
- docker-forensics-toolkit/toolkit
- Docker/Kubernetes Security Practice Guide
- DockerHub
- DockerHub - Prowler API
- DockerHub - Prowler UI
- docker客户端钓鱼
- Docs
- docs for installation
- doctashay
- DoctorMcKay
- Doctors Without Borders
- Document
- Document Cloud
- Documentando bancos com Schemaspy
- Documentation
- Documentation & Help
- Documentation automatique d’une App Symfony avec SchemaSpy et GitLab !
- documentation I can find
- Documentation, training, and use-cases
- Documenter une base de données avec SchemaSpy
- Documenting your database with SchemaSpy
- Documenting your relational database using SchemaSpy
- Documents Free Download PDF
- DOD Password Management Guideline
- DodoVulnerableBank
- Does ftrace allow capture of system call arguments to the Linux kernel, or only function names?
- Does not alert the target email.
- doesfollow
- dogancanbakir
- Dogpile
- dogtopus
- doi:10.2478/popets-2021-0045
- Dokcer-escape-tool
- dolbyjoab
- Dolev Farhi
- DOM based Angular sandbox escapes
- DOM XSS – auth.uber.com
- Domain and type enforcement for Linux
- Domain Crawler
- Domain Dossier
- Domain Tools
- Domain type enforcement
- domain_analyzer
- domainaware/parsedmarc
- DomainIQ
- domainNamePredictor-一个简单的现代化公司域名使用规律预测及生成工具
- DomainPasswordSpray
- Domains
- Domaintoipconverter
- DomainTools
- domainTools-内网域渗透小工具
- domato
- Domato Fuzzer's Generation Engine Internals
- DomDom:1
- domenukk
- DomGoat
- domhttpx:用python开发的 google搜索 工具
- dominic-r
- DominicBreuker
- DominicMaas
- Dominique Righetto
- Dominoc925
- domoticz/domoticz
- DOMPurify
- domwhewell-sage
- Don't expose the Docker socket (not even to a container)
- Don't Panic
- DON'T TRUST THE DOM: BYPASSING XSS MITIGATIONS VIA SCRIPT GADGETS
- Don't trust the math (Bruce Schneier)
- Don't Use .htaccess Unless You Must
- Don't use VPN services
- Donate to support this project
- Donate with Paypal
- DongTai:火线-洞态IAST,一款开源的被动式交互式安全测试(IAST)产品
- Donkey Docker
- DonnchaC
- Donot师傅收集的入侵检测相关的内容
- Dontgo403
- donut
- doodstream
- doomedraven
- doona
- Door Bell eMMC Image
- doorbash
- doork
- Dor1s
- dora2-iOS/ipwnder_lite
- doridori/android-security-reference
- dork-cli
- Dorkify
- DorkSearch
- doronz88/pymobiledevice3
- Dorothy
- dorsiflexion
- dos
- DOS File Path Magic Tricks
- DosX-dev
- DotBundle
- dotgpg
- Dothop
- dotnet-deserialization: dotnet 反序列化学习笔记
- Dotnet-netrace
- DotNetAnywhere:小型 .NET 解释器
- DotNetZ
- dotPeek
- Double-q1015
- Double, Double Toil and Trouble
- DoubleAgent
- doublebit015
- Doubt infect ELF
- dougallj's applecpu
- dov-csis
- DOWN THE RABBIT HOLE OF PERFORMANCE MONITORING
- download
- Download .deb/.rpm from releases page
- Download here
- Download Manager
- Download Matomo
- download page
- Download the latest PDF
- DownloadHelper
- Downloads
- Downloads Mirror
- DownUnderCTF 2022 - minimal-php
- doxbin
- Doxygen
- DPA International
- dpaste
- dpaste2
- DPDK
- Dpkt
- DProvinciani
- dpwwn: 1
- dpwwn:2
- dr-BEat
- Dr-DevOps
- Dr. Taint
- Dr0p1t-Framework
- Dracnmap
- dracOs Linux
- Dradis
- Dragon CTF 2021 - webpwn
- Dragondance
- dragonly
- dragonmacher
- DragonzMaster
- drakes00
- DRAKVUF
- DRAKVUF Sandbox
- Dramelac
- Draugiem (Latvia)
- Draw EVM contract byte code
- draw.io
- drbeni/malquarium
- DrDinosaur
- drduh
- dreamtools.app
- dreddsa5dies
- dref
- Dreg
- drego85
- Driftwood
- Driller
- drivendata/cookiecutter-data-science
- DrKeithJones.com
- drltrace
- drnow4u
- Droid-FF - Android File Fuzzing Framework
- Droidbot
- DroidBox
- DroidBox - Dynamic analysis of Android applications
- DroidCam (Capture Image)
- DroidDetective
- droidefense/engine
- DroidLegacy
- droidmonkey
- DroidPDF: The obfuscation resilient packer detection framework for Android Apps
- Droidsheep
- Droidstatx
- Droopy
- Dropbox Engineering Career Framework - Reliability Engineer (SRE)
- Dropmark
- Drozer
- DrSemu:基于动态行为的恶意软件检测与分类工具
- druid_sessions:提取 Druid 的 session 工具
- DruidCrack:Druid 密文解密工具
- DRUPAL 7.X SERVICES MODULE UNSERIALIZE() TO RCE
- Drupwn
- Druzi
- drwetter
- DrWhax
- ds_store_exp:.DS_Store 文件泄漏利用脚本,它解析.DS_Store文件并递归地下载文件到本地
- ds5678
- dsanders11
- dsasmblr
- dsaxton
- DSFF
- dsheirer/sdrtrunk
- Dshell
- Dshell – Network Forensic Analysis Framework
- dsieve
- Dsniff
- dsolstad
- dsommers
- dsoprea
- dsouzarc
- dspruell
- dspruell-i01
- dstmath/frida-unpack
- DSVW
- DSXS
- dtd-finder
- dtformats
- dtube
- DualMaps
- Dubbo 2.7.8多个远程代码执行漏洞
- Dubbo2.7.7反序列化漏洞绕过分析
- Duck Hunt: Memory Forensics of USB Attack Platforms
- duck-nukem
- DuckDuckGo
- DuckDuckGo URL scraper
- Duckhunt
- DuckMemoryScan-一个简单寻找包括不限于iis劫持,无文件木马,shellcode免杀后门的工具
- DuckSoft
- duckyondiscord
- Due Diligence
- dufferzafar
- dukeofdisaster
- dumb-password-rules/dumb-password-rules
- dummys
- dump lsass的工具
- dumpall-多种泄漏形式,一种利用方式【支持.git源代码泄漏.svn源代码泄漏.DS_Store信息泄漏目录列出信息泄漏】
- DumpHash: 一款dump hash工具配合后渗透的利用
- Dumping Processes with Volatility 3
- DumpIt
- Dumpmon
- DumpSMBShare:通过 SMB 共享下载文件和文件夹
- Dumpulator-IDA
- Dumpzilla
- Dumpzilla: a forensic tool to extract information from browsers based on Firefox
- dundunHa
- Dune analytics guide
- Dune CandleStick Chart
- Dune client
- Dune Course
- Dune Dashboard
- Dune Extension: Web3 Wizard Helper
- Dune Manual
- Dune MEV Dashboards
- Dune SQL
- Dune ToolSet
- Dune: Get All TXs
- Dune: Token Holders
- dune.xyz
- duneninja.com for dune.xyz
- Duo Labs: Apple T2 XPC
- Dupli Checker
- durck
- Durian:1
- durka
- dutchy-/volatility-plugins
- duthils
- dvarshavsky
- DVCP-TE
- DVCS-Pillage
- DVIA
- dvir1994
- Dviros
- DVTA - Part 5 - Client-side Storage and DLL Hijacking
- DVWA
- DVWS
- dvws-node
- DwainZwerg
- dwaltsch
- Dwarf
- Dwarf:一款基于Pyqt5和Frida的逆向分析调试工具
- DWARF/PDB Support
- dwarf2json
- dwisiswant0
- dwm-screen-shot:将shellcode注入dwm.exe以进行屏幕截取
- Dwood15
- Dwordcito
- dygraphs
- Dyld Shared Cache
- dyld_shared_cache_util.cpp
- dyld中mach-o文件加载的简单分析
- Dynamic alert routing with Prometheus and Alertmanager
- Dynamic analysis of iOS apps w/o Jailbreak
- Dynamic API Call Tracer for Windows and Linux Applications: Drltrace
- Dynamic attack
- Dynamic binary analysis and obfuscated codes
- Dynamic binary instrumentation for deobfuscation and unpacking
- Dynamic capa: Exploring Executable Run-Time Behavior with the CAPE Sandbox
- Dynamic classification of packing algorithms for inspecting executables using entropy analysis
- Dynamic Data Resolver (DDR) - IDA Plugin
- Dynamic Instrumentation Tool Platform: DynamoRIO
- Dynamic Kubernetes Cluster Scaling at Airbnb
- Dynamic Secrets
- DynamoRIO
- dynamorio/drmemory
- dynamorio/dynamorio
- dynascan:动态敏感文件扫描器,实现动态字典渲染、动态结果判断、自动命中记录、的敏感文件扫描器
- dynStruct
- DynWin32-ReverseShell.ps1:通过 PowerShell 来获得反弹shell
- DzenIsRich
- DZone API Security Weekly
- dzonerzy
- e-book on leanpub.com
- e-Marefa - The Digital Arabic Database : Studies & Researches
- e2002e
- e5150
- e9patch:一个强大的静态二进制重写工具
- EagleEye
- ealeksandrov/provisionql
- eaphammer
- earlbread
- Early Australian Census Records
- earni.fi
- Earning.Farm attack
- earth
- Earth Cam
- Earthcam
- EarthCam AU
- earthlng
- easely
- easily
- Easily extensible
- Easy Quick Start Guide For Crypto Data Analytics
- Easy Random Name Picker
- Easy whois
- EasY_HaCk
- EasyDMARC Domain Scanner
- EasyFrp:FRP GUI 版本实现
- easyhook/easyhook
- Easylist
- Easymap
- EasyPen:Python + wxPython编写、提供简洁图形界面、支持跨平台的安全扫描工具,可用于企业内外网巡检、应急响应
- EasyStreet
- Ebay Australia
- Ebooks & Whitepapers
- Ebooks & Whitepapers
- ebowla
- ebramanti
- ecapture:通过 hook ebpf 技术,无需CA证书,进行HTTPS的明文通讯抓包、bash 命令捕获和 MySQL query 等数据库审计
- ECDSA 签名中的私钥泄露:elliptic 库畸形输入漏洞分析
- ECE 462 Object-Oriented Programming using C++ and Java - Purdue
- ECE 4760 (Digital Systems Design Using Microcontrollers) at Cornell for the Fall, 2022
- ECE 4760 Designing with Microcontrollers Fall 2016, Cornell University
- ECE 498AL - Programming Massively Parallel Processors
- ECE 5030 - Electronic Bioinstrumentation, Spring 2014 - Cornell University
- ECE 5760 - Advanced Microcontroller Design and system-on-chip, Spring 2016 - Cornell University
- ECE 5984 Introduction to Machine Learning, Spring 2015 - Virginia Tech
- ECE 8851: Reinforcement Learning
- ECE/CS 438 - Communication Networks, Fall 2020 - UIUC
- ECE/CS 5780/6780 - Embedded Systems Design, Spring 14 - University of Utah
- ECE524 Foundations of Reinforcement Learning at Princeton University, Spring 2024
- Echidna
- Echo
- Echo Show eMMC Image
- Echo Show Userdata Partition Image
- echoCTF.RED
- Echosec
- echosec.net
- Eclipse IDE for Java Developers
- Eclipser
- ECMA 262
- ecmadao
- ECMAScript 6 from an Attacker's Perspective - Breaking Frameworks, Sandboxes, and everything else
- Ecode
- Ecosyste.ms
- Ecosystem
- ECS 122A - Algorithm Design and Analysis, UC Davis
- ECS 124 - Foundations of Algorithms for Bioinformatics - Dan Gusfield, UC Davis
- ECS 150 - Operating Systems and Systems Programming - Fall 2020 - Joël Porquet-Lupine - UC Davis
- ECS 175 - Computer Graphics, Fall 2009 - UC Davis
- ECS 222A - Graduate Level Algorithm Design and Analysis, UC Davis
- ECS 36C - Data Structures and Algorithms (C++) - Spring 2020 - Joël Porquet-Lupine - UC Davis
- ECS235B Foundations of Computer and Information Security - UC Davis
- ECSE 421 - Embedded Systems - McGill
- ECSE-4540 - Intro to Digital Image Processing - Spring 2015 - RPI
- ECShop 0day 的堕落之路-2.x加3.x的SQL注入和代码执行
- ecthros/uncaptcha2
- ECU
- ECU Reflashing Detector Demo
- Ed25519 实现原理与可延展性问题
- Edb
- EDGAR Online
- EDGAR U.S. Securities and Exchange Commission Filings
- Edgar: Solving Mysteries Faster with Observability
- Edge Computing Technology and Applications
- EdgeSecurityTeam
- Edge被吐槽向微软发送包含用户SID和访问站点完整URL等在内的信息
- edisk.cz
- edisonljh/hadoop_ftk
- editor-Ajian
- edlib
- edoardottt
- EdOverflow
- EDR and Blending In: How Attackers Avoid Getting Caught
- EDR and Blending In: How Attackers Avoid Getting Caught
- EDR-Bypass-demo:Some demos to bypass EDRs or AVs
- edrdo
- EduApps-CDG
- edumco
- eduquintanilha
- Edward-Larson
- EdwardLarson
- EdX KTHx ID2203 Reliable Distributed Algorithms
- Edznux
- EE 259 – Principles of Sensing for Autonomy – Spring 2023 - Stanford University
- EE 380 Colloquium on Computer Systems - Stanford University
- EE104: Introduction to Machine Learning - Stanford University
- EE260 Embedded Systems by Robert Paz
- EE319K Embedded Systems - UT Austin
- EE364a: Convex Optimization I - Stanford University
- EE445L Embedded Systems Design Lab, Fall 2015, UTexas
- EE512A - Advanced Inference in Graphical Models, Fall Quarter, 2014
- EE637 - Digital Image Processing I - Purdue University
- EE675 (2024) Introduction to Reinforcement Learning Course | IIT Kanpur
- EECS 298 Theory of Computational Neural Networks and Machine Learning (Fall 2020) - UC Irvine
- EECS 373 - Introduction to Embedded System Design - University of Michigan
- EECS 498/598 - Deep Learning for Computer Vision - University of Michigan - Fall 2019
- eenblam
- EENG 512/CSCI 512 - Computer Vision - Colorado School of Mines
- Eeyes(棱眼)-快速筛选真实IP并整理为C段
- ef1500
- EFF Surveillance Self-Defense Guide
- Effective, efficient, and robust packing detection and classification
- effectiveaml.org
- Efficient and automatic instrumentation for packed binaries
- Efficient automatic original entry point detection
- Efficient malware packer identification using support vector machines with spectrum kernel
- Efficient SVM based packer identification with binary diffing measures
- EfficientNet PyTorch
- efforg/privacybadger
- EFI DXE Emulator
- EfiGuard
- EfsPotato:Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability)
- egebalci/amber
- EggShell
- egofer
- egormanga
- Egressbuster
- EgressCheck Framework
- ehabkost
- eharmony Australia
- eharris128
- Eherscan Manual
- ehlewis
- Ehliman
- EHole(棱洞)2.0 重构版-红队重点攻击系统指纹探测工具
- ehorvat-infobytesec
- eHow
- ehr_SafeCodeEncode_tamper:宏景ehr sql注入的tamper脚本
- ehrenb
- ehsandeep
- Eigen
- eigenphi.io
- eigenphi.io/mev/eigentx
- eighthave
- eInvestigator
- EIP-3156: Flash Loans
- Eitot
- Ejemplo de Uso de schemaspy
- ek1ng
- ekalin
- ekilmer
- Ekko:一种使用 CreateTimerQueueTimer 将执行 Sleep 混淆的 ROP 链排队的小型 sleep 混淆技术
- ekristen
- ekstrah
- Ekultek
- Elastic Stack (v6/v7)
- Elastichoney
- Elbert Alias
- elceef
- elceef/bitlocker
- elderdrivers/edxposed
- ele7enxxh/android-inline-hook
- ELEC2141 Digital Circuit Design, UNSW
- ElecFuzz:电器协议 fuzz 工具
- ElecKey
- eLection:1
- Electron Security Checklist
- Electronic Access Control
- Electronic Code Book
- Electronic Postage Systems: Technology, Security, Economics
- Element
- ELEN E4810 - DIGITAL SIGNAL PROCESSING - Fall 2013 - Columbia
- ELEN E4896 - MUSIC SIGNAL PROCESSING - Spring 2016 - Columbia
- Elevator:UAC Bypass by abusing RPC and debug objects.
- elevenpaths.com
- ELF (Executable Linkable Format) file parser
- elf (FreeBSD manual pages)
- ELF Coredump
- ELF hacking with Rekall
- ELF Hooking
- ELF-Miner: Using structural knowledge and data mining methods to detect new (Linux) malicious executables
- ELFant in the Room – capa v3
- ELFCrypt
- ELFLoader:在内存中加载或者运行 ELF 对象的通用工具
- elfmaster/libelfmaster
- elfmaster/saruman
- ElfQrin
- ELFuck
- eliben/pyelftools
- eliboa
- elicn
- Elie Saad
- elig0n
- Eliminating false positives
- Eliminating toil with fully automated load testing
- EliseZeroTwo/iBoot-Binja-Loader
- Elite Singles
- eliyastein
- eljeffeg
- ElleKit
- ellerbrock
- elliotechayush
- elliptic.co
- ELM327
- elmarco
- Eloston/ungoogled-chromium
- elpscrk
- elsapet
- Elsevier
- Eluta
- Eluta (Canada)
- elzdave
- Email Address Validator
- Email address, phone number and human name extraction
- Email Extractor
- Email Format
- Email Hunter
- Email Permutator
- Email Permutator+
- Email Search | Reverse Email Lookup - Spokeo
- Email Spoofing
- Email to Flickr account
- Email to Flickr account part 2
- Email to Twitter account
- Email Validator
- Email Validator Tool
- Email Verifier - Verify Email Address For Free With Our Verifier Tool
- EMAIL_ADDRESSES
- Email-enum
- email-format.com
- emailfinder
- EmailHippo
- EmailRep
- Emails
- EmailScanner
- EmailSearch.io
- EmailSherlock
- Email地址检查、检测Email地址真实性、检测电子邮件地址真实性--查错网
- emanuelduss
- Embedded Device Security
- Embedded Networking with CAN and CANopen
- Embedded Software Testing - IIT Madras
- Embedded SRE at Mercari
- Embedded Systems - IIT Delhi
- Embedded Systems Class - Version 1 - 2011 - UNCC
- Embedded Systems Design - IIT Kharagpur
- Embedded Systems using the Renesas RX63N Processor - Version 3 - UNCC
- Ember
- EMBER: An open dataset for training static PE malware machine learning models
- Embrace the Chaos … Engineering
- EmbraceAn
- emdivi_postdata_decoder
- emdivi_string_decryptor
- Emergent
- Emerging Threats - Open Source
- EmilienCourt
- Emiller’s Advanced Topics In Nginx Module Development
- Emiller’s Guide To Nginx Module Development
- EmilLuta
- emilyanncr
- emmina
- EmobileTracker
- emoon/prodbg
- Emotet maldoc - Embedded DLL and CertUtil for Base64 Decoding, includes analysis on YouTube
- Emotet templates for the week of Oct 05 - Oct 09
- Emotet templates for the week of Oct 12 - Oct 16
- Emotet templates for the week of Sept 28 - Oct 02
- Emotet x64 Stack Strings Config Emulation | OALabs Research
- Emotions Revealed: Understanding Faces and Feelings - Prof Paul Ekman
- emp3r0r-Linux后渗透框架
- empijei
- Empire
- Empire Cheat Sheet
- Empire: LupinOne
- Empire实战域渗透
- EmporiumTools
- emrKBQA: A Clinical Knowledge-Base Question Answering Dataset
- emteere
- emtuls
- Emu
- Emulating malware with Dumpulator
- Emulator
- Emulatori Android
- Enable Debugging Mode in SSH to Troubleshoot Connectivity Issues
- enabled
- EnableWindowsLogSettings
- Enabling branch deployments through IssueOps with GitHub Actions
- Enabling Client-Side Crash-Resistance to Overcome Diversification and Information Hiding
- Enabling Highly Available Trino Clusters at Goldman Sachs
- Enaium
- Encapsulation: an approach to operating system security
- EnCase
- Encoded executable file detection technique via executable file header analysis
- encodedguy
- encoder
- Encrypt and Decrypt Data
- Encrypt locally
- Encrypted Disk Detector
- Encrypted file system forensics - Introduction (EXT4) [FREE COURSE CONTENT]
- Encrypted File System Lab
- encrypted-client-hello
- encrypted-client-hello-the-future-of-esni-in-firefox
- EncSF MP
- Encyclopaedia Of Windows Privilege Escalation by Brett Moore
- EnDe
- endgameinc/ember
- endgameinc/xori
- Endlessh
- Endpoint Detection and Response (EDR)
- Endpoint Detection and Response: How Hackers Have Evolved
- Endpoint Detection and Response: How Hackers Have Evolved
- energee
- Eneru
- Enforcing best practice on self-serve infrastructure with Terraform, Atlantis and Policy As Code
- enganese
- Engine
- Engineering antivirus evasion
- Engineering Failover Handling in Uber’s Mobile Networking Infrastructure
- Engineering Mathematics (UW ME564 and ME565) - Steve Brunton
- Engineering operational excellence, a case of continuous improvement
- Engineering Probability (ECSE-2500) - RPI
- Engineering Reliable Mobile Applications
- Engineering Security
- Enginuity Social Search
- English Version
- engn33r
- ENGR108: Introduction to Applied Linear Algebra—Vectors, Matrices, and Least Squares - Stanford University
- ENGR486 Robot Modeling and Control (2014W)
- engyrus
- Enhancement request
- Enhancing Elasticsearch Performance: Innovative Reindexing Strategies Using Dedicated Nodes and KEDA Autoscalers
- Enhancing Ethereum Blockchain Investigations Using OSINT
- Enhancing machine learning based malware detection model by reinforcement learning
- Enhancing security and trust with AWS WAFv2
- Enigma
- Enigma Protector
- Enigma Virtual Box
- EnigmaGroup
- Eniro
- Eniro (Sweden)
- ENISA THREAT LANDSCAPE FOR 5G NETWORKS
- enjarify
- enkelli
- enomothem
- enovella
- enrico204/unhide
- EnricoMonese
- Enrollment over Secure Transport
- ENS chainstory.xyz
- ens.vision
- ensideas.com
- Ensuring High Availability of Ads Realtime Streaming Services
- Ensuring Site Reliability through Security Controls
- ent (supported, complete
- Enter the Abattoir - Building 'à la carte' gitops tooling
- Enterprise
- Enterprise Roadmap to SRE
- Enterprise-Registration-Data-of-Chinese-Mainland
- Enterprises
- EntityCube
- Entropy analysis to classify unknown packing algorithms for malware detection
- Entropy and the distinctive signs of packer PE files
- entropy computation
- Entropy5
- EntropyFix:减少payload 的熵
- enty8080
- EnuBox:Mattermost
- enum4linux
- enum4linux-ng
- Enumdb
- Enumeration is the Key
- Enumeration-as-a-Service
- enumerepo
- envalid
- Envensi
- Environment credentials
- Environment Variable and Set-UID Lab
- Enyby
- enzok
- EONRaider
- EOS BP nodes security audit
- EOS BP nodes security checklist
- EOS smart contract security best practices
- EOS 假充值手法
- EOS 天眼(EOS MonKit)
- eos175
- eoto88
- EPack
- Epagneul
- EPFL ME 425 Model Predictive Control fall 2020, by Colin Jones
- epi052
- Epic Privacy Browser
- EpicVIN
- Epieos
- EpiSurf: metadata-driven search server for analyzing amino acid changes within epitopes of SARS-CoV-2 and other viral species
- epreston
- EQGRP
- EquationExploit:JAVA 版本永恒之蓝双脉冲星漏洞利用工具
- EraLend attack
- eranyanay/1m-go-websockets
- Eraser
- ERC-20 token standard
- ERC20
- ErdemOzgen
- Erdemstar
- erdnaxe
- Erebus-Cobalt Strike后渗透测试插件,包括了信息收集、权限获取、密码获取、痕迹清除等等常见的脚本插件
- erenJag
- erev0s
- erfg12/memory.dll
- Erfrp:Erfrp-frp二开-免杀与隐藏
- ERIC - Education Resources Information Center
- EricHorvat
- Erigon + Otterscan
- Erigon Archive Nodes
- erigoneth Node
- erikdubbelboer
- erikvarga
- Eriys
- erk3
- ERMDS: A obfuscation dataset for evaluating robustness of learning-based malware detection system
- ernestognw
- erocarrera/pefile
- Eronona-Packer
- EROS: a fast capability system
- error
- Error Budget Policy - Part 1 - Adoption at Expedia Group
- Error Budget Policy - Part 2 - Practices at Expedia Group
- Error Correcting Codes - IISC Bangalore
- error dns response
- Error Prone – Static Analysis Tool
- ErrOr SquaD
- ErvalhouS
- ErvisTusha
- erwanlr
- ES 661 (2023): Probabilistic Machine Learning - IIT Gandhinagar
- ES File Explorer Open Port Vulnerability
- es4forensics
- esaunders
- Escalate_Linux
- Escalating privileges with ACLs in Active Directory
- Escape
- Escape and Evasion Egressing Restricted Networks
- escape-html
- ESCAPE: Entropy score analysis of packed executable
- Escaping Containers to Execute Commands on Play with Docker Servers
- Escaping Docker container using waitid() – CVE-2017-5123
- Escaping Docker Privileged Containers
- Escaping from Restricted Shell and Gaining Root Access to SolarWinds Log & Event Manager (SIEM) Product
- Escaping privileged containers for fun
- Escaping Restricted Linux Shells
- Escaping the Whale: Things you probably shouldn’t do with Docker (Part 1)
- Escapingbug
- escar conference
- eset-research
- eset/ipyida
- eset/volatility-browserhooks
- Eshaan Bansal
- eshaan7
- eships.net
- esilsolve
- eslint-plugin-anti-trojan-source
- eslint-plugin-security
- esnet/iperf
- ESNI
- espenfjo
- esperti/nbtempox
- espi0n/Dockerfiles
- ESPot
- espressif/esptool
- Espresso: brewing Java for more non-volatility with non-volatile memory
- Esri
- Essential Mathematics for Machine Learning- July 2018 - IIT Roorkee - YouTube Lectures
- Essential Node.js Security
- Essential Tools
- Establishing SRE Foundations: A Step-by-Step Guide to Introducing Site Reliability Engineering in Software Delivery Organizations
- esterhlav/black-scholes-option-pricing-model
- estk:查询和备份各种 Elasticsearch 和 Kibana 版本的数据工具
- estroz
- Eta06
- etcd
- ETeissonniere
- eteran
- eteran/edb-debugger
- eternal_scanner
- EternalLearner42
- ETH Gossip
- ETH On-chain price
- Eth Security Toolbox
- ETH Toolbox
- Eth Tx Decoder
- ETH Zürich | Deep Learning in Scientific Computing 2023
- ETH Zürich Advanced Machine Learning fall 2019, by Joachim M. Buhmann
- ETH Zürich AI in the Sciences and Engineering
- eth_deposits Tornado - Dune Dashboard
- eth-explorers-extension
- eth-txns.vercel.app
- ETH-USDT Flow
- eth0izzle
- ethanlacerenza
- ethcmd
- Ether Chain
- Ether: Malware analysis via hardware virtualization extensions
- Ethereum (ETH) OSINT investigations tools
- Ethereum archive nodes
- ethereum censorability monitor
- Ethereum Datafarm: Parsing Historic Event Data from the Ethereum Blockchain into CSV files using the Etherscan API
- Ethereum Full Node vs Archive Node
- Ethereum input data decoder
- Ethereum leveldb Explorer
- Ethereum Security Tools List
- Ethereum Smart Contracts Visualisation Tools: Surya, Solgraph, Slither, Piet, Sol2UML and Sol Function Profiler
- Ethereum-graph-debugger
- EtherScan
- Etherscan 101
- Etherscan phish-hack.csv Labels
- Etherscan Transforms for Maltego
- etherscan.deth.net
- etherscan.io
- EtherSploit-IP
- EtherUnpack
- Ethical Hacker Club
- Ethical Hacking Complete E-book for Beginners
- Ethical Hacking Value and Penetration testing
- Ethical Hacking, A Comprehensive Playlist covering almost everything
- ethicalhack3r
- Ethics and Forensics- Time To Take A Hard Look | By Marisa Dery
- EthLint
- EthOver
- ethplorer.io
- ethRE
- ethtective.com
- ethtx.info
- Etools
- Etrigg
- Etsy’s Debriefing Facilitation Guide for Blameless Postmortems
- Ettercap
- Ettus USRP B210
- ETW注册表监控windows内核实现原理
- EU CSIRT network members advisories, maintained by ENISA
- eugene7646
- eugk
- eur0pa
- eurecom-s3/actaeon
- eurecom-s3/linux_screenshot_xwindows
- Eureka
- Eureka: A framework for enabling static malware analysis
- Eurojobs
- Euronews
- Europages
- Europe/Zurich time
- European 5G Security in the Wild: Reality versus Expectations
- European Business Register
- European Scrambling Systems, Circuits, Tactics and Techniques
- European Union Open Data Portal
- Eurostat
- Evading anti-malware engines with deep reinforcement learning
- Evading CSP with DOM-based dangling markup
- Evading machine learning malware detection
- Evading packing detection: Breaking heuristic-based static detectors
- Evading Sysmon DNS Monitoring
- EvanHahn
- evanrichter
- evasi0n writeup by geohot
- Evasor - 自动化查找可执行文件的安全评估工具
- eve-mem
- EveBox
- Even more principles (from David Wagner)
- Event
- Event Log Observer
- Event2Timeline
- Eventbrite
- EventID Policy Map
- EventList
- EventList, Matching Windows Event Log IDs With MITRE ATT&CK - Miriam Wiesner
- Events
- Events & Webinars
- Events & Webinars
- Events and Errors - Windows Server 2008
- Events to Monitor
- EventTracker Knowledgebase
- Eventually Consistent Service Discovery
- everettjf
- everettjf/machoexplorer
- Evernote: Universal-XSS, theft of all cookies from all sites, and more
- everping
- every single stargazer
- Everyone's Docker/Kubernetes
- Evil Teacher: Code Injection in Moodle
- Evil XML with two encodings
- evil_minio: EXP for CVE-2023-28434 MinIO unauthorized to RCE
- Evil-create-framework
- Evil-Winrm
- EvilApp (Hijack Session)
- evilarc:创建带目录创越的zip/tar 压缩包
- evilcos
- EvilEye:它用于从内存中检测cobaltstrike信标并提取一些配置
- Evilginx2
- Evilgrade
- EvilOSX
- EvilPDF:一款把恶意文件嵌入在 PDF 中的工具
- Evilreg -使用Windows注册表文件的反向Shell (.Reg)
- Evilscan
- EvilSelenium:将Selenium 武器化以攻击 Chrome 的工具
- evilsocket
- EvilTwin
- EvilURL
- evilzip:制作恶意的zip压缩包工具
- EVM deep dive
- EVM Lab
- EVM Networks List
- EVM toolkit
- EVM Tools
- evm-cfg
- evm-trace
- EVM:1
- evm.codes
- EVMc
- EVMole
- EVOLUTION OF ANDROID EXPLOITS
- Evolution of Observability Tools at Pinterest
- Evolution Of Our Continuous Delivery Process
- Evolutionary robotics course. Spring 2025
- Evolving our content infrastructure
- EVTX parser
- EVTX-ATTACK-SAMPLES
- EVTX-to-MITRE-Attack
- evtx2bodyfile
- evtxanalyze
- evtxcat
- EvtxECmd
- EvtxECmd Map Repository
- evtxls
- evtxscan
- EvtxToElk
- EvtxToElk: A Python Module to Load Windows Event Logs into ElasticSearch
- EVTXtract
- evverx
- evyatarguardicore
- evyatarmeged
- EW Skuzzy
- ew-内网穿透(跨平台)
- ewchow
- EwertonQueiroz
- EXALead
- example
- Example contribution guidelines
- Example issue templates
- Example of the use
- Example README.md file
- Example security.txt (Cloudflare)
- Excel Decodes DLL (Campo Loader) w/ Certutil for next stage retrieval - includes analysis on YouTube and IDA Plugin for String Deobfuscation
- Excel doc drops Guloader
- Excel doc drops Qakbot
- Excel doc drops Raccoon
- Excel document uses VBA macros to execute cmd.exe to run Powershell script -> Downloads WarzoneRAT over HTTPS
- Excel document uses XLM macros to execute cmd.exe to download/run MSHTA script -> Downloads Powershell script -> Downloads Emotet DLL
- Excel downloads AsyncRAT
- Excel drops AgentTesla
- Excel drops IcedId - Uses VBA macros to execute Excel 4 macros in hidden sheet/hidden columns
- Excel drops LokiBot
- Excel drops Qakbot (qbot) DLL
- Excel drops Qakbot (qbot) EXE
- Excel drops TransparentTribe (.NET) with CNC Check-in
- EXCEL依赖库
- Exchange forensics: The mysterious case of ghost mail (II)
- Exchange forensics: The mysterious case of ghost mail (III)
- Exchange forensics: The mysterious case of ghost mail (IV)
- Exchange_SSRF
- Exchange在渗透测试中的利用
- Exchange服务器远程代码执行漏洞复现分析
- Excite
- EXE
- EXE Bundle
- EXE Guarder
- EXE Stealth
- EXE Wrapper
- Exe2hex
- exe2shellcode:远程下载并在内存中执行 shellcode 的框架
- Exe32Pack
- exec2shell: 将PE、ELF或Mach-O可执行文件的TEXT部分提取为shellcode
- EXECryptor
- Executable and linkable format (ELF)
- Executable and linking format (ELF) specification
- Executable file formats
- Execute combine multiple linux commands in one line (original)
- Executive Insights
- Executor内存马的实现
- Executor内存马的实现(二)
- ExeFog
- Exegol
- Exegol-docs
- Exegol-images
- Exegol-resources
- ExeGuard
- EXELOCK 666
- ExeScan
- EXETools
- Exfiltration
- Exhibit
- Exif
- EXIF Data Viewer
- Exif Search
- Exif Tool
- Exif Viewer
- exif vulnerability
- ExifLooter
- ExifShot App
- ExifTool
- exiftool.rb
- EXIFviewer.org
- EXIF信息查看器
- existing issues
- exit/quit
- Exiv2
- EXOCET-AV-Evasion:可绕过杀软的 Payload 投递工具
- Exonera Tor
- exp-hub-漏洞复现、批量脚本
- expdevBadChars
- Expect the Unexpected: Preparing SRE Teams for Responding to Novel Failures
- Experiences from performing software quality evaluations via combining benchmark-based metrics analysis, software visualization, and expert assessment
- experimental
- Experimental comparison of machine learning models in malware packing detection
- Experimental toolkit for manipulating executable packing
- Experimental toolkit for studying executable packing - Analysis of the state-of-the-art packing detection techniques
- Expert .NET 2.0 IL Assembler
- Experte email finder
- ExpertGuide
- ExpertiseFinder
- ExpertPages
- Experts.com
- expireddomains.net
- Explanation of everything you can see in htop/top on Linux
- Explo
- exploide
- Exploit Database Google Hacking Cheat Sheet
- Exploit developement
- Exploit Development 1: Overwriting Instruction Pointer
- Exploit Development 2: Ret2libc
- Exploit Exercises
- Exploit Exercises - Nebula
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)
- Exploit Mitigation Techniques - Data Execution Prevention (DEP)
- Exploit mitigation techniques in OpenBSD
- Exploit Observer - The World's Largest Exploit & Vulnerability Intelligence Database
- Exploit Observer - The World's Largest Exploit & Vulnerability Intelligence Database
- Exploit Research Megaprimer
- Exploit Writing Tutorials for Pentesters
- exploit-suggester
- Exploit.Education
- exploit.observer
- exploitalert:漏洞搜索网站
- exploitalert.com
- exploitdb
- ExploitDepository:一个花里胡哨的Exploit运行框架
- Exploiting a Mis-Configured NFS Share
- Exploiting a V8 OOB write.
- Exploiting Active Directory-Integrated DNS
- Exploiting capabilities
- Exploiting CSRF on JSON endpoints with Flash and redirects
- Exploiting CVE-2021-44228 using PDFs as delivery channel - PoC
- Exploiting Node.js deserialization bug for Remote Code Execution
- Exploiting Online Games: Cheating Massively Distributed Systems
- Exploiting prototype pollution – RCE in Kibana (CVE-2019-7609)
- Exploiting XSS with 20 characters limitation
- Exploiting XXE with local DTD files
- exploiting-almost-every-antivirus-software
- ExploitMe Mobile Android Labs
- ExploitMe Mobile iPhone Labs
- ExploitOnCLI
- Exploits
- Exploits 1: Introduction to Software Exploits
- Exploits 2: Exploitation in the Windows Environment
- Exploits_and_Advisories:由项目作者自己跟踪或者是发现的一些公开的漏洞和利用
- Exploration of Cryptocurrencies
- Explore Bitcoin
- explorer.0x.org
- explorer.bitquery.io
- explorer.forta.network
- explorer.swiss-knife.xyz
- Explorers List
- Exploring and Exploiting iOS Web Browsers
- Exploring LTE security and protocol exploits with open source software and low-cost software radio by Roger Jover
- ExportData
- Exporter
- Exposed Forum
- Exposed Source Code
- express-brute
- express-enforces-ssl
- express-limiter
- eXPressor
- ExpressVPN
- Exrop
- ext4: using external journal to optimize performance
- Extended detection and response (XDR)
- Extended Mobile Forensics: Analyzing Desktop Computers
- Extended XSS Searcher and Finder
- Extending a logical volume
- Extending IDA processor modules for GDB debugging
- Extending the new WinDbg, Part 3 – Embedding a C# interpreter
- Extensive usage breakdown
- External target access
- Extract Digital Evidences From Images: Imago-Forensics
- Extract Meta Data
- extract-endpoints
- ExtractFace
- Extracting and Parsing PE signatures en masse
- Extracting BitLocker keys with Volatility (PoC)
- Extracting FileVault 2 Keys with Volatility
- Extracting Forensic Script Content from PowerShell Process Dumps
- Extracting NTLM Hashes from keytab files
- Extracting Prefetch from Memory
- extraction
- Extraction and analysis of retrievable memory artifacts from Windows Telegram Desktop application
- eXtrem0us
- Extreme Classification
- extremecoders-re
- Extundelete
- eyes.sh:基于bugscan dnslog 优化版
- EyeWitness
- eyouRCE:(CNVD-2021-26422)亿邮电子邮件系统 远程命令执行漏洞 python版本
- EyupErgin
- eze-kiel
- Ezequieltbh
- ezerinz
- Ezgif
- ezhevita
- ezhil56x
- Ezilon
- ezsploit
- Ezuri
- ezyang/htmlpurifier
- f-amato
- f-block/rekall-plugins
- F-Droid
- F-Droid Server
- f0psi
- F0rZ4-S
- f0wl
- F13
- F1t1
- f1xpl/openauto
- FAA Registry
- FAA Registry - Aircraft - N-Number Inquiry
- fabacab
- fabaff
- fabcz
- Fabian9799
- fabidick22
- FabioBaroni
- fabrimagic72/malware-samples
- Faceagle
- Facebook
- Facebook Bug Bounties
- Facebook CTF - Secret Note Keeper
- Facebook Donation Doubles the Volatility Plugin Contest Prizes
- Facebook Embeds 'Hidden Codes' To Track Who Sees And Shares Your Photos
- Facebook Friend List Scraper
- Facebook ID Identifier
- Facebook Information Publisher
- Facebook Intersect Search Tool
- Facebook Live Map
- Facebook Messenger
- Facebook OAuth Framework Vulnerability
- Facebook Open Graph
- Facebook Search Basics
- Facebook Search Tool
- Facebook Sleep Status
- Facebook Social Monitoring
- Facebook Tips
- Facebook-BruteForce
- facebook.com/livemap
- Facebook's DeepFake Detection Challenge (DFDC) train dataset
- facebook/chisel
- facebook/ds2
- facebook/fbkutils
- facebook/fishhook
- facebook/idb
- facebook/openbmc
- facebook/redex
- FacebookCT
- facebook正在你下载的照片中嵌入跟踪数据
- FaceCheck.ID
- FaceForensics++
- FaceLIVE
- Facenama
- FaceNiff
- facesearch
- FACS01-01
- Fact Check
- fact0real
- Factbites
- Factiva
- Factual Search
- FaDe
- fadeevab
- FadeMind
- faern
- FaganFinder
- FahimFBA
- fail0verflow
- Fail2Ban
- Fail2Ban Blacklist JAIL for Repeat Offenders
- Failure is Not an Option
- Fake Address, Random Address Generator
- fake clothing order Berhanu (PURCHASE DEPARTMENT) using winace files delivers Loki bot
- Fake Follower Check
- Fake Person/Name Generator
- Fake Person/Name Generator | User Identity, Account and Profile Generator
- Fake Spot
- FakeBTS
- FakeImageExploiter
- fakelogonscreen-伪造(Windows)系统登录页面,截获密码
- FakeNet-NG
- fakepepsilol
- faker.js
- FakeTLS:模拟 TLS 1.3 以伪装 C2 活动的客户端/服务器代码
- fakoor
- Falco
- faleksic
- fallingcubes
- false positives
- fam4r
- Family Search
- Family Tree Now
- Family Watchdog
- FamilySearch
- FamilyTreeNow
- Fancybear
- fancybody
- fancycode/memorymodule
- fangyinc
- Fanhez
- fanimalikhack
- Fanpage Karma
- fanquake
- Fantastic Conditional Access Policies and how to bypass them
- fantesykikachu
- fanzhidongyzby
- FAQ
- FAQ & Common Issues
- FAQ & Common Issues
- FAQ & Troubleshooting
- faraday
- Faraday Docs
- FaradaySEC FAQ
- faradaysec.com
- Farewell to the Token Stealing UAC Bypass
- fariss
- Faroo
- Fartknocker
- Fast and flexible observability with canonical log lines
- Fast and robust fixed-point algorithms for independent component analysis
- Fast builds, secure builds. Choose two.
- Fast Forensics with Hayabusa and Splunk
- Fast password cracking - Hashcat wordlists from RAM
- fast.ai Code-First Intro to Natural Language Processing
- Fastcase Docket Alarm
- FastCGI Extension
- Fastfinder
- fastify-csrf
- fastify-helmet
- fastify-rate-limit
- Fastjson <= 1.2.47 远程命令执行漏洞利用工具及方法
- FastJson =< 1.2.47 反序列化漏洞浅析
- fastjson 1.2.68 autotype bypass gadget 的一种挖掘思路
- fastjson 1.2.80 漏洞分析
- FastJson 反序列化学习
- fastjson_payload
- fastjson_rce_tool-fastjson命令执行自动化利用工具, remote code execute,JNDI服务利用工具 RMI/LDAP
- fastjson_rec_exploit-fastjson一键命令执行(python版本)
- fastjson-c3p0:fastjson不出网利用、c3p0
- Fastjson-Gadgets-Automatic-Scanner:Python 编写的扫码 jar 包里的 fastjson 利用链
- Fastjson:Fastjson姿势技巧集合
- FastjsonPoc:Fastjson 1.2.80 反序列化代码 Demo 以及环境
- FastjsonScan:Fastjson扫描器,可识别版本、依赖库、autoType状态等
- Fastjson不出网利用总结【很详细的说明总结】
- FASTJSON反序列化之基于JNDI利用方式
- fastjson反序列化利用
- Fastjson反序列化漏洞调试分析
- fastlorenzo
- FastPeopleSearch
- Fastssh
- Fat Fingers
- FatELF: Universal binaries for Linux (HALTED)
- Fathomless
- Fatt
- FAU Open Research Challenge Digital Forensics
- FavFreak:执行基于favicon.ico的侦察
- favicon-hashtrick
- fay59
- faynopi
- FazaN
- fazlearefin
- fb0sh
- fbarriga
- FBCTF
- FBCTF 2019
- fbctf_2019_products_manager
- fbdown.net
- fbht
- fbi
- FBUPv2.0
- fbvid
- FB公开课录像:隐蔽通信(FQ)和侦查取证那些事儿
- fc-proxy:利用阿里云函数当作代理池
- fcasal
- Fdawgs
- fdfalcon
- Feandil
- Fear-free PostgreSQL migrations for Rails
- FeatherDuster
- Feature overview
- feature request
- Feature selection for malware detection based on reinforcement learning
- Feature selection: A data perspective
- Feature set reduction for the detection of packed executables
- Features
- febrezo
- February 28th DDoS Incident Report
- February service disruptions post-incident analysis
- February Threat Reports
- Federal Bureau of Prisons - Inmate Locator (US)
- Federico Gibertoni
- federicodotta
- federicodotta/brida
- federicofantini
- federicotorrielli
- Fedora Pagure
- Fedora Security Lab
- Fedora/CentOS/Redhat
- Feed Exileed
- Feed Filter Maker
- Feedback & suggestions
- FeedBooster
- Feederator
- Feeding /dev/random entropy pool? (original)
- Feedly
- FeedReader
- Fei Protocol attack
- Feimaomii
- feitengchen
- felipecaon
- felipecrs
- felixfontein
- felixonmars
- felixstorm
- FelloBoiYuuka
- Felon Spy
- fen0s
- Feodo Tracker
- feodotracker.abuse.ch
- feralinteractive/gamemode
- Fern @f3rn0s
- fern-wifi-cracker
- fernandolobato
- feross/spoof
- feroxbuster:rust 编写的目录扫描工具
- ferranolivera
- fesh0r/fernflower
- FetchRSS
- FEX Memory Imager
- ff00ff-security
- ffr4nz
- FFRI Dataset Scripts
- ffuf-基于go开发的快速fuzz工具
- fgibertoni
- fguisso
- fhemberger
- fhessel
- fhightower
- Fiat-Shamir 冰心漏洞解析
- FickerStealer w/ IP check
- fidgetingbits
- FieldEffect-OperationalDevelopment
- Fieldmanual
- Fierce
- FiercePhish
- FILE
- File Chef
- File packing from the malware perspective: Techniques, analysis approaches, and directions for enhancements
- File Search Engine
- File systems
- File Upload
- File Upload Restrictions Bypass
- file-search.info
- filedescriptor
- FilelessPELoader: 在内存中加载远程AES加密过的PE文件并解密运行
- FileListing
- Fileprints: Identifying file types by n-gram analysis
- FilePursuit
- files.fm
- Filescan.io
- FileSearch:C++枚举磁盘列表、遍历指定盘搜索特定类型文件,微信导出密钥Socket/PUT回传,包括反射DLL版本
- filesearch.link
- filesearching
- filesec.io
- filesloop
- FileVault
- filhocodes
- Filigran-Automation
- filinpavel
- Filip Chyla @fchyla
- Filmot
- filter
- Filter strings on pcap files
- Filter/Servlet型内存马的扫描抓捕与查杀
- Fimap
- Final evaluation report of SCOMP
- Finally! BigQuery now supports Alter Table Rename & Drop
- FinalShell-Decoder:FinallShell 密码解密GUI工具
- Financial Derivatives & Risk Management - IIT Roorkee
- Financial Engineering Course: Interest Rates and xVA - Prof Grzelak
- Financial Mathematics - IIT Roorkee
- Find an awesome hacking spots in your country
- Find an Instagram user ID
- Find Face
- Find Hidden Web Directories with Dirsearch
- Find Info Using Shodan
- Find Last Connected USB on your system (USB Forensics)
- Find my Facebook ID
- Find My Facebook ID API
- Find My Past
- Find my snap
- Find Security Bugs – A SpotBugs plugin for security audits of Java web applications.
- Find SocialMedia By Facial Recognation System
- Find SocialMedia By UserName
- Find Stolen Art
- Find That Lead
- Find Threats in Event Logs with Hayabusa
- Find Twitter First Follower
- Find YouTube Video
- find-gh-poc
- Find-pdf-doc
- find-sec-bugs/find-sec-bugs
- Findbugs – Find Bugs in Java Programs
- FindBugs-IDEA Static byte code analysis to look for bugs in Java code
- findemails.com
- Finder Credit Check (AU)
- FindETH
- FindETH Tool
- Finding Forensic Goodness In Obscure Windows Event Logs
- Finding malware on memory dumps using Volatility and Yara rules
- Finding McAfee: A Case Study on Geoprofiling and Imagery Analysis
- Finding Order in Chaos: How We Automated Performance Testing with Torque
- Finding Passwords in SYSVOL & Exploiting Group Policy Preferences
- Finding the PID of the process using a specific port?
- Finding The Real Origin IPs Hiding Behind CloudFlare or TOR
- Findings from Ian Beer, Project Zero
- findIPv6
- findomain
- Findomain-跨平台的子域名爆破工具
- Findsploit
- findsubdomains
- FindtheCompany
- Findus23
- Findwith.me
- FineReportExploit: 基于go语言的帆软报表漏洞检测工具
- Finetune
- Finger-web指纹识别工具『质量根据规则库』
- FingerprintJS
- FingerprintJS Android
- FinnWilkinson
- Fino
- Finshir
- fintzd
- Fiora:漏洞PoC框架的图形版,快捷搜索PoC、一键运行Nuclei
- fire
- Fire-Pack
- fire1ce
- fireattack
- Fireaway
- FireEye Cyber Threat Map
- FireEye Memoryze
- FireEye OpenIOCs
- FireEye RedLine
- fireeye 威胁研究
- fireeye/flare-emu
- fireeye/flare-floss
- fireeye/flare-ida
- fireeye/idawasm
- fireeye/rvmi
- fireeye/silketw
- fireeye/volatility-plugins
- fireeye/win10_volatility
- FireEyeGoldCrystal:GitHub监控和信息收集工具
- firefart
- Firefox
- Firefox 1.0.4; DNSSEC Tools; Phisher's benefit use Google link; Viewing Chat Logs; Web Browser Forensics; Gecko Based Browers HTTP Authentication Prompt Vulnerability
- Firefox invalidate dns cache
- Firefox Monitor
- Firefox Multi-Account Containers
- Firefox 如何查看和切换 本地服务 与 全球服务
- firefox浏览器密码dump工具之.net版
- Firefox火狐国际版和中文版的区别
- FireJail
- Firesheep
- FireShot
- Firewall-VPN Lab: Bypassing Firewalls using VPN
- FireWall.X — 强大的 EOS 智能合约防火墙
- FireWall.X GitHub
- firexfly
- firezone:通过 web 界面来管理 wireguard
- FiringRange
- FirmAE:物联网设备固件模拟分析
- firmianay
- FirmWire:支持三星和联发科的全系统基带固件分析平台
- First 5 Commands When I Connect on a Linux Server (original)
- First demo
- First Look at Volatility 3 Public Beta
- First steps with Ghidra: crackme01
- First Tweet
- firstdraftnews.com/resource/visual-verification-guide-photos
- firstdraftnews.com/resources
- Fish4Jobs
- fishkerez
- Fisjkars
- FIT: Failure Injection Testing
- FIT9003 Database Systems Design - Monash University
- Five86:1
- Five86:2
- Fix IDA Crash bug on osx 10.14
- fix-lockfile-integrity
- Fixing Linux filesystem performance regressions
- Fixing security vulnerabilities with AI
- Fizz3
- Flag Submission
- Flags
- flake8
- Flan
- FLARE
- FLARE Script Series: Reverse Engineering WebAssembly Modules Using the
- Flare VM
- FLARE脚本系列:使用idawasm IDA Pro插件逆向WebAssembly(Wasm)模块
- Flash Boys 2.0:Frontrunning, Transaction Reordering, and Consensus Instability in Decentralized Exchanges
- Flash Earth
- FlashbackData
- Flashbots
- flask
- Flask Jinja2开发中遇到的的服务端注入问题研究
- Flask security architecture
- flask_memory_shell:Flask 内存马
- flask-session-cookie-manager-Flask Session Cookie Decoder/Encoder(flask框架的cookie或session编码/解码工具)
- Flask-SocketIO documentation
- FlaskJinja2 开发中遇到的的服务端注入问题研究 II
- flatpak/flatpak
- FLAWS
- flaws.cloud
- flaws.cloud
- Fleet device management
- Fleetmon
- flibustier
- flichtenheld
- Flicker Map
- Flickr
- Flight Aware
- Flight Aware(Historical)
- Flight Radar 24
- Flight Stats
- Flight Tracker | Flightradar24 | Track Planes In Real-Time
- FlightAware
- Flightradar24 — how it works? / Habr
- FlightStats
- FLIGHTVIEW FLIGHT TRACKER
- flightview.com
- Flightwise
- FLinares
- Flipboard
- flipboard/flex
- Flippity
- flipsidecrypto.xyz
- flo354/iosforensic
- floatas
- FloCon - Workshop: Intrusion Analysis and Threat Hunting with Open Source Tools - Demo files and Workshop on YouTube
- Florian Roth
- Florian Roth (@cyb3rops)
- Florian Roth's updated fork of the Swift On Security's sysmon config file
- FlorianHeigl
- florianl
- floss
- Flot
- flourish.studio
- Flow Analysis & Network Hunting
- Flow Droid – Static Data Flow Tracker
- flow-of-ingoing-transactions-from-known-wallets-to-sheepmarketplace
- floyd-fuh
- fluffypony
- fluorescence
- Flux-Keylogger-具有Web面板的现代Javascript键盘记录器
- fluxchief
- fluxion
- FLX-0x00
- fmanco
- FMEA Procedure
- FMEA: From Theory to Execution
- fmem
- FMHY: DNS Adblocking
- fmonjalet
- fn_fuzzy: Fast Multiple Binary Diffing Triage with IDA
- fnknda
- fnxpt
- FOCA
- FOCUSPEARL version 5.5.5 - technical description of database and interface
- FOFA
- FOFA Pro
- FOFA Pro view 是一款FOFA Pro 资产展示浏览器插件,目前兼容 Chrome、Firefox、Opera
- fofa 采集脚本
- FOFA_GUI:FOFA GUI工具,支持存活检测,icon_hash转换,备份扫描
- fofa2Xray-一款联合fofa与xray的自动化批量扫描工具,使用Golang编写,适用于windows与linux
- FofaSpider-Fofa爬虫支持高级查询语句批量爬取
- Fofa资产测绘
- FOI Explainer
- Fold3
- Fold3 (US Military Records)
- Foller
- Foller.me
- Folllow Frankresearcher
- Follow
- Follow bax1337
- Follow BlockSecTeam Twitter
- Follow LookOnChain
- Follow lookonchain Twitter
- Follow My Twitter
- Follow on-chain Sleuth Twitter
- Follow PeckShieldAlert Twitter
- Follow SamCZSun!
- Follow-up from target
- Follow.net
- Followerwonk
- Following Process Hollowing in OllyDbg
- Following the Breadcrumbs: Tracing Cryptocurrencies in Fraud Investigations
- FollowThatPage
- fone finder
- Foo-Manroot
- footprint.network
- For sale: Systems that can secretly track where cellphone users go around the globe - The Washington Post
- For the full list, click here
- Forbes Global 2000
- forced-request
- Forcing a targeted LTE Cellphone Into an Eavesdropping Network
- Forcing XXE Reflection through Server Error Messages
- Forebears
- Forecasting Capacity Outages Using Machine Learning to Bolster Application Resiliency
- ForemanBrute
- Foremost
- forensenellanebbia
- forensenellanebbia/xways-forensics
- Forensic Investigation Tutorial Using DEFT
- Forensic Acquisitions over Netcat | By Ali Hadi
- Forensic Analysis of OpenVPN on iOS | By Jack Farley
- Forensic analysis techniques for digital imaging
- Forensic challenges
- Forensic Data Carving using Foremost
- Forensic Data Extraction: Bulk Extractor
- Forensic File System Reconstruction: RecuperaBit
- Forensic FOSS: 4n6k_volatility_installer.sh - Install Volatility For Linux Automatically
- Forensic Imaging through Encase Imager
- Forensic Implications of iOS Jailbreaking
- Forensic Investigation of any FaceBook Profile
- Forensic Investigation of Any Mobile Phone with MOBILedit Forensic
- Forensic Investigation of any Twitter account
- Forensic Investigation of Nmap Scan using Wireshark
- Forensic Investigation of RAW Image using Forensics Explorer (Part 1)
- Forensic Investigation of victim pc using Autopsy
- Forensic Memory Acquisition in Linux - LiME
- Forensic Memory Acquisition in Windows - FTK Imager
- Forensic Practical
- Forensic use of mount --bind
- Forensically
- ForensicArtifacts.com Artifact Repository
- forensicartifacts/artifacts
- Forensicating Docker, Part 1
- ForensicControl
- forensicmatt/pancakeviewer
- ForensicPosters
- Forensics & Incident Response
- Forensics Analysis of Pagefile and hibersys File in Physical Memory
- Forensics Analysis of Social Media Sites like Facebook, Twitter, LinkedIn
- Forensics CTFs
- Forensics Investigation of Android Phone using Andriller
- Forensics Investigation of Deleted Files in a Drive
- Forensics Investigation of Evidence RAW Image using OS Forensics Tool
- Forensics Investigation of Facebook, Skype, and Browsers in RAW Image using IEF (Internet Evidence Finder)
- Forensics Investigation of Remote PC (Part 1)
- Forensics Investigation of Remote PC (Part 2)
- Forensics Investigon of RAW Images using Belkasoft Evidence Center
- Forensics Quickie: Identifying an Unknown GUID with Shellbags Explorer, Detailing Shell Item Extension Block 0xbeef0026, & Creative Cloud GUID Behavior
- Forensics Tools in Kali
- Forensics tools on Wikipedia
- Forensics: Mounting partitions from full-disk 'dd' images
- Forensics: What data can you find in RAM?
- Forensics: why there are no perfect crimes
- ForensicsFocus
- Forest
- Forest:基于frp(0.44.0)二次开发,删除不必要功能,加密配置文件,修改流量以及文件特征
- forestmonster
- forgedhallpass
- Forgejo
- Forgot Password Functionality
- Fork
- fork-while-fork
- Formal models for computer security
- Formal Specification and Verification of a Microkernel
- Format-String Vulnerability Lab
- Formbook
- Formcraft
- Forta Attack Detector
- Forta Contract Simil
- forta ENS spoofing
- Forta Scam Detector
- Fortifications and Siegecraft: Defense and Attack through the Ages
- Fortify IWA.JAVA (Insecure Web Application) Pharmacy Direct
- Fortify IWA.NET (Insecure Web Application) Pharmacy Direct
- Fortify Zero Bank
- Fortinet Threat Map
- fortra
- fortra/impacket#1898
- Fortress
- Forward Windows events to a Syslog server with free SolarWinds Event Log Forwarder for Windows
- ForwardFeed
- fossabot
- FotoForensics
- fotoforensics.com
- Foundations of Data Analysis (Fall 2020)- University of Utah
- Foundations of Deep Learning - UMD
- Foundations of Machine Learning - Blmmoberg Edu
- Foundations of Machine Learning Boot Camp, Berkeley Simons Institute
- Foundations of Robotics - UTEC 2018-I
- Founding Uber SRE
- Foundry
- Foundry Debugger
- Foundry Fuzz
- Foundstone Hackme Bank
- Foundstone Hackme Books
- Foundstone Hackme Shipping
- Foundstone Hackme Travel
- Four Steps to Creating Effective Game Day Tests
- FourAndSix : 2
- FourEye-重明-又一款基于python开发的对shellcode和exe文件免杀的工具
- fouzhe
- Fowsniff : 1
- Fox
- Fox-IT
- foxfire52
- foxmail_password_recovery:解密 Foxmail 保存在本地的密码
- FP 101x - Introduction to Functional Programming, TU Delft
- fpp: fpp (free proxy pool) 基于Golang的开箱即用跨平台的免费代理池,IP代理池,HTTP代理池。
- FR
- fr0gger/awesome-ida-x64-olly-plugin
- fr0ster
- frack113
- FragmentTransmission:适用于woodpecker-framework漏洞利用框架的FragmentTransmission分块传输插件
- Frame by Frame
- FrameScan-GUI 一款python3和Pyqt编写的具有图形化界面的cms漏洞检测框架
- frameworks_example.ini file
- franc-pentest
- France24
- Francesco Colista
- Francessco121
- FrancoGag
- François Hubaut (@frack113)
- francoisferrand
- franekp
- frangio
- frankcash
- frankli0324
- franklintimoteo
- frankwxu
- Frans Rosén
- frapava98
- freak4pc
- FRED
- Freddrickk
- Free AIS Ship Tracking of Marine Traffic - VesselFinder
- Free and Fair
- FREE AUTOGPT REPOSITORY
- Free Carrier Lookup
- Free Credit Check
- Free crypto tools you can use every week to find alpha
- Free Full PDF
- FREE LinkedIn Xray Search Tool
- Free Map Tools
- Free OSINT Training
- Free PDF Search Engine
- Free People Search Tool
- Free Probability Theory and Ramanujan Graphs - Spring 2024
- Free Public Records
- Free Software
- Free Tools From Magnet Forensics
- Free Translator
- Free VIN Code Search Service
- Free Website Translation
- Free Weibo
- FREE-FALL: HACKING TESLA FROM WIRELESS TO CAN BUS
- Freebase
- freeBokuLoader:一个简单的 BOF,它试图释放存储用户定义反射加载器的内存区域
- FreeBSD Port
- FreeBSD Reset or Recover Root Password
- FreeBSD Set a Default Route/Gateway
- FreeBuf公开课(直播课程):隐蔽通信(FQ)和侦查取证那些事儿
- freelancerat
- Freematics OBD-II Telematics Kit
- FreeRDP
- FreeTranslation
- Freeze:使用多种技术绕过 EDR类产品加载 shellcode
- Freezing Internet Tool
- fremag/memoscope.net
- French
- frenchyeti/dexcalibur
- Frengly
- Frequently Asked Questions
- Freshly
- friadev
- Frida
- Frida 12.3 Debuts New Crash Reporting Feature
- frida_example: 常用的frida脚本
- Frida-scripts
- Frida.Android.Practice (ssl unpinning)
- FRIDA's CLI tools
- frida/frida-core
- frida/frida-gum
- frida/frida-python
- FridaHooker:Android 图形化Frida管理器
- FridaLab
- FridaLoader - Android
- fridaUiTools:一个界面化整理脚本的工具
- Frida应用基础及 APP https证书验证破解
- Frida应用基础及APP https证书验证破解
- FRIDA脚本系列(一)入门篇:在安卓8.1上dump蓝牙接口和实例
- FRIDA脚本系列(三)超神篇:百度AI“调教”抖音AI
- FRIDA脚本系列(二)成长篇:动静态结合逆向WhatsApp
- FRIDA脚本系列(四)更新篇:几个主要机制的大更新
- friederbluemle
- FrimIdan
- Frissi0n
- Fristileaks
- Frky
- Frog-Fp:批量深度指纹识别框架
- frohoff
- From Black Box to a Known Quantity: How to Build Predictable, Reliable ML-based Services
- From Chaos to Control — Testing the resiliency of Netflix’s Content Discovery Platform
- From monolithic systems to microservices: A decomposition framework based on process mining
- From Ops to SRE: Evolution of the OpenShift Dedicated Team
- from source
- From SQL Injection to Shell
- From SQL Injection to Shell II
- From SQL Injection to Shell: PostgreSQL edition
- From Sys Admin to Netflix SRE
- Front-running explorer
- Frontiers of Biomedical Engineering with W. Mark Saltzman - Yale
- frosit
- frost19k
- frostasm
- frp-modify:frp0.38.1 支持域前置、远程加载配置文件、配置文件自删除、流量特征修改
- Frp:魔改版 FRP 更加适合红对作战使用
- frpCracker: 一款golang编写的,批量检测frp server未授权访问、弱token的工具
- frpModify-修改frp支持域前置与配置文件自删除
- FruityC2
- fsacer
- FSB
- fscan-Intranet:fscan的内网修改版
- fscan-POC:强化fscan的漏扫POC库
- fscan-一键大保健(支持主机存活探测、端口扫描、常见服务的爆破、ms17010、redis批量写私钥、计划任务反弹shell、读取win网卡信息等)
- Fsck.ext4
- FSE
- FSecureLABS
- fsecurelabs/drozer
- fsecurelabs/win_driver_plugin
- FSG
- fshabashev
- fsociety
- FSquaDRA
- ftabarie
- FTK Imager
- FTL
- FuckAV:python写的一款免杀工具(shellcode加载器)BypassAV
- fuckshitup
- Fugu14 writeup
- Fugu15 Slides
- Fugue
- Fuji
- fukusuket
- Fulfilling the promise of CI/CD
- Full Contact Information Generator
- Full documentation
- Full Fact
- Full label data dump of etherscan in JSON/CSV
- Full Stack Deep Learning - Course 2021
- Full Stack Deep Learning - Course 2022
- Full Stack Python Security
- FullHunt.io
- FullPowers
- Fun With Frida
- Function reference
- Functional Programming - University of Edinburgh - 2016-17
- Functional Programming (2021) - University of Nottingham
- Functional Programming in Haskell - IIT Madras
- Functionality-preserving black-box optimization of adversarial windows malware
- Functrace:使用DynamoRIO追踪函数调用
- Funda
- Fundamental Algorithms:Design and Analysis - IIT Kharagpur
- Fundamental Mathematics for Robotics spring 2020, by Ken Tomiyama
- Fundamentals of Database Systems - IIT Kanpur
- funding.communitybridge.org/projects/docker-slim
- funding.communitybridge.org/projects/osquery
- funky-monkey
- funnelfiasco
- fuomag9
- Fuse
- Fusée Launcher
- Fusil
- FusionCharts
- fuso:扶桑一款RUST 编写的快速, 稳定, 高效, 轻量的内网穿透, 端口转发工具
- Future Banks Live in The Cloud: Building a Usable Cloud with Uncompromising Security
- FUU
- fuxploider
- fuzion24/justtrustme
- fuzyll
- fuzz
- Fuzz_dic:又一个类型全面的参数和字典收集项目
- Fuzzbox
- Fuzzdb
- Fuzzing Android: A Recipe For Uncovering Vulnerabilities Inside System Components In Android
- Fuzzing beyond memory corruption: Finding broader classes of vulnerabilities automatically
- Fuzzing internships for Open Source Software
- Fuzzing Java in OSS-Fuzz
- Fuzzing-Dicts:Web Security Dictionary
- Fuzzinglab’s Octopus
- Fuzzing平台建设的研究与设计
- Fuzzing战争: 从刀剑弓斧到星球大战
- Fuzzing战争系列之二:不畏浮云遮望眼
- Fuzzlyn
- Fuzzotron
- fuzzuli: 一款go编写基于域名生成字典来扫描备份文件的工具
- fuzzware:针对固件的自动化、自配置的 Fuzzing 工具
- Fuzzy Security - Windows Privesc
- fuzzy.land
- FuzzySecurity
- Fuzz自动化Bypass软WAF姿势
- fvcr
- Fvuln:漏洞批量扫描集合工具(闭源)
- fwknop
- fwkz
- FwordCTF 2021 - Shisui
- FXZFun
- g0rbe
- G0rmint
- g0tmi1k
- g147
- G3root
- g4ze
- gaasedelen
- gaasedelen/lighthouse
- GabhenDM
- Gabreeles
- Gabriele-Pippi
- gabrielsoltz
- gadcam
- Gaddr
- gadgetinspector
- gadgetinspector:一个利用ASM对字节码进行污点传播分析的静态代码审计应用(添加了大量代码注释,适合大家进行源码学习)。也加入了挖掘Fastjson反序列化gadget chains和SQLInject(JdbcTemplate、MyBatis、JPA、Hibernate、原生jdbc等)静态检测功能。并且加入了很多功能以方便进行漏洞自动化挖掘
- gadgetinspector:利用链、漏洞检测工具
- GadgetProbe
- Gadgets:Java反序列化漏洞利用链补全计划,仅用于个人归纳总结
- GadgetToJScript
- gaelollivier
- Gaining a Root shell using MySQL User Defined Functions and SETUID Binaries
- galiail
- Gallery of AI Generated Faces | Generated.photos
- galoget
- Game of Hacks
- Game of Thrones
- GameBoard
- gamecard-microsd
- GameOver
- gametechdev/presentmon
- Gamma Ransomware with HTTP check-in
- gammaray
- gandro
- ganyao114/sandhook
- ganyao114/sandvxposed
- GaoNeng-wWw
- Gaploid
- Gapminder World
- garakmon
- garanews
- GarBageTools-public:支持致远、蓝凌、万户、帆软报表、fastjson、el表达式shell等功能的漏洞利用工具
- Garble
- garble:Obfuscate Go builds(go 编译混淆)
- Gardian Angel
- Garena Free Fire
- garethfr
- garigariganzy
- garrettfoster13
- Gas Reporting
- gasmask
- GatherInfo-渗透测试信息搜集/内网渗透信息搜集
- Gauli(dot)Net
- gaurav-gogia/dftools
- gavynriebau
- Gawker Hack
- GBByPass:冰蝎 哥斯拉 WebShell bypass
- gbiagomba
- Gbimg.org
- gboddin
- GC Bypass
- gcat
- gchq/gaffer
- gcla/termshark
- gcmoreira
- GCP-IAM-Privilege-Escalation
- GCPBucketBrute
- Gcpwn
- gdabah/distorm
- gdamore/tcell
- Gdasl
- GDATTACKER-RESEARCHER
- gdb
- GDB (multiarch)
- GDB (multiarch)
- GDB BoF - GNU Tools Cauldron 2019
- GDB on s390x: To-dos and Challenges - GNU Tools Cauldron 2019
- GDB: Tab-Completion & Command Options - GNU Tools Cauldron 2019
- Gdbstub
- GDB插件
- GDB调试CVE-2018-5711 PHP-GD拒绝服务漏洞
- gdestuynder
- gdicristofaro
- gds-domingues
- ge-map-overlays.appspot.com/bing-maps/aerial
- ge0rdi
- geacon_pro:跨平台重构了Cobaltstrike Beacon,适配了大部分Beacon的功能,行为对国内主流杀软免杀
- Geacon:Using Go to implement CobaltStrike's Beacon
- geacon:修改自geacon的多功能linux运维管理工具
- Gears of War: EP#1
- geeknik
- geekthattweaks
- GEF
- GEF-Extras
- Geisha:1
- GEM: The GAAIN Entity Mapper
- Gemail-Hack
- Gemini inc:2
- gemini-code-assist
- Gemini.py
- gemma-2-27b-it
- gemma-2-9b-it
- gemma-2b-it
- gemma-7b-it
- GemPad attack
- Genealogy Bank
- Genealogy Links
- genealogy.com
- General Motors
- generalmimon
- Generar modelo desde una base de datos con schemaSpy
- Generate a multi domains certificate using config files
- Generate a Random Name
- Generate IDA Scripts for objc function wrapper rename and prototype modification
- Generate IDA Scripts for objc_msgSend xrefs
- Generate objc_msgSend Xrefs Query Server
- Generating adversarial malware examples for black-box attacks based on GAN
- Génération rapide de DGA avec Miasm
- Generic black-box end-to-end attack against state of the art API call based malware classifiers
- Generic packing detection using several complexity analysis for accurate malware detection
- Generic unpacker of executable files
- Generic unpacking method based on detecting original entry point
- Generic unpacking of self-modifying, aggressive, packed binary programs
- Generic unpacking techniques
- Generic unpacking using entropy analysis
- Generic-AppLockerbypasses.md
- Generic-AppLockerbypasses.md
- Genes Reunited
- Genesis Search
- Genesys - The Smallest Possible SRE Team
- Genisys
- Gentoo
- genymobile/gnirehtet
- Genymotion
- Geo Names
- Geo Search Tool
- Geocam.ru
- Geochirp
- Geocreepy
- Geofeedia
- GeoGig
- geograph.org
- geohot
- geohot/qira
- geoip_lookup
- geoiptool.com
- Geometric Deep Learning - AMMI
- geonames.org
- GeoPrivacy and news media. Earlier this week I read a news article…
- Geoscience Australia
- Geosearch
- geosn0w/osirisjailbreak12
- GeoSocial Footprint
- GeoSpy
- GeoSpy AI
- GeoSpyer
- GEOST BOTNET - the discovery story of a new Android banking trojan
- Geotweet_GUI
- Gephi
- gergesh
- gergosimonyi
- GermanAizek
- get
- Get all files modified in last 30 days in a directory (orignal)
- Get anyone to do anything – David J Lieberman
- get here
- Get secure, reliable email hosting – FastMail
- Get Shellcode from binary
- Get the Ultimate Privilege of Android Phone
- Get your IPv4 and IPv6 address instantly
- Get Your Non-SREs Oncall Ready!
- get_Team_Pass-获取目标机器上的teamviewerID和密码(你需要具有有效的目标机器账号密码且目标机器445端口可以被访问(开放445端口))
- Get-bADpasswords
- Get-Metadata
- Get-WeChat-DB-获取目标机器的微信数据库和密钥
- getblock
- getcap, setcap and file capabilities
- GetCyber
- GetDomainAdmin:获取域控权限的几种方式
- GetIPinfo-用于寻找多网卡主机方便内网跨网段渗透避免瞎打找不到核心网
- getlantern/lantern-binaries
- GetMail:利用NTLM Hash读取Exchange邮件
- getmonero.org
- GetOut360:管理员权限下强制关闭360
- Getting a Perfect SSL Labs Score
- Getting access to 25000 employees details
- Getting started
- Getting Started - About Version Control (original)
- Getting started in digital forensics
- Getting Started With AppLocker
- Getting started with DevOps automation
- Getting Started with Digital Forensics
- Getting Started with Elasticsearch
- Getting Started with Phalcon 2.0v
- Getting Started With Sysmon
- GetTwitterID
- GetTyp
- GetVulnerableGPO
- gfw-breaker/ssr-accounts
- gfyoung
- GGP1
- Gh0st Lab
- GH0st3rs
- gh0stkey/RGPerson
- gh2o/rvi_capture
- Ghaniyyat05
- ghauri: 类似sqlmap的sql注入自动化利用工具
- ghcr.io/lissy93/web-check
- GHF Protector
- GhIDA: Ghidra decompiler for IDA Pro
- GhidorahRex
- Ghidra
- Ghidra 9.0.4及之前版本的代码执行漏洞
- Ghidra API documentation
- Ghidra Disassembler
- Ghidra Plugin Development for Vulnerability Research - Part-1
- Ghidra quickstart & tutorial: Solving a simple crackme
- Ghidra SRE: The AZORult Field Test
- Ghidra 从 XXE 到 RCE
- ghidra_scripts: colorCallGraphCallsTo.py (using SetBackroundColor and traversing the call graph)
- ghidra_scripts: GoogleSearch.py (to lookup function names via Google)
- ghidra_scripts: RC4Decryptor.py
- Ghidra: Android APK (it's basically dex2jar with a .dex decompiler)
- Ghidra: Bytes View (to patch binary and export to a working PE file)
- Ghidra: Clear Flow and Repair, and Patch Instruction (to defeat anti-disassembly)
- Ghidra: Data Type Manager / Archives and Parse C Source... (resolve function signatures)
- Ghidra: Decompile and compile (to quickly reimplement malware decoding functions)
- Ghidra: EditBytesScript (to fix/manipulate PE header to load ShadowHammer setup.exe sample)
- Ghidra: Export Symbols and Load External Libraries (to resolve imported function names)
- Ghidra: Extract and Import ... (to extract resources from PE binaries)
- Ghidra: Fixing Bugs (Fixing PE section import size alignment)
- Ghidra: FunctionID (to identify libraries and code reuse)
- Ghidra: Generate Checksum... (to extract hashes of embedded malware artifacts)
- Ghidra: Scripting (Python) (a quick introduction by implementing pipeDecoder.py)
- Ghidra: Search Program Text... (to find XOR decoding functions in malware)
- Ghidra: Server / Shared Projects (using ghidra-server.org)
- Ghidra: Shadow Hammer (Stage 1: Setup.exe) complete static Analysis
- Ghidra: Stack Depth (to detect stack manipulation)
- Ghidra: Version Tracking
- Ghidra: XORMemoryScript (to XOR decode strings)
- Ghidra: YaraGhidraGUIScript (to generate a YARA signature for threat/retro hunting)
- ghidra1
- ghidracadabra
- GhidraChatGPT
- ghidragon
- ghidraninja/ghidra_scripts
- ghidravore
- Ghidra插件
- ghirensics/ghiro
- Ghiro
- ghizard
- Ghost in the Cloud, Kevin Mitnick
- Ghost In The Logs
- Ghost in the Shellcode
- Ghost in the Wires: My Adventures as the World's Most Wanted Hacker - Kevin D. Mitnick, William L. Simon, Steve Wozniak
- Ghost potato实际利用
- ghost-phisher
- Ghostery
- ghostpack/safetykatz
- ghyde
- Gianni Stubbe
- Gibiru
- Gibson
- gidano
- giga-a
- Gigablast
- Gigatweeter
- gildasio
- gilligan/vim-lldb
- GINF
- giomke
- giorgosioak
- giorio94
- GirlBossRush
- girlfriend test
- gisforgirard
- giskismet
- gister9000
- Git
- Git Awards
- Git for Windows
- Git-crypt
- git-dumper:一款优秀的.git泄漏文件dump工具
- git-lfs/git-lfs
- Git-Scanner
- git-secrets
- gitbook
- gitdorks_go:一款在github上发现敏感信息的自动化收集工具
- gitetsu
- GitGuardian - Public GitHub Monitoring
- GitGuardian API Security Best Practice
- GitHack-.git泄露利用脚本
- GitHacker---比GitHack更好用的git泄露利用脚本
- GitHackTool:号称Git信息泄露唯一可用工具
- GitHub
- github action nightly(same as beta,build when code change)
- GitHub Actions
- GitHub Actions to securely publish npm packages
- GitHub Actions: Beyond CI/CD
- GitHub Advanced Security
- GitHub Advanced Security Find and fix vulnerabilities
- Github API integration
- GitHub Availability Report: April 2021
- GitHub Availability Report: April 2022
- GitHub Availability Report: April 2023
- GitHub Availability Report: April 2024
- GitHub Availability Report: August 2020
- GitHub Availability Report: August 2021
- GitHub Availability Report: August 2022
- GitHub Availability Report: August 2023
- GitHub Availability Report: August 2024
- GitHub Availability Report: December 2020
- GitHub Availability Report: December 2021
- GitHub Availability Report: December 2022
- GitHub Availability Report: December 2023
- GitHub Availability Report: February 2021
- GitHub Availability Report: February 2022
- GitHub Availability Report: February 2023
- GitHub Availability Report: February 2024
- GitHub Availability Report: January 2021
- GitHub Availability Report: January 2022
- GitHub Availability Report: January 2023
- GitHub Availability Report: January 2024
- GitHub Availability Report: July 2020
- GitHub Availability Report: July 2021
- GitHub Availability Report: July 2022
- GitHub Availability Report: July 2023
- GitHub Availability Report: July 2024
- GitHub Availability Report: June 2021
- GitHub Availability Report: June 2022
- GitHub Availability Report: June 2023
- GitHub Availability Report: June 2024
- GitHub Availability Report: March 2021
- GitHub Availability Report: March 2022
- GitHub Availability Report: March 2023
- GitHub Availability Report: March 2024
- GitHub Availability Report: May 2021
- GitHub Availability Report: May 2022
- GitHub Availability Report: May 2023
- GitHub Availability Report: May 2024
- GitHub Availability Report: November 2020
- GitHub Availability Report: November 2021
- GitHub Availability Report: November 2022
- GitHub Availability Report: November 2023
- GitHub Availability Report: October 2021
- GitHub Availability Report: October 2022
- GitHub Availability Report: October 2023
- GitHub Availability Report: September 2021
- GitHub Availability Report: September 2022
- GitHub Availability Report: September 2023
- GitHub Code Search
- GitHub Copilot
- GitHub Copilot Write better code with AI
- GitHub Discussions
- Github Dorks
- GitHub Enterprise Remote Code Execution
- GitHub Enterprise SQL Injection
- GitHub gist
- GitHub Gists
- GitHub Hosted Samples
- GitHub Hosted Samples and Embedded File Extractions
- GitHub Hosted Samples and Macrosheet Extractions
- GitHub Integration
- Github issue tracker
- GitHub Issues
- GitHub issues page
- GitHub page
- Github Pages
- GitHub releases page
- GitHub Repo
- GitHub Reviewed CVE-2021-44228 - Remote code injection in Log4j
- GitHub Search
- GitHub Skills
- GitHub Sponsors
- GitHub Star
- GitHub Stars?
- github-actions
- github-dorks
- github.com/firstlookmedia/pdf-redact-tools
- github.com/hartator/wayback-machine-downloader
- GitHub's CSP journey
- GitHub's post-CSP journey
- GitHub’s Engineering Fundamentals program: How we deliver on availability, security, and accessibility
- github/glb-director
- github/softu2f
- GitHub敏感信息泄露监控
- GitHut
- Gitlab
- gitlab-version-nse:用于gitlab 版本探测以及漏洞信息检索的 Nmap 脚本
- Gitleaks
- GitLive
- Gitmaninc
- GitMiner
- gitorious.org
- Gitrecon
- gitrecon-从gitlab或者github的提交记录和个人主页提取个人信息,如邮箱、公司、地址、twitter、blog等等
- Gitrob
- GitRoot:1
- Gitstar Ranking
- gitter-badger
- Git各种错误操作撤销的方法
- Git的tip
- giuliacassara
- gka
- Glasgow Smile:1.1
- glasschain.org
- Glassdoor
- GlassDoor Australia
- glassnode.com
- Glastopf
- glb
- Glearch
- gleeda/memtriage
- glennschler
- glennzw
- glensc
- glide.r
- glider: glider是一个支持多协议的前向代理,也是一个具有ipset管理功能(如dnsmasq)的dns/dhcp服务器。
- glint:一款基于浏览器爬虫golang开发的web漏洞主动(被动)扫描器
- gliptak
- Glit
- Glitchfix
- glm-4-9b-chat
- Glob/Match in Go
- Global Config Options
- Global Container Shipping Platform | Container Tracking, Ocean Schedules
- Global Events List
- Global Fishing Watch
- Global Tenders
- globalEdge
- globalEDGE Database of International Business Statistics
- GlobalExperts
- Gloom-Framework
- glpi_cve-2020-11060
- Glutton
- glzjin
- Gmail
- gmandrade
- gmapcatcher
- gmartinez95
- gmatuz/inthewilddb
- GMDSantana
- gmh5225
- gmi.io
- gmkbenjamin
- gmontard
- GMX Mail
- gnc:golang 版本的 nc ,支持平时使用的大部分功能,并增加了流量rc4加密
- GNS3
- GNU Lesser General Public License
- GNU PG
- GNU Project
- gnuplot
- Go
- Go 1.24.0 or newer
- Go Big with Bootcamp for Advanced Memory Forensics and Threat Detection
- Go exploit db
- Go upgrade Xcode. Fix your git security hole.
- Go_Bypass:一个golang 编写的免杀生成器模板,目前可以过国内主流杀毒
- go_meterpreter:Golang实现的x86下的Meterpreter reverse tcp
- go_proxy_pool:无环境依赖开箱即用的代理IP池
- go-cdn2proxy:使用 websocket 通过 CDN 代理您的 C2 流量
- go-crack:go 语言写的弱口令爆破工具
- go-domain-suffix-trie:域名后缀树
- go-file: 基于 Go 的文件分享工具,仅单可执行文件,开箱即用
- Go-for-OSCP
- go-memorydll:内存 dll 的 go 包装器
- go-mitmproxy:用 Golang 实现的中间人攻击,解析、监测、篡改 HTTP/HTTPS 流量
- go-nc:使用go语言实现nc的命令执行, 完美解决tcp粘包
- go-public: 基于 Go 的端口转发工具
- go-sec-code:Go相关的安全研究
- go-shellcode-loader:GO免杀shellcode加载器混淆AES加密
- go-shellcode-webimg-load:golang shellcode loader 远程图片隐写加载执行 无文件落地
- go-shellcode:shellcode 加载器
- go.mod
- Go0p
- go4Hacker:golang 编写支持 DNSLOG、HTTPLOG、Rebinding和多用户的工具,支持 docker 一键部署
- GOAD
- GOAD-Light
- Goal:Goal Go Red-Team 工具类
- GoAlert - Your Future Open Source, On-Call Notification Product
- Goblin WordGenerator
- goblin:一款适用于红蓝对抗中的仿真钓鱼系统
- GoblinWordGenerator
- GoBP:golang 编写的 shellcode 免杀生成器
- gobuffalo/fizz#104
- gobuster
- goby_poc:分享goby最新网络安全漏洞检测或利用代码
- goby-poc:439个goby poc,可能会有重复自行判断,来源于网络收集的Goby&POC,实时更新
- Gobypass:golang 加载器免杀
- GoBypass:Golang免杀生成工具
- GoBypassAV:整理了基于Go的16种API免杀测试、8种加密测试、反沙盒测试、编译混淆、加壳、资源修改等免杀技术,并搜集汇总了一些资料和工具
- Gocy015
- GODNSLOG-河马师傅(河马webshell检测作者)基于go语言开发的一款DNSLOG工具,支持docker一键部署
- Godoc for Engine and Compiler
- GodPotato
- godylockz
- GoFileBinder:golang免杀捆绑器
- Gofreeproxy:从fofa获取公开代理,用作动态代理
- goharbor/harbor
- goHashDumper:用于Dump指定进程的内存,主要利用静默退出机制(SilentProcessExit)和Windows API(MiniDumpW)实现
- GoKart
- GoLand
- Golang GUI
- golang_renamer
- golang-RCE-0day-POC
- GolangBypassAV:研究利用golang各种姿势bypassAV
- GoLangPhant0m: 杀win 日志
- GoLangUnhooker: EDR绕过,由GoLang编写
- Golden Eye:1
- GoldenEye
- goldytjoseph
- golemgalvanize
- Golgozar
- golismero
- gollariel
- gomasscan:gomasscan是一个纯go编写的masscan扫描库
- Gomorrah stealer (.NET binary)
- GONZOsint
- Goo
- Goo (Japan)
- Good First Issues
- GoodDollar attack
- GoodFirms
- GooDork
- Goodsearch
- GoodSearch Image Search
- GoodThopter12
- Goofile
- Goofram
- Google
- Google - Best practices for securely using API keys
- Google Account Finder
- Google accused of leaking personal data to thousands of advertisers
- Google admits workers listen to some smart device recordings
- Google Adwords
- Google Alert
- Google Alerts
- Google Art & Culture Experiment - Art Palette
- Google Browser Security Handbook
- Google Cache Browser 3.0
- Google Chrome
- Google Chrome Incognito Mode Can Still Be Detected by These Methods
- Google Cloud SRE Page
- Google Code Archive
- Google CSE (Telegram)
- Google CTF 2019 - GPhotos
- Google CTF 2019 Qual - bnv
- Google CTF 2019 Qual - pastetastic
- Google Custom Search
- Google Data Center Security: 6 Layers Deep
- Google Developers: Charts
- Google Dorks
- Google Drive
- Google Earth
- Google Earth Pro
- Google Earth Timelapse
- Google Finance
- Google Groups
- Google Gruyere
- Google Hacking
- Google Hacking 101
- Google Hacking Database
- Google Image
- Google Infrastructure Security Design (Google Cloud Next '17)
- Google Infrastructure Security Design Overview
- Google Input Tools
- Google Lens
- Google Maps
- Google Maps Streetview Player
- Google My Maps
- Google News
- Google News Print Archive
- Google Page Speed Tools
- Google Project Zero
- google project zero tracker
- Google Public Data Explorer
- Google Reverse Image Search for Mobile
- Google Safe Browsing
- Google Scholar
- Google Scholar Case Law
- Google Search
- Google Search Console
- Google Search Docs - Robots.txt
- Google Similar Pages
- Google site reliability using Go
- Google Social Search
- Google SRE Classroom
- Google SRE Page
- Google Translate
- Google translate has some quotas
- Google Translator for Firefox
- Google Trends
- Google VRP and Unicorns
- Google 图片
- google-authenticator
- google-authenticator-libpam
- Google-Dorks
- Google-play-crawler
- google-search
- Google:BeyondProd模型
- google.com/earth/download/gep/agree.html
- google.com/machine-learning/crash-course/
- google/aff4
- google/amt-forensics
- google/android-classyshark
- google/binexport
- google/binnavi
- google/bloaty
- google/docker-explorer
- google/gapid
- google/giftstick
- google/incremental-dom
- google/ios-webkit-debug-proxy
- google/mtail
- google/nsjail
- google/rekall
- google/rekall-profiles
- google/robotstxt
- google/santa
- google/science-journal-ios
- google/timesketch
- google/turbinia
- google/uiforetw
- google/wuffs
- Google+
- GoogleAlternatives - FuckOffGoogle
- Googleapps Dig
- googlecreativelab/open-nsynth-super
- googleguide.com/advanced_operators_
- Googleplay-api
- googleprojectzero/ios-messaging-tools
- googleprojectzero/winafl
- GoogleSearch-CLI
- goon:一款基于golang开发的扫描及爆破工具
- Goooler
- gopher-attack-surfaces
- Gophish
- goproslowyo
- goproxy:Go HTTP(S)代理库, 支持中间人代理解密HTTPS
- goqifrp:frp的修改版-去除特征流量免杀信息隐藏
- goresym
- Gormogon
- GoRottenTomato:Go实现部分Rubeus功能,可执行asktgt, asktgs, s4u, describe ticket, renew ticket, asreproast等
- Gorsair
- GoScan:采用Golang语言编写的一款分布式综合资产管理系统,适合红队、SRC等使用
- Goscanner_POC/EXP _Writing_Manual
- Gosec
- GoSecure
- goshawk22
- goShellCodeByPassVT:通过线程注入及-race参数免杀全部VT
- GoSmbExec:横向移动工具SMBExec的 golang 版本实现
- gost:golang 写的隧道
- gost:GO语言实现的安全隧道
- Gotanda
- Gotator
- gotbadger
- GoTokenTheft:用 golang 写的进程token 窃取工具
- got表劫持绕过disable_functions
- Government of Canada Open Data
- GoWard:A robust Red Team proxy written in Go
- gozineb
- GO语言版本的mimikatz-编译后免杀
- GPG Agent Forwarding (2018)
- GPG does not have enough entropy
- GPG Tools
- gplaycli
- gpp-decrypt Package Description
- GPP.png
- GPSVisualizer
- GPT-Vis
- gpt4free.github.io/docs
- gpxlnx
- gquere
- gR0OT
- Grab ETW Session, Providers and Events
- Grabbing data from Inputs and Textareas (Edge/IE)
- Grabify
- Gracker
- GradConnection Australia
- Gradle 8.5+
- Gradle Static Analysis Plugin
- Graduate Complexity Theory at CMU
- Graduate Course in Artificial Intelligence, Autumn 2012 - University of Washington
- Grafana
- Grafana Labs - SRE in the Third Age
- Grafana Loki
- Grafiki
- grainrigi
- GrakePch
- GramPages
- Granary
- grant-h/qu1ckr00t
- GrantMoyer
- grantzvolsky
- Granular CPU Capacity Management at Scale with eBPF
- Grap
- Graph Algorithms - Robert Sedgewick - Princeton University
- Graph Based Visualisation Techniques for Analysis of Blockchain Transactions
- Graph Theory - IISC Bangalore
- graph.tips
- Graphes de dépendances : Petit Poucet style
- Graphing Hayabusa results in neo4j
- GraphQL Editor
- GraphQL Hacking (Portuguese)
- GraphQL NoSQL Injection Through JSON Types
- GraphQL Weekly
- graphql-introspection-analyzer
- GraphQLmap
- graphquail
- GraphSense Maltego Transform
- graphsense.info
- GraphViz Interactive Preview
- graphw00f
- GraphX
- GraphyStories
- Grapl: A Graph Platform for Detection, Forensics, and Incident Response
- GrassGIS
- Gravatar Search
- Grave Finder
- GrayHatWarfare
- grayhatwarfare.com - domains
- graysuit
- graywolf
- Grazfather
- grdp
- Great Gambling Scams: True Stories of the World's Most Amazing Hustlers
- Great Ideas in Theoretical Computer Science at CMU
- Great Lakes Wildlife
- Greater Visibility Through PowerShell Logging
- Greatest125
- GreatiOSJailbreakMaterial - Only List the Most Useful Materials Here!
- GreedyBear
- greenbonebot
- greenkeeper
- GreenOptic:1
- gregjhogan
- Gregwar
- gregwar/fatcat
- GreHack 2017 – Write Up Forensic 400
- grep.app
- GrepItAll
- Grey Guide
- Grey Literature – List of Gateways
- Grey Literature Strategies
- GreyCat
- GreyNet International
- GreyNoise
- GreyXor
- GRFICS
- GriffinRichards
- Grim Finance attack
- grimbelhax
- Grimd
- GrimTheRipper:1
- grm:redis web端管理工具
- GRML-Forensic
- grooverdan
- Groq
- Groth16 证明延展性攻击原理及实现
- Groupfinder
- Grouping Events in Splunk
- Growing the Site Reliability Team at LinkedIn: Hiring is Hard -- Greg Leffler
- Grraahaam
- grunt-contrib-obfuscator
- Gruyere
- Grype
- grzetzp
- GScan-为安全应急响应人员对Linux主机排查时提供便利,实现主机侧Checklist的自动全面化检测,根据检测结果自动数据聚合,进行黑客攻击路径溯源
- GSDF
- gshark-GitHub敏感信息扫描收集管理工具
- gsimone
- gsingh93
- GSoC 2018 Final: Debugging and Emulation Support for Cutter
- gsocket: 穿透防火墙或NAT进行通信
- gSpera
- gsuberland
- Gsuite SMTP inject
- GT-ACC-RT
- GTFOArgs
- GTFOBins
- GTFONow
- gtklocker
- gtoad/android_inline_hook
- GUAC
- GUAC 2023 Q1 Maintainer Summit Notes
- GUAC Design Doc
- GUAC Intro Slides
- GUAC presentation at KubeCon NA 2022
- GUAC presentation at OSS NA 2023
- guanicoe
- guanweiwang
- GuardDog
- Guardian Project
- guardianproject/haven
- guardianproject/orbot
- GuardRails
- GuardSIght Playbook Battle Cards
- Guasap – WhatsApp Forensic Tool
- Guerrilla Mail
- Guest Blog Post: njRat Analysis with Volatility
- Guest Post - Failing over without falling over
- Guest Post: Martin Korman (VolatilityBot - An Automated Malicious Code Dumper)
- GUI_Tools:一个由各种图形化渗透工具组成的工具集
- GUÍA COMPLETA SOBRE EL USO DE DIRSEARCH
- Guide to LTE Security
- Guide: Cuckoo Sandbox on FreeBSD
- Guidelines for Formal Verification Systems
- GuideStar
- guidovranken
- guliashvili
- Guloader string decryption (VEH)
- gulp-javascript-obfuscator
- Gumtree Australia
- Gumtree Jobs Australia
- Gunpack: Un outil générique d'unpacking de malwares
- GUnpacker
- Guru-25
- gustavo-iniguez-goya
- gustavocovas
- GustavoLCR
- gvasilakiss
- gvisor
- GVM 21.x integration
- GVM 21.x integration
- gwillem
- gy741
- Gym-Malware
- gymgit
- gynvael
- GzExe
- GZTimeWalker
- gzzhanghao
- h-encore
- h-encore's system.dat
- H:一款强大的资产收集管理平台
- H.A.S.T.E.
- h00k4n1
- h0lg
- H2 database渗透总结
- h3adshotzz/img4helper
- h3n4l
- h3xstream
- H4ck3d - Security Conference 2021 (Spanish)
- h4kuy4
- h5bp/server-configs-nginx
- H5SC
- h8mail
- HA: Armour
- HA: Avengers Arsenal
- HA: Chakravyuh
- HA: Chanakya
- HA: Dhanush
- HA: Forensics
- HA: Infinity Stones
- HA: ISRO
- HA: Joker
- HA: Narak:
- HA: Naruto
- HA: Natraj
- HA: Pandavas
- HA: Rudra
- HA: Sherlock
- HA: Vedas
- HA: Wordy
- Haaukins
- Habu
- Hac
- haccer
- HacDan
- hach1test
- hach1yon
- Hack Allows Escape of Play-with-Docker Containers
- Hack any Website, Complete Web App Hacking
- Hack In The Box, Amsterdam
- Hack In The Box, Cyberweek
- Hack In The Box, Lockdown 001
- Hack In The Box, Lockdown 002
- Hack MOBILedit Forensic 6.9 Registration (Easy Way)
- Hack The Box
- Hack The Kioptrix Level-1
- Hack This Site
- Hack your Friend using Backtrack
- hack-different/apple-baseband
- hack-different/demuxusb/ext/pcapng.h
- hack-different/iBoot-IDA
- hack-different/python-libimobiledevice
- hack-fastjson-1.2.80: Kcon Hacking JSON 议题相关内容
- Hack-in-the-Box Cyber Week Workshop: Analyzing Malicious Word and Excel Documents - Demo files and Workshop on YouTube
- hack-tramp
- Hack.lu 2017 Sigma - Generic Signatures for Log Events by Thomas Patzke
- Hack.lu 2019 - Trees For Future
- hack.lu CTF
- Hack.me
- Hack+
- Hackable:3
- Hackaday Article
- Hackademic-RTB1
- Hackademic-RTB2
- Hackavision
- Hackbar
- HackBrowserData-是一个解密浏览器数据(密码|历史记录|Cookie|书签 | 信用卡 | 下载记录)的导出工具,支持全平台主流浏览器
- Hackday Albania
- HackDig
- Hacked
- hacked-emails
- hacked-Facebook
- hacked.slowmist.io
- hackedlist.io
- Hacken Oracle
- Hacker Fest: 2019
- Hacker News thread
- Hacker Test
- Hacker101
- HackerOne
- HackerOne hacktivity
- hackerone-reports_有关hackerone上漏洞奖励前茅的地址,便于学习
- HackerOneReports:hacker历年公开的漏洞报告
- Hackers High School 13 Complete Hacking Ebooks
- Hackers Hut
- Hackers tools
- Hackers' Secrets
- HackerSDR
- hackertarget
- HackGen
- HackGit - Twitter Post
- Hacking
- Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
- Hacking Androids for Fun and for Profit
- Hacking APIs (Ch14) by Corey Ball - No Starch Press
- Hacking Articles - Digital Forensics Tools Mindmap
- Hacking attacks and Examples Test
- Hacking Back Your Car
- Hacking Burger Pagers
- Hacking Case (4.5 GB NTFS Image)
- Hacking Cellular Networks
- Hacking Connected Vehicles with Chris Valasek of IOActive
- Hacking Cryptocurrency Miners with OSINT Techniques
- Hacking Cryptocurrency Miners with OSINT Techniques by Seyfullah KILIÇ
- Hacking Docker the Easy way
- Hacking home routers from the Internet
- Hacking into Computer Systems
- Hacking iOS Applications a detailed testing guide
- Hacking Linux Part I: Privilege Escalation
- Hacking Livestream #14: Binary Ninja Plugins (with carstein)
- Hacking Livestream #74: Ghidra
- Hacking Public Warning System in LTE Mobile Networks
- Hacking Robots Before Skynet
- Hacking Simplified Part #1
- Hacking Simplified Part #2
- Hacking Simplified Part #3
- Hacking Symfony
- Hacking Techniques and Intrusion Detection
- Hacking the Cloud
- Hacking Under the Hood and Into Your Car
- Hacking Website Database and owning systems
- hacking windows 10 with TheFatRat
- Hacking Windows using TheFatRat + Apache2 Server + Ettercap + Metasploit
- Hacking wireless sockets like a NOOB
- Hacking with a Heads Up Display
- Hacking with a Microsoft Office Word Document from TheFatRat
- Hacking with JSP Shells
- Hacking-Lab
- HackingLab
- HackinOS:1
- HackJava:Java安全
- Hackme Bank
- hackme1
- Hackmethod
- Hackndo
- Hackode
- hackone-hacktivity
- HackPac Hacking Pointer Authentication in iOS User Space
- Hackplayers
- HackQuest
- Hacks Retro from officercia.eth
- HackSimulator
- Hacksplaining
- HackStop
- HackTheArch
- HackTheBox
- HackTheBox Academy CPTS OS Command Injection
- HackTheBox CPTS Study notes on XSS
- HackThis
- HackThisSite
- HackTools(如当)-红队浏览器插件
- Hackvertor
- HackwithGithub
- Hackxor
- hackyx.io
- Hacme Bank Android
- Hades-C2: python开发的C2工具
- hadolint
- Hadoop Yarn RPC未授权RCE
- Hadoop_framework
- hadoop-pcap
- Hagezi
- hagezi/dns-blocklists
- hahwul
- hahwul/droid-hunter
- haiyuidesu/sephelper
- hakkuframework
- Haklistgen
- Hakluke | Guide to Amass — How to Use Amass More Effectively for Bug Bounties
- hakril/pythonforwindows
- Hakumarachi
- hal.xyz
- halfdan
- Halfluke
- Halls Of Valhalla
- halos
- halostatue
- halpomeranz
- hamarituc
- hammer
- hamukazu/lets-get-arrested
- Hamz-a
- HandleKatz: 使用 Lsass 的克隆句柄来创建相同的混淆内存转储
- Hands On Mobile API Security
- Hands-Off Deployment with Canary
- Hands-on Site Reliability Engineering
- hangxingliu
- haniwa55
- Hanmur
- hanwencheng
- haotian-wang/google-access-helper
- hapi.one
- Happycorp:1
- happylishang/cacheemulatorchecker
- HAProxy
- har_file.py
- Hard_winGuide.md
- Hardcoded secrets, unverified tokens, and other common JWT mistakes
- hardened_malloc
- Hardening Windows 10
- Hardening Your HTTP Security Headers
- Hardhat
- HardHatC2: 一个C#命令和控制框架
- hardik05
- HarDToBelieve
- HardwareAllTheThings
- hardwaterhacker
- HarfangLab
- harikirank
- harismuneer/Ultimate-Facebook-Scraper
- HarlemSquirrel
- Harmari (Unified Listings Search)
- harness
- HARO
- harris2015
- harris21/afot
- Harsha-Ambati
- harshitm98
- Harvard Economics 2355 Deep Learning for Economics spring 2023, by Melissa Dell
- Harvard Information Theory 2022, by Gregory Falkovich
- Harvard TweetMap
- Harvey
- Hash Buster
- Hash Extender
- hash-generator
- hash-library
- Hashcat Tips
- Hashcrack
- Hashdd
- hasher
- hasherdotid
- hasherezade/dll_to_exe
- hasherezade/libpeconv
- hashicorp/consul-template
- hashicorp/memberlist
- Hashing-based encryption and anti-debugger support for packing multiple files into single executable
- HashKiller
- HashLibPlus
- Hashmob
- Hashtagify
- Hashtags.org
- Hashtatit
- HassenPy
- hastebin
- Hat Tip To
- Hat-Kid
- Hatch
- hatching/vmcloak
- HatCloud(Bypass CloudFlare for IP)
- hauziz
- havardthom
- Have I Been Pwned
- Have I Been Sold
- Have I Been Zuckered
- Haveibeenpwned
- haveibeenpwned.com/
- HaveIBeenSquatted
- Having Fun with Obfuscated Mach-O Files
- Havoc: Havoc是一款现代化的、可扩展的后渗透命令控制框架C2
- HAW
- hawkinsw
- Hawxone
- Hax.Tor
- haxx:在 iOS 14 - iOS 14.8.1 上以 root 身份不受限制 + 未沙盒化代码执行
- haxxinen
- Hayabusa
- Hayabusa Encoded Rules
- Hayabusa EVTX
- Hayabusa internals
- Hayabusa Rules
- Hayabusa Sample EVTXs
- Haybale
- Hayden959
- haystak
- Hazard Analysis Techniques for System Safety
- hbctf_2017_dameixian
- hbdxmz
- hctf_2018_warmup
- hdb-li/lldebugtool
- HE 3D Network Map
- HE.net
- he2ss
- he3als
- Headhunter
- HeadlineSpot
- Heads Up! 2014 Volatility Plugin Contest Deadline Extended!
- Healthcare:1
- Healthsheet: Development of a Transparency Artifact for Health Datasets
- heapdump_tool:heapdump敏感信息查询工具,例如查找 spring heapdump中的密码明文,AK,SK等
- Heartbleed Attack Lab
- heartsk_community:Hearts K-企业资产发现与脆弱性检查工具,自动化资产信息收集与漏洞扫描
- Heat-ray: Combating Identity Snowball Attacks Using Machine Learning, Combinatorial Optimization and Attack Graph
- Heavens-c
- Hechtov
- hectorm
- Heimdall-rs
- Heimdall-RS frontend: decompile.tools
- heise online - Blog Post
- Hellbound Hackers
- Hello (Real) World with ROS – Robot Operating System - TU Delft
- Hello-Java-Sec:Java漏洞平台,结合漏洞代码和安全编码
- hellogcc/100-gdb-tips
- hellresistor
- Helm
- Helmet
- help
- hendrik1120
- henggeFish:自动化批量发送钓鱼邮件
- hengyoush
- henriporto
- henrypp/simplewall
- HenryRLee
- hephaest0s/usbkill
- hepisec
- Heralding
- Herbert-Karl
- here
- here (ThePhish documentation, recommended)
- Here Be Dragons: Reverse Engineering with Ghidra - Part 0 [Main Windows & CrackMe]
- Here Be Dragons: Reverse Engineering with Ghidra - Part 1 [Data, Functions & Scripts]
- Here is a PoC in how to bypass allowedLdapHost and allowedClasses checks in Log4J 2.15.0
- here.
- Here's a paper
- HeroGamers
- herpaderping
- herrcore
- Herz3h
- hestat/calamity
- hex
- Hex Rays
- Hex-Rays
- hexa-decim8
- Hexag00n
- Hexagon QEMU
- Hexagon SDK
- HexChaos
- HexRaysCodeXplorer
- Hey Press
- Heyter
- hFireF0x
- hfiref0x/syscalltables
- hfiref0x/uacme
- hfiref0x/winobjex64
- HFish
- hfm
- HFS+ Resources
- hfz1337
- Hi-Fi
- hickory-resolver
- HID
- hiddeco
- Hidden
- Hidden Bee恶意软件家族的定制IDA装载模块开发
- HiddenDesktop: 隐藏桌面,适用于Cobalt Strike使用VNC的时候隐藏桌面操作
- HiddenEye
- Hide Android Applications in Images
- hideNsneak
- Hiding in Plain Signal:Physical Signal Overshadowing Attack on LTE
- Hiding Process Memory via Anti-Forensic Techniques
- hifi
- hig-dev
- High Dimensional Analysis: Random Matrices and Machine Learning by Roland Speicher
- High Level ViWi Service
- High Performance Computer Architecture - IIT Kharagpur
- High Performance Computing - IISC Bangalore
- High Performance Computing | Udacity
- High Performance SRE: Automation, error budgeting, RPAs, SLOs, and SLAs with site reliability engineering
- High-Assurance Separation Kernels: A Survey on Formal Methods
- High-Assurance Smart Card Operating System for Electronic Visas
- High-Dimensional Probability
- High-Level Vision - CBCSL OSU
- high3eam
- Highcharts
- Highlights of Calculus - Gilbert Strang, MIT OCW
- Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor
- HighWire: Free Online Full-text Articles
- HijackLibs
- HijackLibs:跟踪公开披露的DLL劫持
- hijagger
- hikvision_CVE-2017-7921_auth_bypass_config_decryptor:解密受CVE-2017-7921影响的海康威视的配置文件
- HikvisionIVMSGetShell: 海康威视IVMS综合安防管理平台软件GetShell
- hilariocoelho
- HIllya51
- himanshudabas
- Hindsight – Internet History Forensics For Google Chrome/Chromium
- Hindsight:Google ChromeChromium历史访问记录取证工具
- Hints for High-Assurance Cyber-Physical System Design
- Hiring SREs at LinkedIn
- Hiring SREs at LinkedIn, 2017
- HIS Piers
- his website
- Hisham Mir
- Hispachan
- HITB CTF 2017 - Pasty
- HITBLab: Modern Malware Analysis for Threat Hunters (HITB Singapore)
- Hitcon
- HITCON 2018 - BabyQuery
- HITCON 2019 - GoGoPowerSQL
- HITCON CTF 2015 - Hard to say
- HITCON CTF 2017 - Baby^H Master
- HITCON CTF 2018 - One Line PHP Challenge
- HITCON CTF 2020 - oStyle
- HITCON CTF 2022 - web2pdf
- hitcxy
- hitenkoku
- hivescan
- hktalent
- hlein
- hlohaus
- hmac_md5
- hmac_sha1
- hmac_sha2_256
- hmac_sha2_512
- hmac_sha3_256
- hmac_sha3_512
- hoadlck
- hoang-himself
- hoaxshell:一款功能强大的非传统Windows反向Shell
- Hoaxy
- Hob0Rules
- Hobart - Tasmania
- hoefler02
- Hogwarts: Bellatrix
- Hohli
- hoke-t
- Holehe
- HolicPOC
- Holistic Info-Sec for Web Developers
- Holistic Info-Sec for Web Developers - Fascicle 0
- Holistic Info-Sec for Web Developers - Fascicle 1
- hollance/neural-engine
- Holo
- Holynix: v1
- Home
- Homebrew
- Homebrew Cask
- homebysix
- Homemetry
- Homepage
- hon1nbo
- honavar-sohan
- Hone Your Ninja Skills
- Honest Work
- Honey, I Shrunk the Attack Surface – Adventures in Android Security Hardening
- HoneyBadger
- Honeyd
- HoneyDrive
- Honeypot
- HoneypotBuster
- HoneyPy
- Honeything
- HoneyTrap
- Honggfuzz
- Honkai Impact 3rd
- HonnyPotter
- HonSSH
- HonTel
- honwen/openwrt-shadowsocks-rust
- Hooey webprint
- Hooker
- Hooking Unity3d
- HookWechatRecall:通过frida工具 拦截 微信撤回Demo
- Hootsuite
- Hoovers
- Hopper
- horrorho/InflatableDonkey
- horsicq/detect-it-easy
- hosseinRezaei188
- hossinasaadi
- Host Header Injection
- Host Minder
- Host.io
- Host/sub-domain/TLD enumeration/extraction
- HostCollision: 基于golang编写的多线程Host爆破/扫描/碰撞工具
- HostCollision:用于host碰撞而生的小工具,专门检测渗透中需要绑定hosts才能访问的主机或内部系统
- HostConfig
- hosted_runners.yml
- HostHunter
- Hostile
- Hosts Compress - Windows
- Hosts Compression Scripts
- Hosts_scan:用于IP和域名碰撞匹配访问的小工具,旨意用来匹配出渗透过程中需要绑定hosts才能访问的弱主机或内部系统
- Hosts-BL
- HostsMan
- Hot Potato
- Hot Potato – Windows Privilege Escalation
- HotExamples
- hotgunz
- hotline1337
- Hotspot Shield
- HotTg
- houjingyi233
- Houtek
- HouzuoGuo
- How (Not) To React When Your Cryptocurrency Is Stolen
- How (Not) to Scale a Project: A Post-Mortem
- How Aphia—The Platform behind Several Online and Taxonomically Oriented Databases—Can Serve Both the Taxonomic Community and the Field of Biodiversity Informatics
- How Asana ships stable web application releases
- How Asana uses Asana: Security incident response
- How Back Market SREs prepared for Black Friday
- How can I change a user's default group in Linux?
- How can I find files that are bigger/smaller than x bytes?
- How can I keep user accounts consistent across multiple machines?
- How can I resolve a hostname to an IP address in a Bash script?
- How can I sync two local directories? (original
- How can the messages that scroll by when booting a Debian system be reviewed later?
- How can you become a one-man-army OSINT specialist?
- How certificate chains work
- How Chromium Displays Web Pages
- How Coinbase Builds Secure Infrastructure To Store Bitcoin In The Cloud
- How Computers Work - Aduni
- How CPU load averages work (and using them to triage webserver performance!)
- How Cross-Chain Bridges are Hacked?
- How cryptocurrency intelligence aids ransomware investigations
- How Cryptocurrency Transactions Work
- How DBS dispelled the myths of Chaos Engineering
- How Did Things Go Right? Learning More from Incidents
- How do crypto monitoring and blockchain analysis help avoid cryptocurrency fraud?
- How do I close a terminal without saving the history?
- How do I Find Out Linux CPU Utilization?
- How do I run a Unix process in the background?
- How do I set chmod for a folder and all of its subfolders and files? (original)
- How do I trace a system call in Linux? (original)
- How do pdflush, kjournald, swapd, etc interoperate?
- How Do We Control The Car?
- How do we share troubleshooting skills
- How do we Stop Spilling the Beans Across Origins?
- How do you calculate the prefix, network, subnet, and host numbers?
- How do you do load testing and capacity planning for databases?
- How do you do load testing and capacity planning for web sites? (original)
- How Do You Explain The Unreasonable Effectiveness Of Cloud Security?
- How do you score A+ with 100 on all categories on SSL Labs test with Let's Encrypt and Nginx?
- How does a kernel mount the root partition?
- How does Ethereum work, anyway?
- How does strace connect to an already running process? (original)
- How does the NEW Ethereum work?
- How does the sticky bit work? (original)
- How eBay’s Notification Platform Used Fault Injection in New Ways
- How EnCase Software has Been Used Major Crime Cases (Plus how to use EnCase Forensic Imager Yourself) | By Brent Whitfield
- How Etsy Prepared for Historic Volumes of Holiday Traffic in 2020
- How GitHub uses GitHub Actions and Actions larger runners to build and test GitHub.com
- How GitHub uses merge queue to ship hundreds of changes every day
- How Google SRE and Developers Work Together
- How I Chained 4 vulnerabilities on GitHub Enterprise, From SSRF Execution Chain to RCE!
- How I Chained 4 vulnerabilities on GitHub Enterprise, From SSRF Execution Chain to RCE! - Orange Tsai
- How I could have stolen your photos from Google - my first 3 bug bounty writeups
- How I exploited ACME TLS-SNI-01 issuing Let's Encrypt SSL-certs for any domain using shared hosting
- How I found a $5,000 Google Maps XSS (by fiddling with Protobuf)
- How I got my first big bounty payout with Tesla
- How I got root with Sudo
- How I hacked Google’s bug tracking system itself for $15,600 in bounties
- How I investigate crypto hacks and security incidents: A-Z
- How I Socially Engineer Myself Into High Security Facilities
- How I turned a mini-PC into an Ethereum node to run at home
- How is an Interrupt handled in Linux? (original)
- How it works
- How Khan Academy Successfully Handled 2.5x Traffic in a Week
- How L1 Terminal Fault (L1TF) Mitigation and WinDbg Wasted My Morning (a.k.a. Yak Shaving: WinDbg Edition)
- How long do you keep log files?
- How many of me?
- How Netflix Uses Kinesis Streams to Monitor Applications and Analyze Billions of Traffic Flows
- How privileges work in operating systems?
- How Reliability and Product Teams Collaborate at Booking.com
- How should strace be used? (original)
- How SRE teams are organized, and how to get started
- How Stripe Invests in Technical Infrastructure
- how to
- How to access and traverse a #checkra1n jailbroken iPhone File system using SSH
- How to Add New Disk in Linux CentOS 7 Without Rebooting
- How to analyse on-chain activity?
- How to analyze a VMware memory image with Volatility
- How To Automatically Embed Payloads In APK's - Evil-Droid, Thefatrat & Apkinjector
- How to avoid failures
- How to avoid global outage — Seamlessly migrating DaemonSet labels
- How To Become A Hacker
- How to Become a Smart Contract Auditor by Cmichel
- How to Build
- How to Build a Crypto Intelligence Dapp with Goldrush Components
- How to build a secure by default Kubernetes cluster with a basic CI/CD pipeline on AWS
- How To Build Your Own Rogue GSM BTS For Fun and Profit
- How to bypass UAC in newer Windows versions
- How to Change Kernel Runtime Parameters in a Persistent and Non-Persistent Way
- How to check how long a process has been running?
- How to check routes (routing table) in linux
- How to Clone Drive for Forensics Purpose
- How to Collect Email Evidence in Victim PC (Email Forensics)
- How to Collect Forensics Evidence of PC using P2 Commander (Part 1)
- how to contribute
- How to convert a Windows SFS (Dynamic Disks) partition to regular partition for forensic analysis
- How to convert your Xcode plugins to Xcode extensions
- How to correctly add a path to PATH?
- How to correctly use LD_LIBRARY_PATH
- How to Create a Forensic Image of Android Phone using Magnet Acquire
- How to create an Evil LTE Twin/LTE Rogue BTS
- How to Create and Convert RAW Image in Encase and AFF Format using Forensics Imager
- How to Create Drive Image for Forensic Purpose using Forensic Replicator
- How to Create ERD(Entity Relationship Diagram)
- How to Create Forensics Image of PC using R-Drive Image
- How to create multidomain certificates using config files
- How to decode Google SN domains
- How to decode managed stack frames in procmon traces
- How To Defeat Anti-VM and Anti-Debug Packers With IDA Pro
- How to Defend Your Castle | Innovative Trio in Smart Contract Security: Monitoring, Prevention, Defense
- How to delete a single Applocker rule
- How to Develop WhatWeb Plugins (not up to date)
- How to disable most push advertisement on MIUI China Version
- How to Document a Database With SchemaSpy
- How To Download & Install TheFatRat
- How to drift with any car
- How to empty swap if there is free RAM?
- HOW TO EXPLOIT LIFERAY CVE-2020-7961 : QUICK JOURNEY TO POC
- How to exploit the DotNetNuke Cookie Deserialization
- How to Export a Full History of Ethereum Blockchain to S3
- How to export Kubernetes events for observability and alerting
- How to extract forensic artifacts from pagefile.sys?
- How to Extract on-chain data from an Ethereum node
- How to Extract Screen Time Passcodes and Voice Memos from iCloud
- How to extract specific file(s) from tar.gz
- How to find forensic computer tools for each incident
- How to Find Hidden Web Directories with Dirsearch
- How to find out which processes are using swap space in Linux?
- How to find the hashing algorithm used to obfuscate passwords?
- How to find the process(es) which are hogging the machine
- How to find the usage of files in Remote victim PC (Remote PC Forensics)
- How to force ssh client to use only password auth?
- How to forward local keypair in a SSH session?
- How to gather Forensics Investigation Evidence using ProDiscover Basic
- How to Get Data From Telegram Using Python
- How To Get Fooled By Metrics
- How to Get Started in CTF
- How to Get Started in Online
- How to grep a string in a directory and all its subdirectories files in LINUX?
- How to hack a car — a quick crash-course
- How to Hack a Tesla Model S
- How to Hack Like a Legend
- How to Hack Like a Pornstar
- How to Hunt Bugs in SAML; a Methodology - Part I
- How to Hunt Bugs in SAML; a Methodology - Part II
- How to Hunt Bugs in SAML; a Methodology - Part III
- How to Implement Service Level Objectives in New Relic APM
- How to Install Digital Forensics Framework in System
- How to Integrate RSA Malware Analysis with Cuckoo Sandbox | By Luiz Henrique Borges
- How To Investigate Cryptocurrency Crimes Using Blockchain Explorers & OSINT Tools
- How to Investigate Like a Rockstar
- How to Keep Your Kubernetes Deployments Balanced Across Multiple zones
- How to kill a process in Linux if kill -9 has no effect
- How to kill a process running on particular port in Linux?
- How To Make an Internal DLL Game Hack C++ (Rainbow Six Siege)
- How to make LLDB a real debugger
- How to Mount Forensics image as a Drive using P2 eXplorer Pro
- How to move an ext4 journal
- How to Pass OSCP
- How to perform Forensic Investigation on user Linkedin Account
- How to Perform Forensic Investigation on YouTube
- How to Port a Car
- How to prepare for a security engineer interview
- How to prepare for PWK/OSCP, a noob-friendly guide
- How to prepare for PWK/OSCP, a noob-friendly guide
- How to Preserve Forensics Image file Timestamp
- How to prevent zero day attacks (original)
- How to read Windows Hibernation file (hiberfil.sys) to extract forensic data?
- How to reduce number of sockets in TIME_WAIT?
- How to reload .bash_profile from the command line?
- How To Research a Project (High Level)
- How To Resolve IP Addresses To Domain Names?
- How To Secure A Linux Server With Ansible
- How to see system call that executed in current time by process?
- How to Set File Permissions Using chmod
- How to setup linux permissions for the WWW folder?
- How to setup Vault with Kubernetes
- How to Setup Volatility Tool for Memory Analysis
- How to Specify a Provider?
- How to SRE When Everything's Already on Fire
- How to start a conversation and make friends - Don Gabor
- How to study Forensics Evidence of PC using P2 Commander (Part 2)
- How to Successfully Hand Over Systems
- How to telnet to an IP address on a specific port?
- How to Trace Cryptocurrency Transactions Using Maltego
- How to trace just system call events with ftrace without showing any other functions in the Linux kernel?
- How to Trade off Server Utilization and Tail Latency
- How to Train Your Dragon: Ghidra Basics
- How to Use an Audit Log to Practice WordPress Forensics
- How to use Breadcrumbs.app?
- How to use CrystalBlockchain Tool
- How to use Dirsearch to detect web directories
- How to use frida on a non-rooted device
- How to use FRIDA to bruteforce Secure Startup with FDE-encryption on a Samsung G935F running Android 8
- How to Use logrotate to Manage Log Files
- How to use MetaSleuth to analyze a phishing attack
- How to use OSINT in Cryptocurrency Investigations?
- How to use SchemaSpy to document your database
- How To Use SRE To Cultivate A Blameless Culture In The Workplace
- How to use t-SNE effectively
- How to use Twint as an OSINT tool
- How to Use Volatility 3 Offline
- How to view all boot messages in Linux after booting? (original)
- How to View Windows system reboot Date and Time (Windows Forensics)
- How to visualize a PostgreSQL schema as SVG with SchemaSpy
- How to visualize Ethereum transactions using Maltego
- How to Win Friends and Influence People - Dale Carnegie
- How to work with crashes
- How to Write a BBOT Module
- How to write an Incident Report/Postmortem
- How to Write Sigma Rules - Nextron Systems
- How to: Delete Your Data Securely on Windows
- How Tokopedia Rank Millions of Products in Search Page
- How Udemy does Build Engineering
- How unwitting users of WeChat aid the Chinese messaging app’s blacklisting of sensitive images
- How we abused Slack's TURN servers to gain access to internal services
- How We Built Our Blog
- How we compress Pub/Sub messages and more, saving a load of money
- How we deal with technical incidents
- How we designed our Continuous Integration System to be more than 50% Faster
- How We Designed the Quotas Microservice to Prevent Resource Abuse
- How we developed the NIOS II processor module for IDA Pro
- How we do On-Call Rotations at Nubank
- How we exploited a remote code execution vulnerability in math.js
- How we handle incidents at Getaround
- How we improved availability through iterative simplification
- How We Improved Our Performance Using ElasticSearch Plugins: Part 1
- How We Improved Our Performance Using ElasticSearch Plugins: Part 2
- How we improved push processing on GitHub
- How We Improved Website Performance by Evolving Our Infrastructure
- How We Monitor Apache Airflow in Production
- How we monitor Monzo
- How we optimized infrastructure spend at GitLab
- How we respond to incidents
- How we scale our data platform efficiently and reliably
- How we scaled async workload processing at GitLab.com using Sidekiq
- How We Scaled Our Cache and Got a Good Night's Sleep
- How We Upgrade Kubernetes on GKE
- How We Use Sloth to do SLO Monitoring and Alerting with Prometheus
- How we used delayed replication for disaster recovery with PostgreSQL
- How we’ve evolved on-call at Monzo
- How, Not Why: An Alternative to the Five Whys for Post-Mortems
- how2heap
- HowSociable
- Howtheyaws
- Howtheydevops
- Howtheytest
- HowTo-decrypt-Signal.sqlite-for-IOS
- HoxhaEndri
- HP printers try to send data back to HP about your devices and what you print
- HP Security Research Playlist
- hperl
- hpiedcoq
- hq450/fancyss
- HQL : Hyperinsane Query Language (or how to access the whole SQL API within a HQL injection ?)
- HQL for pentesters
- Hsiang-Chih
- hslatman
- HSQLDB 安全测试指南
- HSTS Docs
- HSTS For Forensics: You Can Run, But You Can't Use HTTP
- hstspreload.org
- hsudhof
- HSwift
- HT-WPS-Breaker
- htarsoo
- hteso
- HTML
- HTML URL Encoding Reference
- html_select
- html_select_list
- html/template
- htnhan
- HTools
- htop Explained Visually
- htpwdScan:HTTP暴力破解、撞库测试工具
- HTTP
- HTTP Cookie Docs (Mozilla)
- HTTP DATASET CSIC 2010
- HTTP Header Cheatsheet
- HTTP Headers - Docs
- HTTP Listener with AES encryption and compression
- HTTP Made Really Easy
- HTTP Redirects - MDN
- HTTP Security Headers
- HTTP Status Codes
- http_fetch
- http_fetch_json
- http_mksession
- http_request
- http_send
- http:__shell-storm.org_shellcode_
- http://0day.today/
- http://100.100.100.200/latest/meta-data/
- http://100.100.100.200/latest/meta-data/image-id
- http://100.100.100.200/latest/meta-data/instance-id
- http://127.0.0.1:1234
- http://127.0.0.1:5000
- http://1337day.com/
- http://169.254.169.254/latest/meta-data/
- http://169.254.169.254/latest/meta-data/ami-id
- http://169.254.169.254/latest/meta-data/hostname
- http://169.254.169.254/latest/meta-data/iam/security-credentials/[ROLE
- http://169.254.169.254/latest/meta-data/public-keys/
- http://169.254.169.254/latest/meta-data/public-keys/[ID]/openssh-key
- http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key
- http://169.254.169.254/latest/meta-data/reservation-id
- http://169.254.169.254/latest/user-data
- http://169.254.169.254/latest/user-data/iam/security-credentials/[ROLE
- http://169.254.169.254/metadata/instance?api-version=2020-06-01
- http://169.254.169.254/metadata/v1.json
- http://169.254.169.254/metadata/v1/
- http://169.254.169.254/metadata/v1/hostname
- http://169.254.169.254/metadata/v1/id
- http://169.254.169.254/metadata/v1/interfaces/public/0/ipv6/address
- http://169.254.169.254/metadata/v1/maintenance
- http://169.254.169.254/metadata/v1/region
- http://169.254.169.254/metadata/v1/user-data
- http://186.227.239.150:2150/ftp/imagem.php?id=Passo_Fundo
- http://1o1o.xyz/bo_ctfcode.html
- http://217.logdown.com/
- http://24mail.chacuo.net/
- http://armconverter.com
- http://atestadodic.detran.rj.gov.br/
- http://attack.mitre.org/techniques/enterprise/
- http://azcwr.org/az-cyber-warfare-ranges
- http://bemtevi.segurancapublica.sc.gov.br:10351/Interface/Cameras/GetJPEGStream?Camera=FNS_STM_062&width=1920&height=1080
- http://bestcbooks.com/
- http://blog.csdn.net/v_july_v
- http://blog.sevagas.com/?Hacking-around-HTA-files
- http://blogs.360.cn/post/CVE-2020-0796.html
- http://brakemanscanner.org/
- http://bug.p0sec.net/
- http://bypass.tidesec.com/web/
- http://c0rni3sm.blogspot.in/2016/02/a-quite-rare-mssql-injection.html
- http://cameras.cetsp.com.br/
- http://cb.drops.wiki/
- http://certdb.com/
- http://certidaoiifppcerj.detran.rj.gov.br/
- http://ceye.io
- http://ceye.io/
- http://cmd5.com
- http://cndonline.siatu.pbh.gov.br/CNDOnline/?null
- http://code.mcdvisa.com/
- http://consultaoperadora.com.br/site2015/
- http://crackme.cenzic.com/kelev/view/home.php
- http://cryptopals.com/
- http://ctf.bugku.com/
- http://ctf.nuptsast.com/
- http://ctf.rookiehacker.org/
- http://cve.mitre.org/
- http://cvedetails.com/
- http://cwe.mitre.org/data/definitions/77.html
- http://cwe.mitre.org/data/definitions/78.html
- http://cxsecurity.com/
- http://d3adend.org/xss/ghettoBypass
- http://dados.prefeitura.sp.gov.br/dataset
- http://data.phishtank.com/data/online-valid.json
- http://demo.testfire.net/
- http://dnsbin.zhack.ca/
- http://dnslog.cn/
- http://domain/path/.htaccess?c=command
- http://enphp.djunny.com/
- http://esaj.tjac.jus.br/esaj/portal.do?servico=190090#
- http://esaj.tjam.jus.br/esaj/portal.do?servico=190090#
- http://esaj.tjce.jus.br/esaj/portal.do?servico=190090#
- http://evilcos.me/security_skill_tree_basic/index.html
- http://example.com/a%2findex.php
- http://factordb.com/
- http://fun.coolshell.cn/
- http://grub.cballenar.me/
- http://hackforums.net/showthread.php?tid=5040543
- http://hackingforsecurity.blogspot.com/2013/11/xss-cheat-sheet-huge-list.html
- http://hackinglab.cn/
- http://htmlpurifier.org/live/smoketests/xssAttacks.php
- http://infocarrosp.com.br/
- http://infotrafego.pbh.gov.br/info_trafego_cameras.html
- http://insecure.org/sploits_all.html
- http://inteltechniques.com/osint/menu.facebook.html
- http://intelx.io
- http://ipinfo.io/2.2.2.2/json
- http://ists.sparsa.org/
- http://it.rising.com.cn/fanglesuo/index.html
- http://jiangjiawei.pw/blog/
- http://jsnice.org/
- http://ksnctf.sweetduet.info/
- http://leetupload.com/blagosphere/2014/03/28/analyze-and-crack-gsm-downlink-with-a-usrp/
- http://lesuobingdu.360.cn
- http://licenciamento.detran.ma.gov.br/Licenciamento/consulta/Home.xhtml
- http://liveoverflow.com/
- http://localhost:3000
- http://localhost:4000
- http://localhost:7900/?autoconnect=1&resize=scale&password=secret
- http://localhost:8000
- http://localhost:8080
- http://localhost:8080/
- http://localhost:8080/chat/
- http://localhost:8080/v1
- http://localhost:8888/notebooks/KubeHound.ipynb
- http://maccdc.org/
- http://mapas.sosma.org.br/
- http://metadata.google.internal/computeMetadata/v1/
- http://metadata.google.internal/computeMetadata/v1beta1/
- http://metadata.google.internal/computeMetadata/v1beta1/instance/attributes/kube-env?alt=json
- http://metadata.google.internal/computeMetadata/v1beta1/instance/hostname
- http://metadata.google.internal/computeMetadata/v1beta1/instance/name
- http://metadata.google.internal/computeMetadata/v1beta1/instance/service-accounts/default/token
- http://metadata.google.internal/computeMetadata/v1beta1/instance/zone
- http://metadata.google.internal/computeMetadata/v1beta1/project/attributes/ssh-keys?alt=json
- http://metadata.google.internal/computeMetadata/v1beta1/project/project-id
- http://mindhacks.cn/
- http://monyer.com/demo/monyerjs/
- http://monyer.com/game/game1/
- http://mslc.ctf.su/
- http://n0p.net/penguicon/php_app_sec/mirror/xss.html
- http://nmrc.org/pub/index.html
- http://obtruse.syfrtext.com/2018/07/oracle-privilege-escalation-via.html
- http://oj.xctf.org.cn/
- http://omergil.blogspot.com/2017/02/web-cache-deception-attack.html
- http://opensecuritytraining.info/
- http://oval.mitre.org/
- http://overthewire.org
- http://packetlife.net/media/library/23/common_ports.pdf
- http://packetstormsecurity.com/
- http://pastebin.com/u6FY1xDA
- http://paypal.me/brandonskerritt
- http://pentest-tools.com/
- http://php.net/manual/en/class.simplexmlelement.php
- http://prnt.sc/d67nh5
- http://prnt.sc/d67ogh
- http://prnt.sc/d67oqh
- http://prnt.sc/d6esj3
- http://projects.webappsec.org/w/page/13246928/HTTP%20Request%20Smuggling
- http://rails-sqli.org/
- http://ramtin-amin.fr/#nvmedma
- http://ramtin-amin.fr/#nvmepcie
- http://ramtin-amin.fr/#tristar
- http://reputation.alienvault.com/reputation.data
- http://requestbin.net/dns
- http://riddle.arthurluk.net/pocket.php
- http://rkhunter.sourceforge.net/
- http://rui0.cn/archives/1408
- http://samurai.inguardians.com
- http://satelite.cptec.inpe.br/mapsat/
- http://satelite.cptec.inpe.br/radiacao/
- http://satelite.cptec.inpe.br/vento/
- http://search.chongbuluo.com/
- http://secunia.com/advisories/
- http://securitytrainings.net/security-trainings/
- http://securityvulns.com/
- http://sefaznet.ac.gov.br/nfe/consulta.xhtml
- http://servicos.receita.fazenda.gov.br/Servicos/cnpjreva/Cnpjreva_Solicitacao.asp
- http://sh3ll.me/
- http://shell-storm.org/shellcode/
- http://shentoushi.top/
- http://sigma-soschuva.cptec.inpe.br/#
- http://sigma.cptec.inpe.br/
- http://sigma.cptec.inpe.br/fortracc/
- http://sigma.cptec.inpe.br/prec_sat/
- http://sigma.cptec.inpe.br/radar/
- http://sigma2.cptec.inpe.br/
- http://sisgou.seds.al.gov.br/base2/desaparecidos_almanaque/
- http://sistemas.anatel.gov.br/se/public/view/b/licenciamento.php
- http://sistemas.anatel.gov.br/sgmu/fiqueligado/tups.asp
- http://sistemas.anatel.gov.br/siec-servico-movel-web/
- http://site.ecovias.com.br/cameras/vpon/0kamera1.jpg
- http://site.ecovias.com.br/cameras/vpon/0kamera6.jpg
- http://solucoes.receita.fazenda.gov.br/Servicos/ConsRest/Atual.app/paginas/mobile/restituicaoMobi.asp
- http://soohooked.rebinder.your.domain:3129/
- http://sourceforge.net/projects/grendel/
- http://sourceforge.net/projects/lampsecurity/
- http://sploitus.com/
- http://spoorkaart.mwnn.nl
- http://stackoverflow.com/
- http://stackoverflow.com/users/2245910/sir-athos
- http://superuser.com/
- http://taxas.detran.pi.gov.br/licenciamento/index.jsf
- http://terrabrasilis.dpi.inpe.br/app/map/alerts?hl=pt-br
- http://terrabrasilis.dpi.inpe.br/app/map/deforestation?hl=pt-br
- http://testasp.vulnweb.com/
- http://testaspnet.vulnweb.com/
- http://testphp.vulnweb.com/
- http://tool.leavesongs.com/
- http://transito.gtrans.com.br/cttupe/index.php/mapa
- http://transito.gtrans.com.br/semobjp/index.php
- http://unsafe.cracking.com.ar/demos/edgedatametadata/bing.html
- http://unsafe.cracking.com.ar/demos/sandboxedge/
- http://utf-8.jp/public/aaencode.html
- http://voos.infraero.gov.br/voos/index.aspx
- http://w3af.org/
- http://waleedassar.blogspot.de/
- http://wapiti.sourceforge.net
- http://web.chacuo.net/charsetuuencode
- http://web.chacuo.net/formatsh
- http://web.nvd.nist.gov
- http://web.onlinectf.com/cutezombie/web-app/
- http://webcache.googleusercontent.com/search?q=cache:https://findneo.github.io
- http://webscan.cc/
- http://websecuritytool.codeplex.com
- http://wooyun.chamd5.org/
- http://wooyun.jozxing.cc/
- http://www-03.ibm.com/software/products/en/appscan
- http://www.acunetix.com/vulnerability-scanner/
- http://www.adlice.com/runpe-hide-code-behind-legit-process/
- http://www.amazon.com/Basics-Web-Hacking-Techniques-Attack/dp/0124166008/
- http://www.amazon.com/Browser-Hackers-Handbook-Wade-Alcorn/dp/1118662091/
- http://www.amazon.com/Hacking-Exposed-Web-Applications-Third/dp/0071740643/
- http://www.amazon.com/Hacking-Web-Apps-Preventing-Application/dp/159749951X/
- http://www.amazon.com/SQL-Injection-Attacks-Defense-Second/dp/1597499633/
- http://www.amazon.com/Tangled-Web-Securing-Modern-Applications/dp/1593273886/
- http://www.amazon.com/The-Web-Application-Hackers-Handbook/dp/8126533404/
- http://www.amazon.com/Web-Application-Obfuscation-Evasion-Filters/dp/1597496049/
- http://www.amazon.com/Web-Application-Security-Beginners-Guide/dp/0071776168/
- http://www.amazon.com/Web-Penetration-Testing-Kali-Linux/dp/1782163166/
- http://www.amazon.com/XSS-Attacks-Scripting-Exploits-Defense/dp/1597491543/
- http://www.arachni-scanner.com/
- http://www.atoolbox.net/
- http://www.banshujiang.cn/
- http://www.beyondsecurity.com/avds
- http://www.beyondtrust.com/Products/RetinaNetworkSecurityScanner/
- http://www.binary-auditing.com/
- http://www.blue-lotus.net/
- http://www.bombeiros.pi.gov.br/distec/index2.php
- http://www.calhoun.io/5-useful-ways-to-use-closures-in-go/
- http://www.chkrootkit.org/
- http://www.cipherdyne.org/psad/
- http://www.cipherdyne.org/psad/docs/config.html
- http://www.cis.syr.edu/~wedu/seed/all_labs.html
- http://www.cl.cam.ac.uk/~rja14/book.html
- http://www.cnblogs.com/figure9/
- http://www.cnblogs.com/iamstudy
- http://www.coberturacelular.com.br/
- http://www.cracking.com.ar/demos/workerleak/
- http://www.cracking.com.ar/demos/xmldom/
- http://www.darul.io/post/2015-07-22_go-lang-simple-reverse-proxy
- http://www.der.sp.gov.br/WebSite/Servicos/ServicosOnline/CamerasOnlineMapa.aspx
- http://www.devdungeon.com/content/making-tor-http-requests-go
- http://www.dgi.inpe.br/catalogo/
- http://www.dgi.inpe.br/CDSR/
- http://www.duba.net/dbt/wannacry.html
- http://www.edge-security.com/wfuzz.php
- http://www.exploit-db.com/
- http://www.factordb.com/
- http://www.feiradesantana.ba.gov.br/seprev/desaparecidos/desaparecidos.asp
- http://www.freebuf.com/sectool/4708.html
- http://www.fuzzysecurity.com/index.html
- http://www.github.com/
- http://www.golismero.com
- http://www.hacking-tutorial.com/tips-and-trick/how-to-enable-remote-desktop-using-command-prompt/
- http://www.hackitoergosum.org/2010/HES2010-planglois-Attacking-SS7.pdf
- http://www.heibanke.com/lesson/crawler_ex00/
- http://www.hetianlab.com/
- http://www.hiencode.com/
- http://www.ikare-monitoring.com
- http://www.inpe.br/webelat/homepage/
- http://www.insanitybit.com/2012/06/01/why-i-like-apparmor-more-than-selinux-5/
- http://www.invid-project.eu/invid-releases-fake-video-news-debunker-firefox-provides-code-open-source-mit-licence/) (plugins
- http://www.ip33.com/
- http://www.iphonecake.com
- http://www.itxueke.com/SecNavi/
- http://www.jackson-t.ca/runtime-exec-payloads.html
- http://www.jsfuck.com/
- http://www.justanotherhacker.com/2011/12/writing-a-stealth-web-shell.html
- http://www.kali.org/
- http://www.kitploit.com/
- http://www.matrix67.com/blog/
- http://www.metools.info/
- http://www.milescan.com
- http://www.newseg.seg.br/newseg/
- http://www.nirsoft.net/utils/chromepass.html
- http://www.nstalker.com
- http://www.offensive-security.com/metasploit-unleashed/
- http://www.opensecuritytraining.info/
- http://www.oracle.com/technetwork/topics/linuxsoft-082809.html
- http://www.oracle.com/technetwork/topics/linuxx86-64soft-092277.html
- http://www.oreilly.com/programming/free/
- http://www.osvdb.org
- http://www.osvdb.org/
- http://www.pentest-standard.org/
- http://www.phpjm.net/
- http://www.policiacivil.pe.gov.br/adultos-desaparecidos
- http://www.portaltransparencia.gov.br/
- http://www.portswigger.net/burp/intruder.html
- http://www.pyinstaller.org/
- http://www.rafayhackingarticles.net/2016/09/breaking-great-wall-of-web-xss-waf.html
- http://www.rapid7.com/products/appspider/
- http://www.rapid7.com/vulndb/index.jsp
- http://www.receita.fazenda.gov.br/PessoaJuridica/CNPJ/cnpjreva/Cnpjreva_Solicitacao.asp
- http://www.rodoviasonline.com.br/cameras-ao-vivo-das-rodovias-do-estado-do-parana/
- http://www.rodoviasonline.com.br/rodovias-der-sp/
- http://www.ruanyifeng.com/home.html
- http://www.securiteam.com/
- http://www.securityfocus.com/
- http://www.shellpub.com
- http://www.shiyanbar.com/ctf/practice
- http://www.sitedossier.com
- http://www.smeegesec.com/2012/06/collection-of-cross-site-scripting-xss.html
- http://www.sxyj.net/
- http://www.talosintelligence.com/documents/ip-blacklist
- http://www.telecocare.com.br/telebrasil/mapa_erb.php
- http://www.tenable.com/products/nessus-vulnerability-scanner
- http://www.underthewire.tech/
- http://www.vuln.cn/wooyundrops
- http://www.vupen.com/blog/
- http://www.vupen.com/english/security-advisories/
- http://www.websecurify.com
- http://www.xilinjie.com/
- http://www.yinwang.org/
- http://www.yunsee.cn/
- http://www2.dgi.inpe.br/catalogo/explore
- http://www22.receita.fazenda.gov.br/inscricaomei/private/pages/certificado_acesso.jsf
- http://www8.hp.com/us/en/software-solutions/webinspect-dynamic-analysis-dast/index.html
- http://www8.receita.fazenda.gov.br/simplesnacional/aplicacoes.aspx?id=21
- http://www8.receita.fazenda.gov.br/SimplesNacional/Aplicacoes/ATSPO/dasnsimei.app/Default.aspx
- http://xdxd.love/2015/12/18/%E9%80%9A%E8%BF%87multipart-form-data%E7%BB%95%E8%BF%87waf/
- http://xlab.tencent.com/cn/
- http://xss.codeplex.com
- http://xssdb.net/xssdb.txt
- http://xssor.io
- http://your-vps-ip:3001
- http://your-vps-ip:3002
- http://your-vps-ip:3003
- http://zero.webappsecurity.com/
- http://zerodayinitiative.com/advisories/published/
- http://网站地址/
- http://网站地址/admin.php登录后台
- HTTP/2 notebook
- httpfinger:Http指纹管理工具
- HttpLiveProxyGrabber
- httprobe
- httpry
- HTTPS Everywhere
- https:__29a.ch_photo-forensics_#error-level-analysis
- https:__academiadeforensedigital.com.br_
- https:__academiadeforensedigital.com.br_treinamentos_treinamento-de-avilla-forensics_
- https:__afdian.net_@ascotbe
- https:__api.nuget.org_v3_index.json
- https:__aws.amazon.com_marketplace_pp_prodview-rmloab6wnymno
- https:__docs.microsoft.com_en-us_sysinternals_downloads_procmon
- https:__dojo.pwn.college_
- https:__github.com_0x727_jndiexploit
- https:__github.com_0x727_springbootexploit
- https:__github.com_anoncatalyst_ominis-osint_actions_workflows_ominis-search.yml
- https:__github.com_anoncatalyst_ominis-osint_actions_workflows_search-username.yml
- https:__github.com_anoncatalyst_ominis-osint_actions_workflows_web-search.yml
- https:__github.com_apsdehal_awesome-ctf_blob_master_readme.md
- https:__github.com_fnmsd_mysql_fake_server
- https:__github.com_frohoff_ysoserial
- https:__github.com_johnhammond_ctf-katana
- https:__github.com_sevagas_macro_pack_releases_
- https:__github.com_t3l3machus
- https:__habr.com_en_post_444940_
- https:__myaccount.google.com_lesssecureapps
- https:__ncviewer.com_
- https:__owasp.org_www-community_attacks_format_string_attack
- https:__pwn.college_
- https:__pyn3rd.github.io_2022_06_06_make-jdbc-attacks-brillian-again-i_
- https:__python-poetry.org_docs_
- https:__sponsors.github.red_
- https:__www.alpertron.com.ar_ecm.htm
- https:__www.nuget.org_packages_penet_
- https:__www.onlinehashcrack.com_tools-online-extract-vba-from-office-word-excel.php
- https:__www.youtube.com_watch?v=fvqygam1x9u&ab_channel=nptel-nociitm
- https:__www.youtube.com_watch?v=gzlpvkzbapa&ab_channel=martincarlisle
- https:__www.youtube.com_watch?v=nclum8gesku&ab_channel=bengreenberg
- https:__www.youtube.com_watch?v=uikxsbgkpj8&t=13257s&ab_channel=freecodecamp.org
- https://0iq.me/gip/
- https://0x00sec.org/
- https://0xpatrik.com/subdomain-takeover-ns/
- https://191.253.194.194:60000/live/media/PK5916/DeviceIpint.10/SourceEndpoint.video:0:0
- https://191.253.194.194:60000/live/media/PK5916/DeviceIpint.7/SourceEndpoint.video:0:0
- https://191.253.194.194:60000/live/media/PK5916/DeviceIpint.8/SourceEndpoint.video:0:0
- https://191.253.194.194:60000/live/media/PK5916/DeviceIpint.9/SourceEndpoint.video:0:0
- https://29a.ch/photo-forensics/#error-level-analysis
- https://29a.ch/photo-forensics/#level-sweep
- https://3v4l.org/
- https://3v4l.org/PIUEo
- https://3v4l.org/sUEMG
- https://84692bb0df6f30fc0687-25dde2f20b8e8c1bda75aeb96f737eae.ssl.cf1.rackcdn.com/--xss.html
- https://a.f8x.io/
- https://academiadeforensedigital.com.br/
- https://academiadeforensedigital.com.br/treinamentos/treinamento-de-avilla-forensics/
- https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/security_guide/sect-security_guide-encryption-using_the_random_number_generator
- https://access.redhat.com/hydra/rest/securitydata/
- https://account.shodan.io
- https://acompanheaviagem.aguiabranca.com.br
- https://activityworkshop.net/software/gpsprune/
- https://addons.mozilla.org/android/addon/single-file
- https://addons.mozilla.org/en-US/firefox/addon/pwnfox/
- https://addons.mozilla.org/firefox/addon/single-file
- https://adsecurity.org/
- https://adsecurity.org/wp-content/uploads/2017/04/2017-BSidesCharm-DetectingtheElusive-ActiveDirectoryThreatHunting-Final.pdf
- https://afdian.com/a/leon406
- https://afdian.net/@ascotbe
- https://afdian.net/@hoshino_suzumi
- https://aide.github.io/
- https://ais.cavok.in/lichab/
- https://ais.cavok.in/rab/
- https://aiss.nsfocus.com/
- https://aka.ms/vs/16/release/vc_redist.x64.exe
- https://alas.aws.amazon.com/AL2/alas.rss
- https://alertalicitacao.com.br/
- https://algartelecom.com.br/para-voce/celular/cobertura-celular
- https://aliasrobotics.com/files/robot_teardown_paper.pdf
- https://aliasrobotics.com/files/SROS2.pdf
- https://andresriancho.github.io/nimbostratus/
- https://antecedentes.pc.pa.gov.br/consulta
- https://antecedentes.policiacivil.pa.gov.br/consulta
- https://anythingllm.com/
- https://api.cybercure.ai/feed/get_hash?type=csv
- https://api.cybercure.ai/feed/get_ips?type=csv
- https://api.cybercure.ai/feed/get_url?type=csv
- https://api.nuget.org/v3/index.json
- https://api.ransomware.live/allcyberattacks
- https://app.any.run/tasks/b31a5e6a-7ead-470e-b5e8-02fffd55f255/
- https://app.netlas.io
- https://app.netlas.io/domains/
- https://app.powerbi.com/view?r=eyJrIjoiYTI4MDc3OWEtMmY5Yi00OTU4LTk3OWYtZjExODY0NTExMTQ0IiwidCI6IjhlNTdmNzI3LTBlNWUtNDEzMC04ZTI0LTJkNWY3YzhjMzhmNiJ9
- https://app.snov.io
- https://apps.apple.com/us/app/singlefile-for-safari/id6444322545
- https://appsecwiki.com/
- https://appweb1.antt.gov.br/scff/conPlaca.asp
- https://aquarela.antaq.gov.br/single/?appid=62518b21-6421-4eab-9c35-bcfac6d57ffd&sheet=70ada7af-9026-4f15-a862-8a40becb7e7d&theme=horizon&opt=currsel,ctxmenu
- https://araf.org.br/anatel-links-rapidos
- https://arcgis.sema.df.gov.br/server/rest/services/Areas_Queimadas/MapServer
- https://archive.apache.org/dist/zookeeper/zookeeper-3.5.6/
- https://arxiv.org/pdf/1912.07714.pdf
- https://asecure.cloud/
- https://askubuntu.com/questions/250290/how-do-i-scan-for-viruses-with-clamav
- https://askubuntu.com/questions/258658/eth0-packet-sniffer-sbin-dhclient
- https://astaxie.gitbooks.io/build-web-application-with-golang/content/en/04.5.html
- https://attack.mitre.org/matrices/enterprise
- https://attack.mitre.org/matrices/enterprise/cloud/
- https://attackdefense.pentesteracademy.com/listing?labtype=cloud-services&subtype=cloud-services-amazon-s3
- https://autoline.com.br/
- https://avd.aliyun.com/high-risk/list
- https://aws.amazon.com/marketplace/pp/prodview-rmloab6wnymno
- https://azeria-labs.com/
- https://backdoor.sdslabs.co/challenges
- https://bard.google.com/
- https://bazaar.abuse.ch/export/txt/md5/recent/
- https://bazaar.abuse.ch/export/txt/sha1/recent/
- https://bazaar.abuse.ch/export/txt/sha256/recent/
- https://bbs.pediy.com/thread-219717.htm
- https://bdgex.eb.mil.br/bdgexapp/mobile/
- https://beautifier.io/
- https://beginners.re/
- https://bemtevi.segurancapublica.sc.gov.br:10311/Interface/Cameras/GetJPEGStream?Camera=BGC_VDV_040&width=1920&height=1080
- https://bemtevi.segurancapublica.sc.gov.br:10346/Interface/Cameras/GetJPEGStream?Camera=FNS_CEN_162&width=1920&height=1080
- https://bestsms.xyz/
- https://bevigil.com/osint-api
- https://bevigil.com/pricing/osint
- https://bgp.he.net/
- https://bgpview.io/
- https://bing.com/chat
- https://bitbucket.org/asecurityteam/spacecrab
- https://blockchain.com/btc/address/1E1CEEFdNy1FDUdJaYMjtbYLAxLiAuchNd
- https://blocklist.greensnow.co/greensnow.txt
- https://blockstream.info/address/1LukeQU5jwebXbMLDVydeH4vFSobRV9rkj
- https://blockstream.info/address/3Luke2qRn5iLj4NiFrvLBu2jaEj7JeMR6w
- https://blockstream.info/address/bc1qlukeyq0c69v97uss68fet26kjkcsrymd2kv6d4
- https://blog.appsecco.com/an-ssrf-privileged-aws-keys-and-the-capital-one-breach-4c3c2cded3af
- https://blog.cloudflare.com/performing-preventing-ssl-stripping-a-plain-english-primer/
- https://blog.cloudflare.com/understanding-our-cache-and-the-web-cache-deception-attack/
- https://blog.dhampir.no/content/exim4-line-length-in-debian-stretch-mail-delivery-failed-returning-message-to-sender
- https://blog.gzti.me/thanks/
- https://blog.harmj0y.net/
- https://blog.includesecurity.com/2024/03/discovering-deserialization-gadget-chains-in-rubyland/
- https://blog.jeremiahgrossman.com/2006/08/i-know-where-youve-been.html
- https://blog.p6.is/Abusing-Environment-Variables/
- https://blog.rapid7.com/2017/06/30/how-to-install-and-configure-aide-on-ubuntu-linux/
- https://blog.sevagas.com/?Bypass-Windows-Defender-Attack-Surface-Reduction
- https://blog.shadypixel.com/log-iptables-messages-to-a-separate-file-with-rsyslog/
- https://blog.sleeplessbeastie.eu/2015/01/02/how-to-perform-unattended-upgrades/
- https://blog.sleeplessbeastie.eu/2015/03/02/how-to-verify-installed-packages/
- https://blog.soliditylang.org/2022/08/08/calldata-tuple-reencoding-head-overflow-bug/
- https://blog.vigilcode.com/2011/04/ubuntu-server-initial-security-quick-secure-setup-part-i/
- https://blog.vigilcode.com/2011/05/ufw-with-fail2ban-quick-secure-setup-part-ii/
- https://blog.youxu.info/
- https://blog.zecops.com/vulnerabilities/vulnerability-reproduction-cve-2020-0796-poc/
- https://blogs.jpcert.or.jp/ja/2019/02/tick-activity.html
- https://blogs.technet.microsoft.com/ilikesql_by_dandyman/2013/03/10/how-to-install-a-msi-file-unattended/
- https://bmc.link/cyb3rmx
- https://book.hacktricks.xyz/
- https://book.hacktricks.xyz/pentesting-web/sql-injection/ms-access-sql-injection
- https://book.nmask.cn/
- https://brasil.io/datasets/
- https://brasil.io/home/
- https://brasilcnpj.net/
- https://breachdirectory.org/
- https://breachinsider.com/honey-buckets/
- https://breakingmalware.com/malware/ardbot-a-malware-under-construction/
- https://breakingmalware.com/malware/furtim-malware-avoids-mass-infection/
- https://breakingmalware.com/vulnerabilities/elastic-boundaries-elevating-privileges-by-environment-variables-expansion/
- https://brutelogic.com.br/blog/dom-based-xss-the-3-sinks/
- https://btc.com/1FHDM49QfZX6pJmhjLE5tB2K6CaTLMZpXZ
- https://bugs.chromium.org/p/chromium/issues/detail?id=682020
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806852
- https://busca.inpi.gov.br/pePI/servlet/LoginController?action=login
- https://buscagrupos.com.br/
- https://buscatextual.cnpq.br/buscatextual/busca.do?metodo=apresentar
- https://buymeacoffee.com/d4vinci
- https://buymeacoffee.com/iBotPeaches
- https://c-csa.cn/research/results/
- https://cadastro.cfp.org.br
- https://cadastroempresa.com.br/
- https://cadastropre.com.br/#/consulta
- https://caddy.community
- https://caido.io/
- https://caipora.pro
- https://calendar.google.com/calendar/u/0/r?cid=Y182OTM4dGt0MjRtajI0NnNzOThiaGtnM29qNEBncm91cC5jYWxlbmRhci5nb29nbGUuY29t
- https://calhoun.nps.edu/handle/10945/36026
- https://camerasdaer.perkons.com:60000/DAER-6712
- https://camerasdaer.perkons.com:60000/DAER-6713
- https://camerasdaer.perkons.com:60000/DAER-6714
- https://camerasdaer.perkons.com:60000/DAER-6716
- https://camerasdaer.perkons.com:60000/DAER-6718
- https://camerasdaer.perkons.com:60000/DAER-6734
- https://camerasdaer.perkons.com:60000/DAER-6737
- https://camerasdaer.perkons.com:60000/DAER-6739
- https://camerasdaer.perkons.com:60000/DAER-6743
- https://camerasdaer.perkons.com:60000/DAER-6744
- https://camerasdaer.perkons.com:60000/DAER-6748
- https://camerasdaer.perkons.com:60000/live/media/PK5916/DeviceIpint.6/SourceEndpoint.video:0:0
- https://carapicuiba.sp.gov.br/desaparecido
- https://carfacts.com.br/ConsultaGratis
- https://casadosdados.com.br/
- https://casvancooten.com/
- https://cat-in-136.github.io/2010/12/aadecode-decode-encoded-as-aaencode.html
- https://cdn.ellio.tech/community-feed
- https://censys.io
- https://centraldecruzeiros.com.br/
- https://centralops.net/co/
- https://centralservicos.detran.ro.gov.br/consulta/veiculo
- https://cert.360.cn/
- https://ceur-ws.org/Vol-3260/
- https://ceur-ws.org/Vol-3260/paper6.pdf
- https://cfc.org.br/conselhos/conselho-regional-de-contabilidade-do-maranhao/
- https://cfp.recon.cx/reconmtl2019/talk/MRJ3CN/
- https://chaos.projectdiscovery.io
- https://chat.openai.com/chat
- https://cheatsheets.zip/
- https://chrome.google.com/extensions/detail/mpiodijhokgodhhofbcjdecpffjipkle
- https://chybeta.github.io/
- https://cinsscore.com/list/ci-badguys.txt
- https://circleci.com/gh/goodwithtech/dockle-ci-test
- https://cirt.net/passwords
- https://cisofy.com/documentation/lynis/get-started/
- https://cisofy.com/lynis/#installation
- https://cloud.hacktricks.xyz/
- https://cloud.mail.ru/public/2eHX/38Ek7Lmfx?tdsourcetag=s_pctim_aiomsg
- https://cloudflare.com/ips/
- https://cloudonaut.io/aws-security-primer/
- https://cloudpro.zone/index.php/2018/01/18/debian-9-3-server-setup-guide-part-1/
- https://cloudpro.zone/index.php/2018/01/27/debian-9-3-server-setup-guide-part-4/
- https://cloudpro.zone/index.php/2018/01/30/debian-9-3-server-setup-guide-part-5/
- https://cloudsec.huoxian.cn/
- https://cloudsec.tencent.com/home/
- https://cloudseclist.com/
- https://cmdchallenge.com/
- https://cn.relingo.net/en/
- https://cna.oab.org.br
- https://cnes.datasus.gov.br/
- https://cnpj.biz/
- https://cnpjs.rocks/
- https://code.google.com/p/ratproxy/
- https://code.google.com/p/skipfish/
- https://codelabs.developers.google.com/codelabs/cel-go#0
- https://codeshare.frida.re/
- https://collectory.sibbr.gov.br/collectory/datasets
- https://columbus.elmasy.com/
- https://combot.org/telegram/top/groups?lng=pt&page=1&q=SEU_ALVO
- https://computingforgeeks.com/how-to-protect-grub-with-password-on-debian-ubuntu-and-kali-linux/
- https://concessionariatamoios.com.br/cameras/ver/10
- https://concessionariatamoios.com.br/cameras/ver/12
- https://concessionariatamoios.com.br/cameras/ver/13
- https://concessionariatamoios.com.br/cameras/ver/14
- https://concessionariatamoios.com.br/cameras/ver/8
- https://concessionariatamoios.com.br/cameras/ver/9
- https://concluintes.educacao.sp.gov.br/publica/consultapublica/Search
- https://conexis.org.br/numeros/mapa-de-antenas-2/
- https://conexis.org.br/numeros/mapa-de-antenas-completo/
- https://conselhodeeducacao.ma.gov.br/
- https://consulta.detran.ro.gov.br/CentralDeConsultasInternet/Internet/Habilitacao/ConsultaProcesso.asp
- https://consulta.detran.ro.gov.br/CentralDeConsultasInternet/Software/ViewConsultaVeiculos.aspx
- https://consulta.detran.ro.gov.br/ResultadoProva
- https://consultaauxilio.cidadania.gov.br/consulta/#/
- https://consultafns.saude.gov.br/#/consolidada
- https://consultanumero.abrtelecom.com.br/consultanumero/consulta/consultaHistoricoRecenteCtg
- https://consultanumero.abrtelecom.com.br/consultanumero/consulta/consultaSituacaoAtualCtg
- https://consultanumero.info/
- https://consultaprofissional.confea.org.br
- https://consultapublica.antt.gov.br/Site/ConsultaRNTRC.aspx/consultapublica
- https://corecon-ma.org.br/
- https://corenma.gov.br/site2/
- https://cra-ma.org.br/
- https://crack.sh/
- https://crackstation.net/
- https://crackstation.net/crackstation-wordlist-password-cracking-dictionary.htm
- https://crbm2.gov.br/
- https://crcma.org.br/
- https://crcma.org.br/crcma/
- https://cref21.org.br/
- https://crfma.org.br/
- https://crimeflare.zidansec.com
- https://crmma.org.br/servicos-para-medicos/certidoes-declaracoes/certidao-negativa-nada-consta
- https://crpma.org.br/
- https://crq11.org.br/
- https://crtr17.gov.br/
- https://cse.google.com/cse?cx=008239573640124656331:o29gdxc2osj
- https://ctf-wiki.github.io/ctf-wiki/index.html
- https://ctf.hackmethod.com/
- https://ctf.katsudon.org/
- https://ctf.katsudon.org/ctf4u/
- https://ctflearn.com/
- https://cve.mitre.org/
- https://cvedb.shodan.io/cves
- https://cxsecurity.com/dorks/
- https://cystack.net/
- https://dados.agricultura.gov.br/dataset
- https://dados.al.gov.br/catalogo/dataset
- https://dados.antt.gov.br/
- https://dados.antt.gov.br/dataset
- https://dados.antt.gov.br/dataset/empresas-habilitadas
- https://dados.cvm.gov.br/dados/
- https://dados.cvm.gov.br/dataset/
- https://dados.gov.br/dados/organizacoes/visualizar/policia-federal
- https://dados.gov.br/dataset?tags=ERB
- https://dados.gov.br/home
- https://dados.ibict.br/dataset
- https://dados.mg.gov.br/dataset/
- https://dados.mj.gov.br/dataset
- https://dados.mma.gov.br/
- https://dados.mogidascruzes.sp.gov.br/dataset/
- https://dados.pbh.gov.br/dataset/
- https://dados.pe.gov.br/dataset
- https://dados.saude.go.gov.br/dataset/
- https://dados.sc.gov.br/
- https://dados.turismo.gov.br/dataset/
- https://dadosabertos.bcb.gov.br/dataset
- https://dadosabertos.bndes.gov.br/dataset
- https://dadosabertos.capes.gov.br/dataset/
- https://dadosabertos.ibama.gov.br/en/dataset/
- https://dadosabertos.tse.jus.br/
- https://daer.kopp.com.br/ftp/imagem.php?id=Sananduva
- https://daer2.fiscaltech.com.br:8843/panoramicas/6204.jpg
- https://daer2.fiscaltech.com.br:8843/panoramicas/6208.jpg
- https://daer2.fiscaltech.com.br:8843/panoramicas/6210.jpg
- https://daer2.fiscaltech.com.br:8843/panoramicas/6211.jpg
- https://daer2.fiscaltech.com.br:8843/panoramicas/6212.jpg
- https://daer2.fiscaltech.com.br:8843/panoramicas/6213.jpg
- https://daer2.fiscaltech.com.br:8843/panoramicas/6214.jpg
- https://daer2.fiscaltech.com.br:8843/panoramicas/6215.jpg
- https://daer2.fiscaltech.com.br:8843/panoramicas/6216.jpg
- https://datarecovery.com/rd/default-passwords/
- https://debian-handbook.info/browse/stable/sect.regular-upgrades.html
- https://dedic.pcivil.rj.gov.br/Consulta.aspx
- https://defuse.ca/online-x86-assembler.htm
- https://desaparecidos.osasco.sp.gov.br/#/portal
- https://desaparecidos.pb.gov.br/desaparecidos/desaparecidos.jsf
- https://desaparecidos.pc.sc.gov.br/#/
- https://desaparecidos.pcivil.rj.gov.br/pesquisar
- https://desaparecidos.pjc.mt.gov.br/inicio
- https://desaparecidos.policiacivil.mg.gov.br/
- https://desaparecidos.policiacivil.mg.gov.br/desaparecido/album
- https://desaparecidos.pr.gov.br/desaparecidos/desaparecidos.do?action=iniciarProcesso&m=false
- https://desaparecidosdobrasil.org/pesquisar-desaparecidos/
- https://devcraft.io/2021/01/07/universal-deserialisation-gadget-for-ruby-2-x-3-x.html
- https://developer.android.com/tools/adb
- https://developer.mozilla.org/en-US/docs/Glossary/Preflight_request
- https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS
- https://developer.mozilla.org/en-US/docs/Web/Security/Same-origin_policy
- https://developer.shodan.io/api
- https://developer.twitter.com/en/docs/basics/authentication/guides/access-tokens
- https://developers.google.com/maps/documentation/places/web-service/get-api-key
- https://diariooficial.saoluis.ma.gov.br/
- https://dig.pm/
- https://digi.ninja
- https://dirkjanm.io/
- https://districtcourt.nsw.gov.au/court-lists-and-sitting-dates/types-of-court-lists.html
- https://djangofaiola.blogspot.com/2024/10/happy-3rd-birthday-to-dfapkdngrader.html
- https://dl.threat-list.com/1/domains.txt
- https://dnscheck.pingdom.com/
- https://dnsdb.io/zh-cn
- https://dnsdumpster.com
- https://dnslog.cn/
- https://doc.traefik.io/traefik/https/acme/#providers
- https://docker.mirrors.ustc.edu.cn
- https://docs.aleph.occrp.org
- https://docs.aleph.occrp.org/developers/installation
- https://docs.aleph.occrp.org/get-in-touch
- https://docs.crowdsec.net/
- https://docs.google.com/document/d/1ZtSAa6fj2a6KRWviTn3WoJm09edvrNUp4Iz_dOjjyY8/edit?usp=sharing
- https://docs.microsoft.com/en-us/dotnet/standard/data/xml/xslt-stylesheet-scripting-using-msxsl-script
- https://docs.microsoft.com/en-us/sysinternals/downloads/procmon
- https://docs.microsoft.com/en-us/sysinternals/downloads/pstools
- https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard
- https://docs.polyswarm.io/consumers
- https://docsify.js.org/#/zh-cn/
- https://docsv4.qingcloud.com/user_guide/development_docs/cli/install/install/
- https://documents.trendmicro.com/assets/white_papers/wp-a-security-analysis-of-the-data-distribution-service-dds-protocol.pdf
- https://dodwell.us/security/ufw-fail2ban-portscan.html
- https://dog.xmu.edu.cn/
- https://dojo.pwn.college/
- https://dontkillmyapp.com/
- https://dorks.faisalahmed.me/
- https://down.52pojie.cn/Tools/
- https://downloads.skullsecurity.org/passwords/
- https://drewkestell.us/Article/6/Chapter/1
- https://drive.google.com/file/d/16jbE9uQ464HaRKWC2FSTy-M8GQt2ODmS/view?usp=sharing
- https://drive.google.com/file/d/1XC7grFDeX2JvzaeVORKas1NumkLIAJL7/view?usp=sharing
- https://e-cartoriodobrasil.com/pedido/imoveis/pesquisa-qualificada-de-bens
- https://eclipse.dev/mat/download/
- https://edr.sangfor.com.cn/#/information/ransom_search
- https://emec.mec.gov.br/emec/nova#avancada
- https://en.wikipedia.org/wiki/Linux_PAM
- https://en.wikipedia.org/wiki/Network_Time_Protocol
- https://en.wikipedia.org/wiki/Security-Enhanced_Linux
- https://en.wikipedia.org/wiki/Time-based_One-time_Password_algorithm
- https://encoding.tools
- https://enigma0x3.net/2016/08/15/fileless-uac-bypass-using-eventvwr-exe-and-registry-hijacking/
- https://enigma0x3.net/2017/09/11/lateral-movement-using-excel-application-and-dcom/
- https://esaj.tjac.jus.br/esaj/portal.do?servico=190090
- https://esaj.tjce.jus.br/esaj/portal.do?servico=190090#
- https://esaj.tjsc.jus.br/esaj/portal.do?servico=190090#
- https://esaj.tjsp.jus.br/esaj/portal.do?servico=190090#
- https://evasions.checkpoint.com/
- https://evilcos.me/lab/xssor/
- https://explainshell.com/
- https://exploit-exercises.com/
- https://extended.lief.re
- https://extensionworkshop.com/documentation/develop/temporary-installation-in-firefox
- https://famem.org.br/
- https://fastmail.blog/2016/07/22/how-totp-authenticator-apps-work/
- https://feeds.ecrimelabs.net/data/metasploit-cve
- https://feodotracker.abuse.ch/blocklist/
- https://feodotracker.abuse.ch/downloads/ipblocklist.txt
- https://files.sans.org/summit/Digital_Forensics_and_Incident_Response_Summit_2015/PDFs/TheresSomethingAboutWMIDevonKerr.pdf
- https://filippo.io/Heartbleed/
- https://fipevalor.com.br/
- https://fofa.info/user/users/info
- https://forum.ywhack.com/bountytips.php?tools
- https://forum.ywhack.com/reverse-shell/
- https://foxglovesecurity.com/2017/02/07/type-juggling-and-php-object-injection-and-sqli-oh-my/
- https://frida.re/docs/javascript-api/#cmodule
- https://frida.re/news/2019/09/18/frida-12-7-released/
- https://ftp.registro.br/pub/numeracao/origin/
- https://ftp.registro.br/pub/numeracao/origin/nicbr-asn-blk-latest.txt
- https://ftp.suse.com/pub/projects/security/oval/
- https://fullhunt.io
- https://geektnt.com/sysctl-conf-hardening.html
- https://getfreesmsnumber.com/
- https://ginandjuice.shop/catalog
- https://gist.github.com/Bo0oM/daab4c59ba7fafc1d2e0ed14383b68e5
- https://gist.github.com/BuffaloWill/fa96693af67e3a3dd3fb
- https://gist.github.com/honoki/d7035c3ccca1698ec7b541c77b9410cf
- https://gist.github.com/Integ/bcac5c21de5ea3...
- https://gist.github.com/jhaddix/86a06c5dc309d08580a018c66354a056
- https://gist.github.com/LoadLow/90b60bd5535d6c3927bb24d5f9955b80
- https://gist.github.com/migolovanov/432fe28c8c7e9fa675ab3903c5eda77f
- https://gist.github.com/netson/c45b2dc4e835761fbccc
- https://gist.github.com/nullenc0de/fa23444ed574e7e978507178b50e1057
- https://gist.github.com/tomnomnom/14a918f707ef0685fdebd90545580309
- https://gist.github.com/vivami/03780dd512fec22f3a2bae49f9023384
- https://git-scm.com/docs/git-grep
- https://gitcoin.co/grants/3150/defi-web3-developer-roadmap
- https://github.blog/security/vulnerability-research/execute-commands-by-sending-json-learn-how-unsafe-deserialization-vulnerabilities-work-in-ruby-projects/
- https://github.com/0140454/hackbar
- https://github.com/0x4D31/honeyLambda
- https://github.com/0x727/FingerprintHub
- https://github.com/0x727/JNDIExploit
- https://github.com/0x727/ObserverWard
- https://github.com/0x727/ShuiZe_0x727/blob/master/Plugins/infoGather/subdomain/CDN/cdn-domain.conf
- https://github.com/0x727/SpringBootExploit
- https://github.com/0xbug/Hawkeye
- https://github.com/0xdea/frida-scripts
- https://github.com/0xsauby/yasuo
- https://github.com/1amfine2333/ncDecode
- https://github.com/1N3/IntruderPayloads
- https://github.com/1ucky7/jmg-for-Godzilla
- https://github.com/4ra1n/mysql-fake-server
- https://github.com/5icorgi/SpoofWeb
- https://github.com/5ime/CS_Decrypt
- https://github.com/7ioSecurity/XSS-Payloads
- https://github.com/A-D-Team/attackRmi
- https://github.com/A-mIn3/WINspect
- https://github.com/a0rtega/pafish
- https://github.com/a1phaboy/nacosleak
- https://github.com/a3vilc0de/PentesterSpecialDict
- https://github.com/AabyssZG/SpringBoot-Scan
- https://github.com/abc123info/BlueTeamTools
- https://github.com/abrignoni/ALEAPP
- https://github.com/abrignoni/iLEAPP
- https://github.com/AD-Security/AD_Miner
- https://github.com/adamdoupe/WackoPicko
- https://github.com/advisories
- https://github.com/akamai-threat-research/mqtt-pwn
- https://github.com/al0ne/Vxscan][https://github.com/al0ne/Vxscan
- https://github.com/Al1ex/CVE-2021-22205/
- https://github.com/Al1ex/WindowsElevation
- https://github.com/albell/parse-srcset
- https://github.com/AlexFaraino/vFeed
- https://github.com/Algorithm-Model-Research
- https://github.com/Algorithm-Model-Research/SPH_Tools
- https://github.com/alibaba/arthas
- https://github.com/aliyun/aliyun-cli
- https://github.com/aliyun/oss-browser
- https://github.com/AlmCo/Panorama
- https://github.com/AlmondOffSec/PassTheCert
- https://github.com/alrra
- https://github.com/amaz1ngday/fastjson-exp
- https://github.com/ambionics/phpggc#ascii-strings
- https://github.com/ambionics/phpggc#fast-destruct
- https://github.com/ammario/ssynflood
- https://github.com/Amulab/advul
- https://github.com/Amulab/cannon
- https://github.com/andreas-mausch/whatsapp-viewer
- https://github.com/andrewaeva/gobotnet
- https://github.com/AnonCatalyst/Ominis-OSINT/actions/workflows/ominis-search.yml
- https://github.com/AnonCatalyst/Ominis-OSINT/actions/workflows/search-username.yml
- https://github.com/AnonCatalyst/Ominis-OSINT/actions/workflows/web-search.yml
- https://github.com/antirez/hping
- https://github.com/any86/any-rule
- https://github.com/AonCyberLabs/Windows-Exploit-Suggester
- https://github.com/api0cradle/impacket/blob/a1d0cc99ff1bd4425eddc1b28add1f269ff230a6/examples/rpcchangepwd.py
- https://github.com/apsdehal/awesome-ctf/blob/master/README.md
- https://github.com/aquasecurity/trivy/releases/latest/
- https://github.com/ArchiveBox/ArchiveBox
- https://github.com/Areizen/JNI-Frida-Hook
- https://github.com/arnaudsoullie/ics-default-passwords
- https://github.com/asecure.cloud
- https://github.com/assetnote/commonspeak2-wordlists/tree/master/wordswithext
- https://github.com/assetnote/kiterunner
- https://github.com/assetnote/wordlists
- https://github.com/Audi-1/sqli-labs
- https://github.com/augustd/burp-suite-software-version-checks
- https://github.com/AugustDev/enchanted
- https://github.com/AV1080p/Benchmarks
- https://github.com/AveYo/LeanAndMean/blob/main/ToggleDefender.ps1
- https://github.com/B-i-t-K/PwnFox/releases
- https://github.com/b0bac/ApolloScanner
- https://github.com/bats3c/ADCSPwn
- https://github.com/bdamele/icmpsh
- https://github.com/beefproject/beef
- https://github.com/BeichenDream/BadPotato/
- https://github.com/BeichenDream/CVE-2022-26134-Godzilla-MEMSHELL
- https://github.com/BeichenDream/GodzillaMemoryShellProject
- https://github.com/bewhale/thinkphp_gui_tools
- https://github.com/Bin-Huang/chatbox
- https://github.com/bit4woo/domain_hunter_pro
- https://github.com/bjeborn/basic-auth-pot
- https://github.com/Bl0omZ/JNDIEXP
- https://github.com/BlackFan/client-side-prototype-pollution
- https://github.com/BlackFan/content-type-research/blob/master/XSS.md
- https://github.com/BlackFan/cspp-tools
- https://github.com/BlackINT3/OpenArk
- https://github.com/BlackTrace/pc_wxapkg_decrypt
- https://github.com/BloodHoundAD/SharpHound
- https://github.com/bluedragonz
- https://github.com/Bo0oM/fuzz.txt
- https://github.com/Boogipop/CVE-2023-22527-Godzilla-MEMSHELL
- https://github.com/brant-ruan/awesome-container-escape
- https://github.com/branw/pogo-proto-dumper
- https://github.com/brendan-rius/c-jwt-cracker
- https://github.com/brompwnie/uitkyk
- https://github.com/buckets.grayhatwarfare
- https://github.com/BuffaloWill/oxml_xxe
- https://github.com/BurntSushi/ripgrep
- https://github.com/C0nw0nk/Nginx-Lua-Anti-DDoS/wiki/funding
- https://github.com/c0ny1/java-memshell-scanner
- https://github.com/c0ny1/upload-labs
- https://github.com/c0ny1/vulstudy
- https://github.com/c0olw/NacosRce/
- https://github.com/calebstewart/CVE-2021-1675
- https://github.com/callumlocke/json-formatter
- https://github.com/camoufl4g3/SQLi-payload-Fuzz3R/blob/master/payloads.txt
- https://github.com/carbonblack/active_c2_ioc_public/blob/main/cobaltstrike/actor-specific/cobaltstrike_pyxie.csv
- https://github.com/carbonblack/active_c2_ioc_public/blob/main/shadowpad/shadowpad_202209.tsv
- https://github.com/carlospolop/PEASS-ng/blob/master/winPEAS/winPEASbat/winPEAS.bat
- https://github.com/carlospolop/PEASS-ng/releases/latest/download/linpeas.sh
- https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite
- https://github.com/carterbush
- https://github.com/ce-automne/TomcatMemShell
- https://github.com/CellularPrivacy/Android-IMSI-Catcher-Detector
- https://github.com/certsocietegenerale/FIR
- https://github.com/cha5126568/rust-reversing-helper
- https://github.com/chaitin/veinmind-tools
- https://github.com/chaitin/xpoc
- https://github.com/chaitin/xray
- https://github.com/chaitin/xray/discussions
- https://github.com/chaitin/xray/issues
- https://github.com/chaitin/xray/tree/master/pocs
- https://github.com/charles2gan/GDA-android-reversing-Tool
- https://github.com/charmbracelet/bubbletea
- https://github.com/charonlight/NacosExploitGUI
- https://github.com/chenjiandongx/how
- https://github.com/chenjiandongx/pls
- https://github.com/Cherrison/CrackMinApp
- https://github.com/chrisant996/clink
- https://github.com/chroblert/domainWeakPasswdCheck
- https://github.com/CHYbeta/Web-Security-Learning
- https://github.com/cinience/RedisStudio
- https://github.com/cipher387/Dorks-collections-list
- https://github.com/Ciphey/Ciphey
- https://github.com/CiscoCXSecurity/enum4linux
- https://github.com/clarkvoss/AEM-List
- https://github.com/Clear2020/icsmaster/
- https://github.com/CloudExplorer-Dev/CloudExplorer-Lite
- https://github.com/cloudreve/Cloudreve
- https://github.com/Cn33liz/MacroMeter
- https://github.com/CompassSecurity/BloodHoundQueries
- https://github.com/ContactLeft/sqlifuzzer/tree/master/payloads
- https://github.com/continuedev/continue
- https://github.com/CravateRouge/bloodyAD
- https://github.com/cristianzsh/forensictools
- https://github.com/csstree/csstree
- https://github.com/cujanovic/Content-Bruteforcing-Wordlist
- https://github.com/cujanovic/CRLF-Injection-Payloads
- https://github.com/cujanovic/dirsearch-wordlist
- https://github.com/cujanovic/Open-Redirect-Payloads
- https://github.com/cujanovic/SSRF-Testing/tree/master/svg
- https://github.com/cujanovic/subdomain-bruteforce-list
- https://github.com/cujanovic/Virtual-host-wordlist
- https://github.com/daedalus/bitcoin-recover-privkey
- https://github.com/daffainfo/AllAboutBugBounty
- https://github.com/daffainfo/AllAboutBugBounty/blob/master/CVEs/2021
- https://github.com/dafthack/MailSniper
- https://github.com/danielmiessler/RobotsDisallowed
- https://github.com/danielmiessler/SecLists
- https://github.com/danielmiessler/SecLists/tree/master/Discovery/Web-Content
- https://github.com/DanMcInerney/dnsspoof
- https://github.com/dark-kingA/cloudTools
- https://github.com/DataDog/KubeHound
- https://github.com/davehull/Kansa/
- https://github.com/david-littlefield/SingleFileMac
- https://github.com/davidprowe/BadBlood
- https://github.com/Daybr4ak/C2ReverseProxy
- https://github.com/dbgee/fastjson-rce
- https://github.com/decred/gominer
- https://github.com/deepseek-ai/awesome-deepseek-integration
- https://github.com/deformhead
- https://github.com/denny0223/scrabble
- https://github.com/depau/shcrt
- https://github.com/derailed/k9s
- https://github.com/devploit/nomore403
- https://github.com/Dheerajmadhukar/4-ZERO-3
- https://github.com/digininja/DVWA
- https://github.com/diogo-fernan/ir-rescue
- https://github.com/dirkjanm/BloodHound.py
- https://github.com/dirkjanm/CVE-2020-1472
- https://github.com/dirkjanm/krbrelayx
- https://github.com/dirkjanm/PKINITtools
- https://github.com/dirkjanm/privexchange/
- https://github.com/dmaasland/proxyshell-poc/blob/main/proxyshell_rce.py
- https://github.com/dnSpy/dnSpy
- https://github.com/do0dl3/xss-labs
- https://github.com/docker/docker-bench-security
- https://github.com/dolevf/Damn-Vulnerable-GraphQL-Application
- https://github.com/DominicBreuker/pspy
- https://github.com/dotboris/vuejs-serverside-template-xss
- https://github.com/DownUnderCTF/Challenges_2022_Public/blob/main/web/minimal-php/solve/solution.py
- https://github.com/dpacassi/disable-javascript
- https://github.com/dpnishant/appmon
- https://github.com/dr0op/WeblogicScan
- https://github.com/drb-ra/C2IntelFeeds/blob/master/feeds/domainC2s-30day-filter-abused.csv
- https://github.com/drb-ra/C2IntelFeeds/blob/master/feeds/domainC2s.csv
- https://github.com/drb-ra/C2IntelFeeds/blob/master/feeds/domainC2swithURL-30day-filter-abused.csv
- https://github.com/drb-ra/C2IntelFeeds/blob/master/feeds/domainC2swithURL-filter-abused.csv
- https://github.com/drb-ra/C2IntelFeeds/blob/master/feeds/domainC2swithURLwithIP-30day-filter-abused.csv
- https://github.com/drb-ra/C2IntelFeeds/blob/master/feeds/IPC2s-30day.csv
- https://github.com/drb-ra/C2IntelFeeds/blob/master/feeds/unverified/IPC2s.csv
- https://github.com/dromara/hutool
- https://github.com/dryoma/postcss-media-query-parser
- https://github.com/dushixiang/evil-mysql-server
- https://github.com/dwisiswant0/awesome-oneliner-bugbounty
- https://github.com/echoCTF/echoCTF.RED
- https://github.com/Eckybrazzz
- https://github.com/eeeeeeeeee-code/e0e1-wx
- https://github.com/EgeBalci/EGESPLOIT
- https://github.com/EgeBalci/HERCULES
- https://github.com/ehang-io/nps
- https://github.com/ElDavoo/WhatsApp-Crypt14-Crypt15-Decrypter
- https://github.com/eliasgranderubio/dagda/
- https://github.com/epony4c/Exploit-Dictionary
- https://github.com/erwanlr/Fingerprinter
- https://github.com/Escape-Technologies/graphql-wordlist
- https://github.com/eset/malware-ioc
- https://github.com/Esonhugh/Gopherus3
- https://github.com/espreto/wpsploit
- https://github.com/etcd-io/etcd
- https://github.com/eteran/edb-debugger/wiki/Compiling-(Debian)
- https://github.com/eteran/edb-debugger/wiki/Compiling-(Fedora)
- https://github.com/eteran/edb-debugger/wiki/Compiling-(Ubuntu)
- https://github.com/Eugeny/tabby
- https://github.com/EvilAnne/lzCloudSecurity
- https://github.com/evilcos/xssor2
- https://github.com/evilsocket/legba/
- https://github.com/Evrytania/LTE-Cell-Scanner
- https://github.com/executemalware/Malware-IOCs
- https://github.com/ExeinfoASL/ASL
- https://github.com/extremecoders-re/pyinstxtractor
- https://github.com/f/awesome-chatgpt-prompts
- https://github.com/F6JO/RouteVulScan
- https://github.com/faciltech/scan-user
- https://github.com/fail2ban
- https://github.com/FalconForceTeam/SOAPHound
- https://github.com/fatedier/frp
- https://github.com/fernandobortotti/CPF-Tools
- https://github.com/ffffffff0x/1earn
- https://github.com/ffffffff0x/AboutSecurity
- https://github.com/ffffffff0x/Digital-Privacy
- https://github.com/ffffffff0x/f8x
- https://github.com/ffleming/timing_attack
- https://github.com/FireFart/HashCollision-DOS-POC
- https://github.com/firehol/blocklist-ipsets
- https://github.com/Flangvik/SharpCollection
- https://github.com/flibustier/jwt-online-cracker
- https://github.com/fmarcia/UglifyCSS
- https://github.com/fnmsd/MySQL_Fake_Server
- https://github.com/foospidy/web-cve-tests
- https://github.com/fortra/impacket
- https://github.com/fortra/impacket/blob/master/examples/changepasswd.py
- https://github.com/fortra/impacket/blob/master/examples/findDelegation.py
- https://github.com/fortra/impacket/blob/master/examples/goldenPac.py
- https://github.com/fortra/impacket/blob/master/examples/ntlmrelayx.py
- https://github.com/fortra/impacket/blob/master/examples/rbcd.py
- https://github.com/FortyNorthSecurity/EyeWitness/
- https://github.com/franc-pentest/ldeep
- https://github.com/freeFV/Tencent_Yun_tools
- https://github.com/frida/frida
- https://github.com/frohoff/ysoserial
- https://github.com/fry/d3
- https://github.com/Fu5r0dah/TongdaScan_go
- https://github.com/funilrys/dead-hosts
- https://github.com/future-architect/vuls
- https://github.com/fuzz-security/SuperWordlist
- https://github.com/galkan/crowbar
- https://github.com/garrettfoster13/sccmhunter
- https://github.com/gchq/CyberChef
- https://github.com/gfoss/PSRecon/
- https://github.com/gh0std4ncer/lizkebab/blob/master/client.c
- https://github.com/gh0stkey/HaE
- https://github.com/ghost-ng/slinger
- https://github.com/GhostPack/Certify
- https://github.com/GhostPack/SharpDPAPI
- https://github.com/Ghr07h/Heimdallr
- https://github.com/gianlucaborello/libprocesshider
- https://github.com/gildas-lormeau/SingleFile-MV3
- https://github.com/gildas-lormeau/SingleFile-Safari-Extension
- https://github.com/giMini/NOAH
- https://github.com/gobysec/Goby/issues
- https://github.com/gongxian-ding/gmssl-python
- https://github.com/goodwithtech/dockle-ci-test
- https://github.com/google/fuzzing/tree/master/dictionaries
- https://github.com/google/grr
- https://github.com/gophish/gophish
- https://github.com/GoSecure/csp-auditor
- https://github.com/GoSecure/php7-opcache-override
- https://github.com/grafov/hulk
- https://github.com/GrrrDog/weird_proxies/tree/master
- https://github.com/GTFOBins/GTFOBins.github.io binaries
- https://github.com/gtworek/PSBits/blob/master/Misc/EnableSeBackupPrivilege.ps1
- https://github.com/guanzhi/GmSSL
- https://github.com/guyoung/CaptfEncoder/releases
- https://github.com/guyoung/CaptfEncoder/tree/master/CaptfEncoder-V1
- https://github.com/guyoung/CaptfEncoder/tree/master/CaptfEncoder-V2
- https://github.com/H4ckForJob/dirmap
- https://github.com/H4cking2theGate/ysogate
- https://github.com/haad/proxychains
- https://github.com/hack2fun/gopher_attack_mssql
- https://github.com/hacklcx/HFish
- https://github.com/hackmdio/codimd
- https://github.com/HadessCS/Red-team-Interview-Questions
- https://github.com/haileys/old-website/blob/master/posts/rails-3.2.10-remote-code-execution.md
- https://github.com/hakirisec/hakiri_toolbelt
- https://github.com/Hannibal046/Awesome-LLM
- https://github.com/hanslub42/rlwrap
- https://github.com/hansmach1ne/lfimap
- https://github.com/hashcat/hashcat
- https://github.com/HashPals/Name-That-Hash
- https://github.com/hausec/ProxyLogon
- https://github.com/haypo/hachoir3
- https://github.com/hedgedoc/hedgedoc
- https://github.com/helloexp/0day
- https://github.com/helloexp/0day/tree/master/shiro
- https://github.com/hluwa/FRIDA-DEXDump.git
- https://github.com/honey-buckets/
- https://github.com/HqWu-HITCS/Awesome-Chinese-LLM
- https://github.com/httpvoid/writeups/blob/main/Ruby-deserialization-gadget-on-rails.md
- https://github.com/huin/goupnp
- https://github.com/HummerRisk/HummerRisk
- https://github.com/huyuanzhi2/password_brute_dictionary
- https://github.com/hvdwolf/jExifToolGUI
- https://github.com/hwchase17/langchain
- https://github.com/hwdsl2/openvpn-install
- https://github.com/HXSecurity/TerraformGoat
- https://github.com/HybrisDisaster/aspHashDoS
- https://github.com/HyperSine/how-does-MobaXterm-encrypt-password
- https://github.com/HyperSine/how-does-navicat-encrypt-password
- https://github.com/HyperSine/how-does-Xmanager-encrypt-password
- https://github.com/iagox86/dnscat2
- https://github.com/iamacarpet/go-win64api
- https://github.com/iBotPeaches/Apktool
- https://github.com/Ignitetechnologies/Mindmap/
- https://github.com/iiiusky/alicloud-tools
- https://github.com/iknowjason/Awesome-CloudSec-Labs
- https://github.com/immersive-translate/immersive-translate/
- https://github.com/imyelo/docsify-pagination#readme
- https://github.com/indetectables-net/toolkit
- https://github.com/indianajson/can-i-take-over-dns#what-is-a-dns-takeover
- https://github.com/ine-labs/AWSGoat
- https://github.com/Infocyte/PSHunt
- https://github.com/inguardians/peirates
- https://github.com/INotGreen/SharpScan
- https://github.com/instaloader/instaloader
- https://github.com/internetwache/CT_subdomains
- https://github.com/Invoke-IR/PowerForensics
- https://github.com/IOActive/jdwp-shellifier
- https://github.com/ionuttbara/windows-defender-remover
- https://github.com/iPeng6/docsify-sidebar-collapse
- https://github.com/irsdl/IIS-ShortName-Scanner
- https://github.com/iSECPartners/Scout2
- https://github.com/ismailtasdelen/command-injection-payload-list
- https://github.com/ismailtasdelen/xss-payload-list
- https://github.com/itm4n/PrivescCheck
- https://github.com/itoffshore
- https://github.com/j1anFen/shiro_attack
- https://github.com/j3ers3/PassList
- https://github.com/jaeles-project/gospider
- https://github.com/jar-analyzer/class-obf
- https://github.com/jasonlvhit/gocron
- https://github.com/Java-Chains/web-chains
- https://github.com/javascript-obfuscator/javascript-obfuscator#you-can-support-this-project-by-donating
- https://github.com/jaywcjlove/linux-command
- https://github.com/jeanphorn/wordlist
- https://github.com/jedmao/parse-css-font
- https://github.com/jekil/awesome-hacking/
- https://github.com/jerryhoff/WebGoat.NET
- https://github.com/jiansiting/Decryption-Tools
- https://github.com/jjf012/gopoc
- https://github.com/jlevy/the-art-of-command-line
- https://github.com/joaomatosf/jexboss
- https://github.com/joe-shenouda/awesome-cyber-skills
- https://github.com/joesecurity/pafishmacro
- https://github.com/JohnHammond/ctf-katana
- https://github.com/jonluca/anubis
- https://github.com/jperasmus/docsify-copy-code/blob/master/README.md
- https://github.com/jsdom/whatwg-mimetype
- https://github.com/juewuy/ShellClash
- https://github.com/Jumbo-WJB/PTH_Exchange
- https://github.com/k8gege/Ladon
- https://github.com/Karanxa/Bug-Bounty-Wordlists
- https://github.com/kardianos/service
- https://github.com/karelzak/util-linux/commit/7ff1162e67164cb4ece19dd809c26272461aa254
- https://github.com/khr0x40sh/MacroShop
- https://github.com/klaver/sysctl/blob/master/sysctl.conf
- https://github.com/knownsec/404StarLink
- https://github.com/knownsec/404StarLink2.0-Galaxy#community
- https://github.com/knownsec/Kunyu
- https://github.com/kongsec/Wordpress-BruteForce-List/
- https://github.com/Konloch/bytecode-viewer
- https://github.com/konstantingoretzki
- https://github.com/koreader/koreader
- https://github.com/kost/dvcs-ripper
- https://github.com/Kryp7os/SharpRBCD
- https://github.com/ks-collab/cite-extension
- https://github.com/kubernetes-sigs/cri-tools
- https://github.com/kubernetes-sigs/kind
- https://github.com/kubernetes/kubeadm
- https://github.com/kubernetes/minikube
- https://github.com/L0kiii/FofaScan
- https://github.com/lalithr95/fuzzapi
- https://github.com/LandGrey/copagent
- https://github.com/LandGrey/pydictor/
- https://github.com/langchain-ai/langchain
- https://github.com/langgptai/wonderful-prompts
- https://github.com/laramies/theHarvester/wiki/Installation
- https://github.com/lavalamp-/password-lists
- https://github.com/leebaird/discover
- https://github.com/lemono0/FastJsonParty
- https://github.com/lewiswu1209/fingerprint
- https://github.com/lextoumbourou/goodhosts
- https://github.com/lgandx/Responder
- https://github.com/lgandx/Responder-Windows
- https://github.com/libimobiledevice/libimobiledevice
- https://github.com/lief-project/LIEF/releases/tag/0.16.5
- https://github.com/lightspin-tech/red-kube
- https://github.com/lijiejie/swagger-exp
- https://github.com/lintstar/SharpHunter
- https://github.com/LittleBear4/OA-EXPTOOL
- https://github.com/lobuhi/byp4xx
- https://github.com/logancyang/obsidian-copilot
- https://github.com/login-securite/DonPAPI
- https://github.com/login-securite/lsassy
- https://github.com/LOLBAS-Project/LOLBAS-Project.github.io
- https://github.com/LOLSquad/DDoS-Scripts
- https://github.com/Lotus6/ConfluenceMemshell
- https://github.com/Lucifer1993/cmsprint
- https://github.com/lutfumertceylan/top25-parameter
- https://github.com/ly4k/Certipy
- https://github.com/madhuakula/kubernetes-goat
- https://github.com/malwares/Remote-Access-Trojan
- https://github.com/mamba-2021/EXP-POC/tree/main/Spring-cloud-function-SpEL-RCE
- https://github.com/marcelki/sockstress
- https://github.com/mariusv
- https://github.com/Marven11/Marven11/blob/main/buy_me_a_coffee.md
- https://github.com/matiasb/unpy2exe
- https://github.com/matishsiao/goInfo/blob/master/goInfo_windows.go
- https://github.com/matricali
- https://github.com/mattermost/mattermost
- https://github.com/mauri870/powershell-reverse-http
- https://github.com/mauri870/ransomware
- https://github.com/maurosoria/dirsearch
- https://github.com/MAVProxyUser/YushuTechUnitreeGo1#pdb-emergency-shut-off-backdoor-no-way-to-disable
- https://github.com/MaxiHuHe04/iTunes-Backup-Explorer
- https://github.com/Mayyhem/SharpSCCM
- https://github.com/mazen160/jwt-pwn
- https://github.com/mbechler/marshalsec
- https://github.com/Metarget/metarget
- https://github.com/milu001/sundeskQ
- https://github.com/minimaxir/big-list-of-naughty-strings
- https://github.com/MISP/misp-warninglists
- https://github.com/MISP/MISP/blob/2.4/app/files/feed-metadata/defaults.json
- https://github.com/MistSpark/DNS-Wordlists
- https://github.com/mitchellkrogza/Badd-Boyz-Hosts
- https://github.com/mitchellkrogza/fail2ban-useful-scripts
- https://github.com/mitchellkrogza/Fail2Ban.WebExploits
- https://github.com/mitchellkrogza/linux-server-administration-scripts
- https://github.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker/blob/master/MANUAL-CONFIGURATION.md
- https://github.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker/blob/master/NGINX-SSL-Site-Config-Example.md
- https://github.com/mitchellkrogza/Suspicious.Snooping.Sniffing.Hacking.IP.Addresses
- https://github.com/mitchellkrogza/The-Big-List-of-Hacked-Malware-Web-Sites
- https://github.com/mitchellkrogza/Travis-CI-for-Apache-For-Testing-Apache-and-PHP-Configurations
- https://github.com/mitchellkrogza/Travis-CI-Nginx-for-Testing-Nginx-Configuration
- https://github.com/mitchellkrogza/Ultimate.Hosts.Blacklist
- https://github.com/monero-project/monero
- https://github.com/montysecurity/C2-Tracker/blob/main/data/Brute%20Ratel%20C4%20IPs.txt
- https://github.com/montysecurity/C2-Tracker/blob/main/data/Cobalt%20Strike%20C2%20IPs.txt
- https://github.com/montysecurity/C2-Tracker/blob/main/data/Havoc%20C2%20IPs.txt
- https://github.com/montysecurity/C2-Tracker/blob/main/data/Metasploit%20Framework%20C2%20IPs.txt
- https://github.com/montysecurity/C2-Tracker/blob/main/data/Posh%20C2%20IPs.txt
- https://github.com/montysecurity/C2-Tracker/blob/main/data/Sliver%20C2%20IPs.txt
- https://github.com/montysecurity/C2-Tracker/tree/main/data
- https://github.com/mostaphabahadou/postenum
- https://github.com/Moustachauve/cookie-editor
- https://github.com/mozilla/readability
- https://github.com/mpgn/ByP-SOP
- https://github.com/mpgn/CrackMapExec
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/mrknow001/aliyun-accesskey-Tools
- https://github.com/mrknow001/API-Explorer
- https://github.com/mrknow001/BurpAppletPentester
- https://github.com/mrknow001/wx_sessionkey_decrypt
- https://github.com/msrkp/PPScan
- https://github.com/mthcht/awesome-lists/blob/main/Lists/suspicious_named_pipe_list.csv
- https://github.com/mthcht/awesome-lists/blob/main/Lists/VPN/NordVPN/nordvpn_ips_list.csv
- https://github.com/mthcht/awesome-lists/blob/main/Lists/VPN/ProtonVPN/protonvpn_ip_list.csv
- https://github.com/mushorg/conpot
- https://github.com/mvo5/unattended-upgrades
- https://github.com/mzfr/liffy
- https://github.com/n00py/DCSync
- https://github.com/n0b0dyCN/redis-rogue-server
- https://github.com/n1nj4sec/pupy
- https://github.com/n3l5/irCRpull
- https://github.com/nagwww/s3-leaks
- https://github.com/Naituw/IPAPatch/releases/tag/1.0
- https://github.com/Naituw/IPAPatch/releases/tag/1.0.1
- https://github.com/natefinch/pie
- https://github.com/Naturehi666/searchall
- https://github.com/nccgroup/wssip
- https://github.com/Ne0nd0g/merlin
- https://github.com/nelenkov/android-backup-extractor
- https://github.com/nemo-wq/PrintNightmare-CVE-2021-34527
- https://github.com/neuroo/grabber
- https://github.com/nevermoe/unity_metadata_loader
- https://github.com/NH-RED-TEAM/RustHound
- https://github.com/nhooyr/dos
- https://github.com/NickSanzotta/BurpIntruder
- https://github.com/NickstaDB/SerializationDumper
- https://github.com/nicocha30/ligolo-ng
- https://github.com/nil0x42/singlefile2trilium
- https://github.com/nitincodery/org-dex.el
- https://github.com/nneonneo
- https://github.com/noraj/haiti
- https://github.com/novysodope/RMI_Inj_MemShell
- https://github.com/nowsecure/android-forensics
- https://github.com/NS-Sp4ce/AliyunAccessKeyTools
- https://github.com/NS-Sp4ce/Dict
- https://github.com/nuthrash/obsidian-html-plugin
- https://github.com/nw01f/CmsIdentification-masterV2
- https://github.com/NYAN-x-CAT/Lime-RAT/issues/new
- https://github.com/nyxxxie/awesome-default-passwords
- https://github.com/obheda12/GitDorker
- https://github.com/OffcierCia/support
- https://github.com/OfJAAH/KingOfBugBountyTips
- https://github.com/ohmyzsh/ohmyzsh
- https://github.com/OJ/gobuster
- https://github.com/ollama/ollama
- https://github.com/omurugur/OS_Command_Payload_List
- https://github.com/oneumyvakin/initme/blob/master/windows.go
- https://github.com/open-compass/opencompass
- https://github.com/open-webui/open-webui
- https://github.com/openwall/john
- https://github.com/Orange-Cyberdefense/GOAD
- https://github.com/Oros42/IMSI-catcher
- https://github.com/owasp-amass/amass
- https://github.com/owtf/owtf
- https://github.com/p0dalirius/Coercer
- https://github.com/p3nt4/PowerShdll
- https://github.com/PalindromeLabs/STEWS
- https://github.com/pan-unit42/iocs
- https://github.com/paralax/awesome-honeypots
- https://github.com/paralax/lfi-labs
- https://github.com/pathetiq/BurpSmartBuster
- https://github.com/pawelsalawa/sqlitestudio
- https://github.com/payloadbox/sql-injection-payload-list
- https://github.com/peass-ng/PEASS-ng/blob/master/winPEAS/winPEASexe/README.md
- https://github.com/pen4uin/java-echo-generator
- https://github.com/pen4uin/java-memshell-generator
- https://github.com/Pennyw0rth/NetExec
- https://github.com/Perfare/Il2CppDumper
- https://github.com/petercunha/GoAT
- https://github.com/Pgaijin66/XSS-Payloads/blob/master/payload.txt
- https://github.com/philsmd/itunes_backup2hashcat/
- https://github.com/pimps/gopher-tomcat-deployer
- https://github.com/pjamar/htmls-to-datasette
- https://github.com/PlexPt/awesome-chatgpt-prompts-zh
- https://github.com/postcss/postcss-selector-parser
- https://github.com/Potato-py/Potato/tree/03c3551e4770db440b27b0a48fc02b0a38a1cf04/exp/cve/CVE-2020-1472
- https://github.com/PowerShellMafia/CimSweep
- https://github.com/PowerShellMafia/PowerSploit
- https://github.com/PowerShellMafia/PowerSploit/blob/dev/Recon/PowerView.ps1
- https://github.com/ppabc/security_check
- https://github.com/pratiktri/server_init_harden
- https://github.com/PrismJS/prism
- https://github.com/projectdiscovery/nuclei
- https://github.com/projectdiscovery/nuclei-templates/
- https://github.com/projectdiscovery/nuclei-templates/blob/master/cves/CVE-2020-5902.yaml
- https://github.com/projectdiscovery/subfinder
- https://github.com/ptrkrysik/gr-gsm/wiki/Passive-IMSI-Catcher
- https://github.com/Purp1eW0lf/Blue-Team-Notes
- https://github.com/pwnfoo/NTLMRecon
- https://github.com/pyinstaller/pyinstaller
- https://github.com/qazbnm456/awesome-web-security
- https://github.com/QHpix/CVE-2021-44521
- https://github.com/qi4L/JYso
- https://github.com/qigpig/MysqlHoneypot
- https://github.com/qiniu/kodo-browser
- https://github.com/qishibo/AnotherRedisDesktopManager
- https://github.com/quentinhardy/odat
- https://github.com/quentinhardy/odat/releases/
- https://github.com/qwqdanchun/Pillager/
- https://github.com/r0eXpeR/File-Download-Generator
- https://github.com/r0eXpeR/fingerprint
- https://github.com/rabbitmask/WeblogicScan
- https://github.com/rafaybaloch/SOP-Bypass-Mini-Test-Suite
- https://github.com/random-robbie/bruteforce-lists
- https://github.com/rapid7/hackazon
- https://github.com/rapid7/metasploit-framework
- https://github.com/rapid7/metasploit-framework/tree/master/data/wordlists
- https://github.com/rastating/wordpress-exploit-framework
- https://github.com/rauenzi/Trilium-SingleFile
- https://github.com/rebeyond/Behinder
- https://github.com/rebeyond/JNDInjector
- https://github.com/remittor/donate
- https://github.com/ResidualLaugh/FindSomething
- https://github.com/RhinoSecurityLabs/cloudgoat
- https://github.com/rictom/rede-cnpj/
- https://github.com/Ridter/PySQLTools
- https://github.com/risksense/zerologon
- https://github.com/rk/go-cron
- https://github.com/robvanmieghem/gominer
- https://github.com/RocketChat/Rocket.Chat
- https://github.com/rocky/python-uncompyle6/
- https://github.com/RonaldsonBellande/SPH_Tools/pkgs/container/sph_tools
- https://github.com/ropnop/kerbrute
- https://github.com/rsmudge/ElevateKit
- https://github.com/RUB-NDS/WS-Attacker
- https://github.com/rubysec/bundler-audit
- https://github.com/rubysec/ruby-advisory-db
- https://github.com/s0md3v/Arjun
- https://github.com/S3cur3Th1sSh1t/PowerSharpPack
- https://github.com/S3cur3Th1sSh1t/WinPwn
- https://github.com/safe6Sec/ShiroExp
- https://github.com/samratashok/nishang
- https://github.com/SaturnsVoid/GoBot
- https://github.com/savior-only/Spring_All_Reachable
- https://github.com/sbilly/awesome-security
- https://github.com/sc0tfree/updog
- https://github.com/scadastrangelove/SCADAPASS
- https://github.com/search/advanced
- https://github.com/seccome/Ehoney
- https://github.com/SecuraBV/CVE-2020-1472/blob/master/zerologon_tester.py
- https://github.com/securycore/Get-Baseline
- https://github.com/SecWiki/windows-kernel-exploits/blob/master/MS14-068/pykek/ms14-068.py
- https://github.com/SekoiaLab/Fastir_Collector
- https://github.com/sensepost/DNS-Shell
- https://github.com/sensepost/wikto
- https://github.com/sepinf-inc/IPED
- https://github.com/sepinf-inc/IPED/tree/master/iped-parsers/iped-parsers-impl/src/main/resources/iped/parsers/whatsapp
- https://github.com/sevagas/macro_pack/releases/
- https://github.com/SexyBeast233/SecDictionary
- https://github.com/sh4dowb/whatsapp-media-decrypt
- https://github.com/shack2/skyscorpion
- https://github.com/shack2/Struts2VulsTools
- https://github.com/shadsidd
- https://github.com/shadwork/Windows-Crunch
- https://github.com/ShawnDEvans/smbmap
- https://github.com/shelld3v/RCE-python-oneliner-payload
- https://github.com/shivsahni/APKEnum
- https://github.com/shmilylty/OneForAll
- https://github.com/shoonois
- https://github.com/ShutdownRepo/pywhisker
- https://github.com/ShutdownRepo/ShadowCoerce
- https://github.com/ShutdownRepo/targetedKerberoast
- https://github.com/sibears/IDAGolangHelper
- https://github.com/Significant-Gravitas/Auto-GPT
- https://github.com/simov/markdown-viewer
- https://github.com/sissbruecker/linkding
- https://github.com/six2dez/dorks_hunter
- https://github.com/Sjord/jwtcrack
- https://github.com/smgorelik/Windows-RCE-exploits
- https://github.com/Souhardya/UBoat/releases
- https://github.com/Souhardya/UBoat/wiki
- https://github.com/Soulghost/iblessing/wiki/Objc-Call-Snapshots
- https://github.com/Soulghost/iblessing/wiki/Objc-Reflection-Info
- https://github.com/Soulghost/iblessing/wiki/System-Libraries-(Foundation,-UIKit)-Simple-SimProcedure
- https://github.com/spalt08
- https://github.com/SpecterOps/BloodHound
- https://github.com/SpecterOps/BloodHound-Legacy/blob/master/Collectors/SharpHound.ps1
- https://github.com/SpiderLabs/Responder/blob/master/tools/FindSMB2UPTime.py
- https://github.com/sponsors/sanex3339
- https://github.com/sponsors/t3l3machus
- https://github.com/sponsors/v1s1t0r1sh3r3
- https://github.com/sqlmapproject/sqlmap
- https://github.com/sqlmapproject/sqlmap/tree/master/data/udf/postgresql
- https://github.com/sqlmapproject/sqlmap/wiki/Usage
- https://github.com/Srinivas11789/PcapXray
- https://github.com/stamparm/identYwaf
- https://github.com/StarfireLab/AutoZerologon
- https://github.com/Stevie-Ray
- https://github.com/strazzere/golang_loader_assist
- https://github.com/streaak/keyhacks
- https://github.com/sullo/nikto
- https://github.com/sv3nbeast/weblogic-framework
- https://github.com/sw33tLie/sns
- https://github.com/SwagXz/encrypt-labs
- https://github.com/Synacktiv-contrib/Modmobjam
- https://github.com/Synacktiv-contrib/Modmobmap
- https://github.com/T0xst/linux
- https://github.com/t3l3machus
- https://github.com/tadzik/simpleaes
- https://github.com/tarunkant/Gopherus
- https://github.com/Teach2Breach/rpeloader
- https://github.com/tecknicaltom/dsniff
- https://github.com/tegal1337/0l4bs
- https://github.com/TencentCloud/cosbrowser
- https://github.com/TencentCloud/tencentcloud-cli
- https://github.com/tennc/webshell
- https://github.com/The-Z-Labs/linux-exploit-suggester
- https://github.com/thebuckhacker
- https://github.com/TheKingOfDuck/fuzzDicts
- https://github.com/TheRook/subbrute
- https://github.com/thiagofuer/IPEDTools_Releases/releases
- https://github.com/thinkst/canarytokens-docker
- https://github.com/ThreatMon/ThreatMon-Daily-C2-Feeds
- https://github.com/TideSec/TideFinger_Go
- https://github.com/TideSec/TscanPlus
- https://github.com/tijme/angularjs-csti-scanner
- https://github.com/tobefuturer/restore-symbol
- https://github.com/tom0li/collection-document
- https://github.com/travisfoley/dfirtriage
- https://github.com/trickest/cve
- https://github.com/trickest/wordlists
- https://github.com/trufflesecurity/trufflehog
- https://github.com/trustoncloud/threatmodel-for-aws-s3
- https://github.com/U2FsdGVkX1/vps2suse
- https://github.com/Uberi/speech_recognition
- https://github.com/Ullaakut/cameradar
- https://github.com/undefinedd/extract0r-
- https://github.com/unode/firefox_decrypt
- https://github.com/upx/upx
- https://github.com/urbanadventurer/WhatWeb
- https://github.com/urbanadventurer/WhatWeb/wiki/
- https://github.com/utmapp/UTM
- https://github.com/UzJu/Cloud-Bucket-Leak-Detection-Tools
- https://github.com/vakuum/tcptunnel
- https://github.com/vanhauser-thc/thc-hydra
- https://github.com/vbooter/DDoS-Scripts
- https://github.com/veracode-research/spring-view-manipulation/
- https://github.com/vfeedio/pyvfeed
- https://github.com/VincentSit/ChinaMobilePhoneNumberRegex
- https://github.com/vmayoral/robot_hacking_manual/tree/master/1_case_studies/2_ros2
- https://github.com/vova616/screenshot/blob/master/screenshot_windows.go
- https://github.com/W01fh4cker/VcenterKit
- https://github.com/w181496/Web-CTF-Cheatsheet#nginx-buffering
- https://github.com/WADComs/WADComs.github.io
- https://github.com/wafinfo/DecryptTools
- https://github.com/wafinfo/ezOFFICE_Decrypt
- https://github.com/wagoodman/dive
- https://github.com/wallarm/jwt-secrets/blob/master/jwt.secrets.list
- https://github.com/WangYihang/Platypus
- https://github.com/WangYihang/Reverse-Shell-Manager
- https://github.com/WangYihang/Webshell-Sniper
- https://github.com/wangyiwy/oktools
- https://github.com/warpdotdev/Warp
- https://github.com/WebAssembly/wabt
- https://github.com/WebGoat/WebGoat
- https://github.com/websockets/wscat
- https://github.com/welk1n/JNDI-Injection-Exploit
- https://github.com/WesleyWong420/OPSEC-Tradecraft
- https://github.com/wgpsec/cloudsword
- https://github.com/wgpsec/ENScan_GO
- https://github.com/wgpsec/fofa_viewer
- https://github.com/Wh04m1001/DFSCoerce
- https://github.com/wh0amitz/SharpADWS
- https://github.com/Wh1t3Fox/polenum
- https://github.com/wh1t3p1g/tabby
- https://github.com/White-hua/Apt_t00ls
- https://github.com/WhiteHSBG/JNDIExploit
- https://github.com/Whoopsunix/nacosScan
- https://github.com/Whoopsunix/PPPYSO
- https://github.com/whwlsfb/BurpCrypto
- https://github.com/whwlsfb/Log4j2Scan
- https://github.com/WiredPulse/PoSh-R2
- https://github.com/wireghoul/dotdotpwn
- https://github.com/wpscanteam/wpscan
- https://github.com/wupco/PHP_INCLUDE_TO_SHELL_CHAR_DICT
- https://github.com/wux1an/wxapkg
- https://github.com/wvit/web-document
- https://github.com/wy876/POC
- https://github.com/wyzxxz/shiro_rce_tool
- https://github.com/X1r0z/JNDIMap
- https://github.com/X4BNet/lists_vpn/tree/main
- https://github.com/xcellerator/linux_kernel_hacking
- https://github.com/xer0days/BugBounty
- https://github.com/XiaoliChan/zerologon-Shot
- https://github.com/xiaoyunjie/Shell_Script
- https://github.com/xiecat/fofax
- https://github.com/xmendez/wfuzz/tree/master/wordlist
- https://github.com/xnohat/trilium-simple-singlefile-renderer
- https://github.com/xsscx/Commodity-Injection-Signatures
- https://github.com/xsuperbug/payloads
- https://github.com/Y4er/ysoserial
- https://github.com/yaap7/ldapsearch-ad
- https://github.com/yangliukk/FindToDeskPass
- https://github.com/yarrick/iodine
- https://github.com/YasserGersy/Enums/
- https://github.com/YDHCUI/CNVD-2020-10487-Tomcat-Ajp-lfi
- https://github.com/YinAndYangSecurityAwareness/dreamr-botnet
- https://github.com/youmulijiang/HaeToYakit
- https://github.com/ytisf/theZoo/tree/master/malwares/Source/Original
- https://github.com/yuanhaiGreg/Fuzz-Dict
- https://github.com/yunemse48/403bypasser
- https://github.com/zan8in/afrog
- https://github.com/zardus/wargame-nexus
- https://github.com/zblurx/dploot
- https://github.com/zema1/suo5
- https://github.com/zeoxisca/gamma-gui
- https://github.com/zer1t0/certi
- https://github.com/zero-peak/ZeroOmega
- https://github.com/Zhuoyuan1/navicat_password_decrypt
- https://github.com/zhutougg/LandrayDES
- https://github.com/zhzyker/dismap
- https://github.com/zhzyker/exphub/blob/master/weblogic/cve-2020-14882_rce.py
- https://github.com/zotero/zotero-connectors
- https://github.com/zzzteph/probable_subdomains
- https://github.com/zzzteph/weakpass
- https://github.dev/LxxxSec/CTF-Java-Gadget
- https://gitlab.com/tomoyamachi/dockle-ci-test/-/jobs/238215077
- https://goauthentik.io/pricing/
- https://google.com/
- https://goteleport.com/docs/get-started/
- https://goteleport.com/docs/reference/architecture/
- https://gotyour.pw/
- https://gravitational.com/blog/ssh-handshake-explained/
- https://grupos-online.com/
- https://gruposdezap.com/
- https://gruposputaria.com/
- https://gruposwhats.app/
- https://grupowhats.online/
- https://guanjia.qq.com/pr/ls
- https://guitmz.com/win32-liora-b/
- https://habo.qq.com/tool
- https://habo.qq.com/tool/index
- https://habr.com/en/post/444940/
- https://hack.me/
- https://hackaday.com/2017/11/02/what-is-entropy-and-how-do-i-get-more-of-it/
- https://hackernews.cc/
- https://hackerone.com/reports/223203
- https://hackerone.com/reports/297478
- https://hackerone.com/reports/56828
- https://hackertarget.com
- https://hackertarget.com/find-dns-host-records
- https://hackfun.org/
- https://hackme.inndy.tw/
- https://hackmethod.com/roadmap/
- https://hacks.mozilla.org/2018/05/a-cartoon-intro-to-dns-over-https/
- https://hakin9.org/product/socmint-for-hackers/
- https://hakiri.io/facets
- https://harrisonsand.com/imsi-catcher/
- https://hashcat.net/hashcat/
- https://hashcat.net/wiki/doku.php?id=example_hashes
- https://hashes.com/en/decrypt/hash
- https://hashkiller.co.uk/
- https://hausec.com/domain-penetration-testing/
- https://have-ibeenpwned.com/
- https://hector.molinero.dev/donate
- https://help.ubuntu.com/community/Grub2/Passwords
- https://help.ubuntu.com/community/SSH/OpenSSH/Keys
- https://hex-rays.com/ida-pro/
- https://hideandsec.sh
- https://hideandsec.sh/
- https://highon.coffee/
- https://hole.cert.pl/domains/domains.csv
- https://html.spec.whatwg.org/multipage/parsing.html
- https://html5sec.org/
- https://hub.docker.com/r/ronaldsonbellande/sph_tools/tags
- https://huggingface.co/
- https://hunter.io
- https://i-intelligence.eu/uploads/public-documents/OSINT_Handbook_2020.pdf
- https://i.hacking8.com/tiquan/
- https://id-ransomware.malwarehunterteam.com
- https://im.rizin.re
- https://img-blog.csdnimg.cn/20210208234545304.png
- https://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-5-golden-gmsa-trust-attack-from-child-to-parent
- https://infocon.org/
- https://infosec.mozilla.org/guidelines/key_management
- https://infosec.mozilla.org/guidelines/openssh#modern-openssh-67
- https://instaloader.github.io/sponsors.html
- https://integrador.jucepa.pa.gov.br/projetos/usuario/consulta_empresa_site
- https://intelx.io/tools
- https://interestingengineering.com/innovation/gun-toting-robot-dog-kill-switch
- https://ioactive.com/pdfs/Hacking-Robots-Before-Skynet.pdf
- https://iocfeed.mrlooquer.com/feed.csv
- https://ios.browsr-tests.com
- https://ipinfo.io/
- https://iplogger.org/
- https://ipstack.com/documentation
- https://ipwhois.cnnic.net.cn
- https://issues.apache.org/jira/secure/attachment/12436620/ZooInspector.zip
- https://jacksondunstan.com/articles/tag/il2cpp
- https://jemurai.com/2018/10/11/how-it-works-totp-based-mfa/
- https://jetmind.github.io/2016/03/31/heroku-forwarded.html
- https://karakeep.app
- https://kb.mypdns.org/articles/MTX-A-3/DONATION
- https://keepassxc.org/donate
- https://ko-fi.com/t3l3machus
- https://koczkatamas.github.io/
- https://lab.pentestit.ru/
- https://labex.io/skilltrees/cybersecurity
- https://labs.inquest.net/
- https://labs.portcullis.co.uk/tools/polenum/
- https://landgrey.me/blog/15/
- https://landscape.cncf.io/
- https://launchpad.net/ufw
- https://leadscloud.github.io/serp-analyzer/
- https://leanpub.com/web-hacking-101
- https://learn.cisecurity.org/cis-cat-landing-page
- https://learn.duffandphelps.com/kape
- https://learnfrida.info/advanced_usage/
- https://learnxinyminutes.com/
- https://lelinhtinh.github.io/de4js/
- https://lesuo.venuseye.com.cn
- https://lesuobingdu.qianxin.com
- https://letsencrypt.org/
- https://leucosite.com
- https://lief.s3-website.fr-par.scw.cloud/latest/lief
- https://lief.s3-website.fr-par.scw.cloud/latest/sdk
- https://likegeeks.com/secure-linux-server-hardening-best-practices/#Hardening-proc-Directory
- https://linoxide.com/how-tos/linux-server-protection/
- https://linux-audit.com/audit-and-harden-your-ssh-configuration/
- https://linux-audit.com/linux-system-hardening-adding-hidepid-to-proc/
- https://linux-audit.com/using-ed25519-openssh-keys-instead-of-dsa-rsa-ecdsa/
- https://linux.oracle.com/security/oval/
- https://linuxtechlab.com/beginners-guide-to-selinux/
- https://linuxtechlab.com/replicate-selinux-policies-among-linux-machines/
- https://lists.blocklist.de/lists/all.txt
- https://lists.blocklist.de/lists/apache.txt
- https://lists.blocklist.de/lists/bots.txt
- https://lists.blocklist.de/lists/bruteforcelogin.txt
- https://lists.blocklist.de/lists/ftp.txt
- https://lists.blocklist.de/lists/imap.txt
- https://lists.blocklist.de/lists/mail.txt
- https://lists.blocklist.de/lists/ssh.txt
- https://lists.blocklist.de/lists/strongips.txt
- https://livid.v2ex.com/
- https://lock.cmpxchg8b.com/rebinder.html
- https://lyzem.com/search?f=all&l=pt&p=1&per-page=100&q=SEU_ALVO
- https://lzcloudsecurity.gitbook.io/yun-an-quan-gong-fang-ru-men/
- https://ma.equatorialenergia.com.br/
- https://magi.com/
- https://magoo.github.io/model-risk-aws/
- https://malshare.com/doc.php
- https://map.snapchat.com/@-15.127315,-51.412151,4.51z
- https://mapadecobertura.vivo.com.br/
- https://mapas.sinfra.mt.gov.br/portal/apps/sites/#/central-infra-20-2-1/pages/monitoramento-de-obras
- https://marineradar.de/en/
- https://masterpessimistaa.wordpress.com
- https://mathiasbynens.be/demo/url-regex
- https://md5decrypt.net/en/Sha256/
- https://medium.com/@d0znpp/how-to-bypass-libinjection-in-many-waf-ngwaf-1e2513453c0f
- https://medium.com/@qazbnm456
- https://medium.com/@satboy.fb/art-of-unrestricted-file-upload-exploitation-92ed28796d0
- https://medium.com/@vivami/phishing-between-the-app-whitelists-1b7dcdab4279
- https://medium.com/hackernoon/where-do-you-keep-credentials-for-your-lambda-functions-cac746048480
- https://mega.nz/#!zEAU1AQL!oWJ63n-D6lCuCQ4AY0Cv_405hX8kn7MEsa1iLH5UjKU
- https://metacpan.org/pod/Mac::iTunes::Library::Parse
- https://mholt.github.io/json-to-go/
- https://microcorruption.com/login
- https://microsoftedge.microsoft.com/addons/detail/efnbkdcfmcmnhlkaijjjmhjjgladedno
- https://minhabrk.com.br/home
- https://mirai.security.gives/data/ip_list.txt
- https://mirrors.aliyun.com/pypi/simple/
- https://misakikata.github.io/2021/03/%E5%BE%...
- https://misp.cert.ssi.gouv.fr/feed-misp/hashes.csv
- https://mozillazg.com/wechat_donate.jpeg
- https://music.163.com/#/song/1346907833/?userid=48353
- https://myaccount.google.com/lesssecureapps
- https://myip.ms/
- https://n.shellpub.com/
- https://napista.com.br/
- https://nastystereo.com/security/ruby-3.4-deserialization.html
- https://navisec.it/
- https://ncviewer.com/
- https://news.aliasrobotics.com/securing-uvdrobots/
- https://news.aliasrobotics.com/the-week-of-mobile-industrial-robots-bugs/
- https://news.aliasrobotics.com/week-of-universal-robots-bugs-exposing-insecurity/
- https://news.ycombinator.com/item?id=19177435#19178618
- https://next.api.aliyun.com/api/
- https://ngothang.com/how-to-install-clamav-and-configure-daily-scanning-on-centos/
- https://nocdn.nrd-list.com/0/nrd-list-32-days.txt
- https://nocdn.threat-list.com/0/domains.txt
- https://noransom.kaspersky.com/
- https://nostarch.com/bug-bounty-bootcamp
- https://ntlmv1.com/
- https://numverify.com/documentation
- https://nvd.nist.gov/
- https://nvd.nist.gov/vuln/data-feeds
- https://nyansatan.github.io/lightning/
- https://officercia.mirror.xyz/Uc1sf64yUCb0uo1DxR_nuif5EmMPs-RAshDyoAGEZZY
- https://olhovivo.sptrans.com.br
- https://onemilliontweetmap.com/?center=-18.79191774423444,-39.33105468750001&zoom=5&search=SEU_ALVO
- https://onibus.info
- https://onibusbrasil.com/placas
- https://opencollective.com/javascript-obfuscator
- https://openphish.com/feed.txt
- https://openwall.info/wiki/_media/john/pw-fake-nt.gz
- https://openwall.info/wiki/_media/john/pw-fake-nt100k.gz
- https://orange-cyberdefense.github.io/ocd-mindmaps/
- https://orange-cyberdefense.github.io/ocd-mindmaps/img/mindmap_ad_dark_classic_2025.03.excalidraw.svg
- https://osint-steam.vercel.app/pt
- https://osint.digitalside.it/Threat-Intel/lists/latestdomains.txt
- https://osint.digitalside.it/Threat-Intel/lists/latestips.txt
- https://osint.digitalside.it/Threat-Intel/lists/latesturls.txt
- https://osinthreat.herokuapp.com
- https://osinthreat.herokuapp.com/
- https://otx.alienvault.com
- https://otx.alienvault.com/api
- https://owasp.org/donate/?reponame=www-project-amass&title=OWASP+Amass
- https://owasp.org/www-community/attacks/Format_string_attack
- https://owasp.org/www-project-kubernetes-top-ten/
- https://packages.cgr.dev/chainguard/security.json
- https://packages.cisofy.com/
- https://packages.cisofy.com/community/#debian-ubuntu
- https://packages.wolfi.dev/os/security.json
- https://packetstormsecurity.com/files/112152/Cross-Site-Scripting-Payloads.html
- https://packetstormsecurity.com/files/24347/ssh1.crc32.txt.html
- https://packetstormsecurity.com/files/tags/exploit
- https://pae-consulta-publica.sistemas.pa.gov.br/
- https://pan.baidu.com/s/1q2N1w44bvYIXLe5gCI5oKA
- https://paper.seebug.org/
- https://passwordrecovery.io/
- https://payloads.net/Runtime.exec/
- https://paypal.me/cipheydevs
- https://paypal.me/elceef
- https://paypal.me/j3ssiejjj
- https://paypal.me/s0md3v
- https://paypal.me/screetsec
- https://paypal.me/sebres
- https://paypal.me/shadmansaleh
- https://paypal.me/timschneeberger
- https://paypal.me/viperbjk
- https://paypal.me/wimbledonfc
- https://pc.ac.gov.br/certidao-de-antecedentes-criminais/
- https://peiqi.wgpsec.org/
- https://pentest-ground.com/
- https://pentest-tools.com/
- https://pentest-tools.com/information-gathering/google-hacking
- https://pentest.mxhx.org/
- https://pentestbook.six2dez.com/
- https://pentesterlab.com/bootcamp
- https://pentestlab.blog/2012/11/19/abusing-file-upload/
- https://pentestlab.blog/2012/11/29/bypassing-file-upload-restrictions/
- https://people.canonical.com/~ubuntu-security/
- https://phishing.army/download/phishing_army_blocklist_extended.txt
- https://phishing.army/download/phishing_army_blocklist.txt
- https://phith0n.github.io/xray-poc-generation/
- https://phonebook.cz
- https://php.quicoto.com/setup-exim4-to-use-gmail-in-ubuntu/
- https://phpinfo.me/bing.php
- https://ping.chinaz.com/
- https://placafipe.com
- https://placaipva.com.br
- https://planefinder.net/airport/BSB
- https://play.google.com/store/apps/details?id=com.pocketsearchengine.app
- https://pmny.in/bIKNZngt4ys1
- https://poc.xray.cool/
- https://pocorexps.nsa.im/
- https://portal.antt.gov.br/linhas-de-onibus
- https://portal.cfm.org.br/busca-medicos/
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0796
- https://portal.trf1.jus.br
- https://portal.trf2.jus.br
- https://portal.trf5.jus.br
- https://portalbnmp.cnj.jus.br/#/pesquisa-peca#
- https://portaldatransparencia.gov.br/coronavirus
- https://portforward.com/router-password/
- https://portswigger.net/blog
- https://portswigger.net/blog/exploiting-xss-in-post-requests
- https://portswigger.net/burp/documentation/desktop/tools/proxy/using
- https://portswigger.net/daily-swig/thephish-the-most-complete-non-commercial-phishing-email-analysis-tool
- https://portswigger.net/kb/issues/00100100_os-command-injection
- https://portswigger.net/research/practical-web-cache-poisoning
- https://portswigger.net/web-security
- https://portswigger.net/web-security/cors
- https://portswigger.net/web-security/cross-site-scripting/dom-based
- https://portswigger.net/web-security/request-smuggling
- https://portswigger.net/web-security/ssrf
- https://portswigger.net/web-security/ssrf/url-validation-bypass-cheat-sheet
- https://ppn.snovvcrash.rocks/
- https://pre-commit.com/#install
- https://privacy.sexy/
- https://procweb.jfrj.jus.br/certidao/emissao_cert.asp
- https://program-think.blogspot.com/
- https://projudi.tjgo.jus.br/BuscaProcessoPublica?PaginaAtual=4
- https://pt.wikipedia.org/wiki/Discagem_direta_a_dist%C3%A2ncia
- https://pt.wikipedia.org/wiki/Lista_de_faixas_e_subfaixas_do_servi%C3%A7o_radioamador_no_Brasil
- https://publicdbhost.dmca.gripe/random/
- https://pwn.college/
- https://pwn.guide/
- https://pwnhub.cn/index
- https://pyn3rd.github.io/2022/06/06/Make-JDBC-Attacks-Brillian-Again-I/
- https://python-poetry.org/docs/
- https://pythonarsenal.com/
- https://pythoncyber.go.ro
- https://quake.360.cn/quake/
- https://queimadas.dgi.inpe.br/queimadas/bdqueimadas
- https://queimadas.dgi.inpe.br/queimadas/mapas-mensais/
- https://queimadas.dgi.inpe.br/queimadas/portal-static/situacao-atual/
- https://queimadas.dgi.inpe.br/queimadas/portal/videoaulas
- https://quequero.org/category/security/
- https://quipqiup.com/
- https://r12a.github.io/apps/encodings/
- https://radar24.net/ship-radar/
- https://radar24.net/train-radar/
- https://raintrees.net/projects/a-painter-and-a-black-cat/wiki
- https://rapidapi.com/
- https://rapiddns.io
- https://rapiddns.io/
- https://rastreamento.viacaoouroeprata.com.br/
- https://raw.githubusercontent.com/0xDanielLopez/TweetFeed/master/month.csv
- https://raw.githubusercontent.com/0xDanielLopez/TweetFeed/master/today.csv
- https://raw.githubusercontent.com/0xDanielLopez/TweetFeed/master/week.csv
- https://raw.githubusercontent.com/0xDanielLopez/TweetFeed/master/year.csv
- https://raw.githubusercontent.com/AliasIO/wappalyzer/master/src/technologies.json
- https://raw.githubusercontent.com/aptnotes/data/master/APTnotes.csv
- https://raw.githubusercontent.com/fox-it/cobaltstrike-extraneous-space/master/cobaltstrike-servers.csv
- https://raw.githubusercontent.com/GoSecure/dtd-finder/master/list/xxe_payloads.md
- https://raw.githubusercontent.com/ktsaou/blocklist-ipsets/master/firehol_level1.netset
- https://raw.githubusercontent.com/montysecurity/C2-Tracker/main/data/all.txt
- https://raw.githubusercontent.com/montysecurity/C2-Tracker/main/data/BurpSuite%20IPs.txt
- https://raw.githubusercontent.com/montysecurity/C2-Tracker/main/data/Deimos%20C2%20IPs.txt
- https://raw.githubusercontent.com/montysecurity/C2-Tracker/main/data/GoPhish%20IPs.txt
- https://raw.githubusercontent.com/montysecurity/C2-Tracker/main/data/Gotham%20Stealer%20IPs.txt
- https://raw.githubusercontent.com/montysecurity/C2-Tracker/main/data/Hachcat%20Cracking%20Tool%20IPs.txt
- https://raw.githubusercontent.com/montysecurity/C2-Tracker/main/data/Metasploit%20Framework%20C2%20IPs.txt
- https://raw.githubusercontent.com/montysecurity/C2-Tracker/main/data/Mythic%20C2%20IPs.txt
- https://raw.githubusercontent.com/montysecurity/C2-Tracker/main/data/NimPlant%20C2%20IPs.txt
- https://raw.githubusercontent.com/montysecurity/C2-Tracker/main/data/PANDA%20C2%20IPs.txt
- https://raw.githubusercontent.com/montysecurity/C2-Tracker/main/data/Posh%20C2%20IPs.txt
- https://raw.githubusercontent.com/montysecurity/C2-Tracker/main/data/PowerSploit%20IPs.txt
- https://raw.githubusercontent.com/montysecurity/C2-Tracker/main/data/XMRig%20Monero%20Cryptominer%20IPs.txt
- https://raw.githubusercontent.com/nvm-sh/nvm/v0.39.1/install.sh
- https://raw.githubusercontent.com/stamparm/ipsum/master/levels/1.txt
- https://raw.githubusercontent.com/stamparm/ipsum/master/levels/2.txt
- https://raw.githubusercontent.com/stamparm/ipsum/master/levels/3.txt
- https://raw.githubusercontent.com/stamparm/ipsum/master/levels/4.txt
- https://raw.githubusercontent.com/stamparm/ipsum/master/levels/5.txt
- https://raw.githubusercontent.com/stamparm/ipsum/master/levels/6.txt
- https://raw.githubusercontent.com/stamparm/ipsum/master/levels/7.txt
- https://raw.githubusercontent.com/stamparm/ipsum/master/levels/8.txt
- https://raw.githubusercontent.com/tsirolnik/spam-domains-list/master/spamdomains.txt
- https://raymii.org/s/tutorials/Strong_SSL_Security_On_nginx.html
- https://rdap.registro.br/domain/seu_dominio_exemplo.com.br
- https://rebrand.ly/SupportAUTOGPTfree
- https://receive-sms.cc/#google_vignette
- https://recon.cx/2019/montreal/
- https://redemet.decea.gov.br/#
- https://redemet.decea.gov.br/novo/
- https://redteam.guide/docs/definitions
- https://regex101.com/
- https://registro.br/dominio/lista-processo-liberacao.txt
- https://registro.br/tecnologia/ferramentas/pesquisa-de-usuario/
- https://registro.br/tecnologia/ferramentas/whois/
- https://reputation.alienvault.com/reputation.generic
- https://reshift.softwaresecured.com
- https://resources.infosecinstitute.com/file-upload-vulnerabilities/#gref
- https://respondendo.ibge.gov.br/verifique-a-identidade-do-entrevistador.html
- https://revanced.app/donate
- https://ricterz.me/
- https://rmusser.net/docs
- https://rmusser.net/docs/Wireless.html#cn
- https://robosec.org/downloads/wp-attacks-on-smart-manufacturing-systems.pdf
- https://robosec.org/downloads/wp-rogue-automation-vulnerable-and-malicious-code-in-industrial-programming.pdf
- https://rocketreach.co
- https://rootmy.tv
- https://rootsh.com/
- https://rules.emergingthreats.net/blockrules/compromised-ips.txt
- https://rupigcute.wixsite.com/quantiumtown/rssindex
- https://saferwall.com
- https://salttiger.com/archives/
- https://saoluis.ma.gov.br/secretarias
- https://saoluis.ma.gov.br/servicos
- https://search.censys.io/
- https://search.censys.io/account/api
- https://search.censys.io/register
- https://secdb.alpinelinux.org/
- https://secsi.io/blog/thephish-an-automated-phishing-email-analysis-tool/
- https://securecompliance.co/linux-server-hardening-checklist/
- https://security-tracker.debian.org/tracker/data/json
- https://security.stackexchange.com/questions/157061/how-does-csrf-correlate-with-same-origin-policy
- https://security.stackexchange.com/questions/29378/comparison-between-apparmor-and-selinux
- https://security.utexas.edu/os-hardening-checklist/linux-7
- https://securityinabox.org/en/
- https://securitytrails.com
- https://securityxploded.com/foxmail-password-decryptor.php
- https://seguranca.sinesp.gov.br/sinesp-seguranca/login.jsf
- https://seifried.org/lasg/
- https://selivan.github.io/2017/12/21/grub2-password-for-all-but-default-menu-entries.html
- https://sensepost.com/blog/2017/macro-less-code-exec-in-msword/
- https://sentinelone.com/blogs/anti-vm-tricks/
- https://serene-agnesi-57a014.netlify.app/
- https://serv42.limeira.sp.gov.br/procweb/cnsProcesso/
- https://serverfault.com/a/447604/289829
- https://serverfault.com/a/770424/289829
- https://serverfault.com/questions/660160/openssh-difference-between-internal-sftp-and-sftp-server/660325
- https://serverfault.com/questions/741299/is-there-a-way-to-keep-clamav-updated-on-debian-8
- https://serverfault.com/questions/818783/which-umask-is-more-secure-in-linux-022-or-027
- https://serverfault.com/questions/957302/securing-hardening-ntp-client-on-linux-servers-config-file/957450#957450
- https://services.nvd.nist.gov/rest/json/cves/2.0
- https://servicos.dnit.gov.br/dadosabertos/
- https://servicos.dpf.gov.br/antecedentes-criminais/certidao
- https://servicos.pc.sc.gov.br/antena/
- https://share.anva.org.cn/web/publicity/listPhishing
- https://shopee.com.br/
- https://sicg.iphan.gov.br/sicg/pesquisarBem
- https://siga.bombeiros.pa.gov.br/boletins.php
- https://sigef.incra.gov.br/
- https://sigterm.ch/
- https://silic.wiki/doku.php
- https://sistemas.anac.gov.br/aeronaves/cons_rab.asp
- https://sistemas.anac.gov.br/consultadelicencas/
- https://sistemas.anac.gov.br/nadaconsta/
- https://sistemas.anac.gov.br/voeseguro/
- https://sistemas.anatel.gov.br/easp/Novo/ConsultaIndicativo/Tela.asp
- https://sistemas.anatel.gov.br/stel/consultas/ListaEstacoesLocalidade/tela.asp?pNumServico=010
- https://sistemas.anatel.gov.br/stel/Consultas/RecuperacaoFrequencias/tela.asp?SISQSmodulo=9896
- https://sistemas.pc.sc.gov.br/formulario-antecedentes-cidadao/#/
- https://sistemas.procon.sp.gov.br/evitesite/list/evitesites.php
- https://sistemas.sptrans.com.br//licitlovnew/hilicwebfrt2rc_Ano.aspx
- https://sistemas.sptrans.com.br/DemPag/hdempag.aspx
- https://sistemas.sptrans.com.br/licitlovnew/hilicwebfrt2apn.aspx
- https://sistemas.sptrans.com.br/licitlovnew/hilicwebfrt2ca.aspx
- https://sistemas.sptrans.com.br/licitlovnew/hilicwebfrt2cr.aspx
- https://sistemas.sptrans.com.br/licitlovnew/hilicwebfrt2ec.aspx
- https://sistemas.sptrans.com.br/licitlovnew/hilicwebfrt2rc_Ano.aspx
- https://sistemas.sptrans.com.br/licitlovnew/hilicwebfrtap.aspx
- https://sistemas.sptrans.com.br/licitlovnew/hilicwebfrtarp.aspx
- https://sistemas.sptrans.com.br/licitlovnew/hilicwebfrtcp_tc.aspx
- https://sistemas.sptrans.com.br/licitlovnew/hilicwebfrtcp.aspx
- https://sistemas.sptrans.com.br/licitlovnew/hilicwebfrted.aspx
- https://sistemas.sptrans.com.br/PlanOperWeb/
- https://sistemas.tce.pi.gov.br/ImpedimentoAS/impedimentos/listapessoas.xhtml
- https://sistemas.trt3.jus.br/certidao/feitosTrabalhistas/aba1.emissao.htm
- https://site.bibipecas.com.br/home
- https://site.ip138.com/
- https://skills.bugbank.cn/
- https://sms-activate.io
- https://smscodeonline.com/
- https://snort.org/downloads/ip-block-list
- https://snyk.io/vuln/
- https://somd5.com/
- https://soundcloud.com/user-98066669/237-the-huge-osint-show
- https://sourceforge.net/projects/crunch-wordlist
- https://sourceforge.net/projects/logwatch/
- https://souyouxiang.com/find-contact/
- https://speakerdeck.com/search?utf8=%E2%9C%93&q=ctf
- https://sploitus.com/
- https://sponsor.owasp-juice.shop
- https://sponsors.github.red/
- https://sptrans.com.br/licitacoes/
- https://ssd-disclosure.com/ssd-advisory-php-spldoublylinkedlist-uaf-sandbox-escape/
- https://sslbl.abuse.ch/blacklist/ja3_fingerprints.csv
- https://sslbl.abuse.ch/blacklist/sslblacklist.csv
- https://sslbl.abuse.ch/blacklist/sslipblacklist_aggressive.csv
- https://sslbl.abuse.ch/blacklist/sslipblacklist_aggressive.txt
- https://sslbl.abuse.ch/blacklist/sslipblacklist.csv
- https://sslbl.abuse.ch/blacklist/sslipblacklist.txt
- https://staaldraad.github.io/post/2021-01-09-universal-rce-ruby-yaml-load-updated/
- https://stack.chaitin.com/vuldb/
- https://stackoverflow.com/questions/62174426/how-to-permanently-disable-windows-defender-real-time-protection-with-gpo
- https://start.me/p/rx6Qj8/nixintel-s-osint-resource-list
- https://stellastra.com/cipher-suite
- https://strcpy.me/
- https://stuxnet999.github.io/volatility/2020/07/04/Writing-Plugins-Volatility.html
- https://stuxnet999.github.io/volatility/2020/08/08/Writing-Plugins-Volatility-Part2.html
- https://subdomainfinder.c99.nl
- https://subdomains.whoisxmlapi.com/api/pricing
- https://subgraph.com/vega/
- https://subt0x11.blogspot.fr/2018/04/wmicexe-whitelisting-bypass-hacking.html
- https://superkieran.github.io/WooyunDrops/#!/
- https://support.huaweicloud.com/browsertg-obs/obs_03_1003.html
- https://t.me/cutter_re
- https://t.me/TGgeek/304
- https://tasklist.ffffffff0x.com/
- https://teamignition.us/how-to-stop-being-a-scrub-and-learn-to-use-selinux.html
- https://techblog.mediaservice.net/2016/10/exploiting-ognl-injection/
- https://telemetr.io/en/channels?language=pt&channel=SEU_ALVO&period=30
- https://testssl.sh/
- https://tex2e.github.io/reverse-shell-generator/index.html
- https://tf.nist.gov/tf-cgi/servers.cgi
- https://tgstat.com/search
- https://the-x.cn/
- https://thehackingsage.com/hackdroid/apps/app-store
- https://thehackingsage.com/hackdroid/apps/call-and-sms
- https://thehackingsage.com/hackdroid/apps/cryptocurrency
- https://thehackingsage.com/hackdroid/apps/cryptography
- https://thehackingsage.com/hackdroid/apps/dos
- https://thehackingsage.com/hackdroid/apps/forensics
- https://thehackingsage.com/hackdroid/apps/game-hacking
- https://thehackingsage.com/hackdroid/apps/hid-attack
- https://thehackingsage.com/hackdroid/apps/ide
- https://thehackingsage.com/hackdroid/apps/learning
- https://thehackingsage.com/hackdroid/apps/mitm
- https://thehackingsage.com/hackdroid/apps/nethunter
- https://thehackingsage.com/hackdroid/apps/networking
- https://thehackingsage.com/hackdroid/apps/osint
- https://thehackingsage.com/hackdroid/apps/pentesting
- https://thehackingsage.com/hackdroid/apps/privacy
- https://thehackingsage.com/hackdroid/apps/remote-access
- https://thehackingsage.com/hackdroid/apps/rf-rtl-sdr
- https://thehackingsage.com/hackdroid/apps/security
- https://thehackingsage.com/hackdroid/apps/sniffing
- https://thehackingsage.com/hackdroid/apps/spy-cam
- https://thehackingsage.com/hackdroid/apps/system-apps
- https://thehackingsage.com/hackdroid/apps/terminal
- https://thehackingsage.com/hackdroid/apps/web
- https://thehackingsage.com/hackdroid/apps/whatsapp
- https://thehackingsage.com/hackdroid/apps/wireless
- https://thehackingsage.com/hackdroid/platform/andrax
- https://thehackingsage.com/hackdroid/platform/nethunter
- https://thehackingsage.com/hackdroid/platform/pwnphone
- https://thelinuxcode.com/audit-lynis-ubuntu-server/
- https://threatfox.abuse.ch/downloads/hostfile/
- https://threatfox.abuse.ch/export/csv/md5/recent/
- https://threatfox.abuse.ch/export/csv/sha256/recent/
- https://threathunter.org/topic/594545184ea5b2f5516e2033
- https://threatview.io/Downloads/DOMAIN-High-Confidence-Feed.txt
- https://threatview.io/Downloads/Experimental-IOC-Tweets.txt
- https://threatview.io/Downloads/High-Confidence-CobaltStrike-C2%20-Feeds.txt
- https://threatview.io/Downloads/IP-High-Confidence-Feed.txt
- https://threatview.io/Downloads/MD5-HASH-ALL.txt
- https://threatview.io/Downloads/SHA-HASH-FEED.txt
- https://threatview.io/Downloads/URL-High-Confidence-Feed.txt
- https://ti.360.net/
- https://ti.dbappsecurity.com.cn/
- https://ti.qianxin.com/
- https://tinyxss.terjanq.me/
- https://tippin.me/@lukechilds
- https://tls.bufferover.run
- https://tomba.io
- https://tool.chinaz.com/tools/escape.aspx
- https://tools.emailhippo.com/
- https://tools.epieos.com/email.php
- https://tools.pediy.com/
- https://transfer.sh/
- https://transparencia.registrocivil.org.br/registros
- https://transparencia.saojosederibamar.ma.gov.br/
- https://transparencia.saoluis.ma.gov.br/
- https://travis-ci.org/goodwithtech/dockle-ci-test
- https://trends24.in/SEU_ALVO/
- https://tria.ge/signup
- https://try2hack.me/
- https://tryhackme.com/
- https://tweetfeed.live/
- https://twitter.com/ashutosha_
- https://twitter.com/DanielAzulay18/status/1304751830539395072
- https://twitter.com/ptswarm/status/1311310897592315905
- https://twitter.com/ptswarm/status/1323266632920256512
- https://twitter.com/s4n7h0
- https://twitter.com/samanl33t
- https://twitter.com/search?q=seu_alvo+lang%3Apt&src=typed_query
- https://twitter.com/XssPayloads
- https://twitter.com/zhzyker
- https://urbs.curitiba.pr.gov.br/horario-de-onibus
- https://urbs.curitiba.pr.gov.br/horario-de-onibus/rodoviaria
- https://urbs.curitiba.pr.gov.br/transporte/pontos-de-taxi
- https://urlabuse.com/public/data/data_csv.txt
- https://urlabuse.com/public/data/data.json
- https://urlabuse.com/public/data/data.txt
- https://urlabuse.com/public/data/dumps
- https://urlabuse.com/public/data/hacked_url.txt
- https://urlabuse.com/public/data/malware_url.txt
- https://urlabuse.com/public/data/phishing_url.txt
- https://urlabuse.com/public/files
- https://urlabuse.com/public/misp
- https://urlabuse.com/public/screenshot
- https://urlhaus.abuse.ch/api/#account
- https://urlhaus.abuse.ch/downloads/csv_recent/
- https://urlscan.io
- https://valoresareceber.bcb.gov.br/publico/
- https://valoresareceber.bcb.gov.br/publico/rest/valoresAReceber/00000000000/1960-12-01
- https://veiculos.fipe.org.br
- https://veiculosfipe.org/
- https://venacus.com
- https://viewdns.info/
- https://virus.exchange/
- https://vuldb.com
- https://vulhub.org/
- https://vulsee.com/tools/shiroDe/shiroDecrypt.html
- https://wasdk.github.io/WasmFiddle/
- https://weakdh.org/
- https://weakpass.com/generate
- https://weakpass.com/generate/domains
- https://web.archive.org/
- https://web.archive.org/web/*/https://findneo.github.io
- https://web.archive.org/web/20160625075226/http://www.wooyun.org:80/bugs
- https://web.archive.org/web/20160628084846/http://drops.wooyun.org:80/
- https://web.archive.org/web/20160628133257/http://www.wooyun.org:80/
- https://web3.antaq.gov.br/ea/sense/index.html#pt
- https://web3.antaq.gov.br/Portal/Frota/ConsultarEmpresaInteriorAutorizada.aspx
- https://webas.sefaz.pi.gov.br/
- https://webas.sefaz.pi.gov.br/caginweb/
- https://webas.sefaz.pi.gov.br/certidaonft-web/index.xhtml
- https://webas.sefaz.pi.gov.br/MEI-WEB/
- https://webassembly.studio/
- https://webhint.io/
- https://webshellchop.chaitin.cn/demo/
- https://werwolv.net/donate
- https://whatsapp.statusestories.com/
- https://whatsmyname.app/?q=john
- https://whereisk0shl.top/
- https://who.is/
- https://whois.aliyun.com/
- https://whois.chinaz.com/
- https://wiki.archlinux.org/index.php/AppArmor
- https://wiki.archlinux.org/index.php/Rng-tools
- https://wiki.archlinux.org/index.php/Security
- https://wiki.archlinux.org/index.php/security#Mandatory_access_control
- https://wiki.archlinux.org/index.php/SSH_Keys
- https://wiki.debian.org/ClamAV
- https://wiki.debian.org/Exim
- https://wiki.debian.org/GmailAndExim4
- https://wiki.debian.org/UnattendedUpgrades
- https://wiki.debian.org/UnattendedUpgrades#apt-listchanges
- https://wiki.porchetta.industries/smb-protocol/scan-for-vulnerabilities
- https://wiki.teamssix.com/
- https://wiki.teamssix.com/cf/
- https://wiki.wgpsec.org/
- https://wooyun.js.org/
- https://wooyun.shuimugan.com/
- https://wordlists.assetnote.io/
- https://wpvulndb.com/
- https://wq.apnic.net/
- https://wrongsecrets-ctf.herokuapp.com
- https://www.107000.com/
- https://www.2uo.de/myths-about-urandom
- https://www.7-zip.org/
- https://www.ac.getran.com.br/site/apps/veiculo/consulta/filtro-chassi-sng.jsp
- https://www.achados-e-perdidos-rs.com.br/
- https://www.aies.cn/pinyin.htm
- https://www.airbnb.com.br/
- https://www.al.ma.leg.br/sitealema/
- https://www.aldeid.com/wiki/PEiD
- https://www.alpertron.com.ar/ECM.HTM
- https://www.amazon.com/Hacking-Art-Exploitation-Jon-Erickson/dp/1593271441/
- https://www.andrewmohawk.com/cve_summary
- https://www.anquanquan.info/
- https://www.arcgis.com/home/webmap/viewer.html?url=https%3A%2F%2Farcgis.sema.df.gov.br%2Fserver%2Frest%2Fservices%2FAreas_Queimadas%2FMapServer&source=sd
- https://www.avast.com/ransomware-decryption-tools
- https://www.aware-online.com/en/osint-tools/instagram-search-tool/
- https://www.aware-online.com/en/osint-tools/instagram-tools/
- https://www.aware-online.com/en/osint-tools/reddit-search-tool/
- https://www.aware-online.com/en/osint-tools/youtube-search-tool/
- https://www.aware-online.com/osint-tools/
- https://www.badpenguin.org/configure-logwatch-for-weekly-email-and-html-output-format
- https://www.bedefended.com/papers/cors-security-guide
- https://www.beneficiossociais.caixa.gov.br/consulta/beneficio/04.01.00-00_00.asp
- https://www.binarydefense.com/banlist.txt
- https://www.blackhat.com/docs/us-17/thursday/us-17-Quarta-Breaking-The-Laws-Of-Robotics-Attacking-Industrial-Robots-wp.pdf
- https://www.blackhat.com/eu-19/briefings/schedule/index.html#unveiling-the-underground-world-of-anti-cheats-17359
- https://www.booking.com/index.pt-br.html
- https://www.botvrij.eu/data/blocklist/blocklist_domain.csv
- https://www.botvrij.eu/data/ioclist.md5
- https://www.botvrij.eu/data/ioclist.sha1
- https://www.botvrij.eu/data/ioclist.sha256
- https://www.branah.com/unicode-converter
- https://www.brimorlabs.com/tools/
- https://www.brisanet.com.br/mapa-de-area-de-cobertura
- https://www.broadcastify.com/listen/feed/41421
- https://www.brokenbrowser.com/abusing-of-protocols/
- https://www.brokenbrowser.com/bypass-the-patch-to-keep-spoofing-the-address-bar-with-the-malware-warning/
- https://www.brokenbrowser.com/css-history-leak/
- https://www.brokenbrowser.com/detecting-apps-mimetype-malware/
- https://www.brokenbrowser.com/detecting-local-files-to-evade-analysts/
- https://www.brokenbrowser.com/free-ticket-to-the-intranet-zone/
- https://www.brokenbrowser.com/loading-insecure-content-in-secure-pages/
- https://www.brokenbrowser.com/microsoft-edge-detecting-installed-extensions/
- https://www.brokenbrowser.com/referer-spoofing-defeating-xss-filter/
- https://www.brokenbrowser.com/revealing-the-content-of-the-address-bar-ie/
- https://www.brokenbrowser.com/sop-bypass-abusing-read-protocol/
- https://www.brokenbrowser.com/sop-bypass-uxss-tweeting-like-charles-darwin/
- https://www.brokenbrowser.com/uxss-edge-domainless-world/
- https://www.brokenbrowser.com/uxss-ie-domainless-world/
- https://www.brokenbrowser.com/uxss-ie-htmlfile/
- https://www.brokenbrowser.com/workers-sop-bypass-importscripts-and-basehref/
- https://www.brokenbrowser.com/zombie-alert/
- https://www.buscaonibus.com.br/
- https://www.buymeacoffee.com/beecodes
- https://www.buymeacoffee.com/Hardik05
- https://www.buymeacoffee.com/j3ssie
- https://www.buymeacoffee.com/kathanp19
- https://www.buymeacoffee.com/OdedShimon
- https://www.buymeacoffee.com/prabhatrahi
- https://www.buymeacoffee.com/R0X4R
- https://www.buymeacoffee.com/securefirmware
- https://www.buymeacoffee.com/swissky
- https://www.buymeacoffee.com/t3l3machus
- https://www.buymeacoffee.com/v1s1t0r
- https://www.byvoid.com/zhs/
- https://www.caema.ma.gov.br/
- https://www.caixa.gov.br/programas-sociais/Paginas/default.aspx
- https://www.car.gov.br/#/consultar
- https://www.car.gov.br/publico/imoveis/index
- https://www.carcheck.com.br/
- https://www.cert.org.cn/
- https://www.charset.org/punycode
- https://www.chromium.org/developers/dns-over-https
- https://www.ciop.pa.gov.br/aovivo/index.html
- https://www.cisa.gov/sites/default/files/csv/known_exploited_vulnerabilities.csv
- https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json
- https://www.citycameras.prefeitura.sp.gov.br/home
- https://www.clamav.net/documents/installation-on-debian-and-ubuntu-linux-distributions
- https://www.claro.com.br/mapa-de-cobertura
- https://www.cleancss.com/router-default/
- https://www.climaaovivo.com.br/ma/acailandia/acailandia
- https://www.climaaovivo.com.br/ma/imperatriz/centro-empresarial-leste
- https://www.climaaovivo.com.br/ma/imperatriz/centro-empresarial-oeste
- https://www.climaaovivo.com.br/ma/sao-luis-hotel-abbeville
- https://www.cloudflare.com/learning/ssl/how-does-ssl-work/
- https://www.cloudvulndb.org/
- https://www.cmd5.org/
- https://www.cnnvd.org.cn/
- https://www.computec.ch/projekte/vulscan/download/cve.csv
- https://www.computec.ch/projekte/vulscan/download/exploitdb.csv
- https://www.computec.ch/projekte/vulscan/download/openvas.csv
- https://www.computec.ch/projekte/vulscan/download/osvdb.csv
- https://www.computec.ch/projekte/vulscan/download/scipvuldb.csv
- https://www.computec.ch/projekte/vulscan/download/securityfocus.csv
- https://www.computec.ch/projekte/vulscan/download/securitytracker.csv
- https://www.computec.ch/projekte/vulscan/download/xforce.csv
- https://www.consultaaparelhoimpedido.com.br/public-web/welcome
- https://www.consultapelaplaca.com.br/
- https://www.consultarplaca.com.br/
- https://www.consultaserialaparelho.com.br/public-web/homeSiga
- https://www.coremaranhao.org.br/
- https://www.courts.act.gov.au/coming-to-court/lists
- https://www.courts.qld.gov.au/__external/CourtsLawList/ToowoombaCourt.pdf
- https://www.cptec.inpe.br/dsat/
- https://www.cracking.com.ar/demos/sop-ax-htmlfile/injectiframexdom.html
- https://www.creama.org.br/
- https://www.cressma.org.br/
- https://www.criminalip.io
- https://www.crmvma.org.br/
- https://www.croma.org.br/
- https://www.crowdsec.net/
- https://www.crowdstrike.com/resources/community-tools/crowdresponse/
- https://www.crt02.gov.br/maranhao/
- https://www.crypto101.io/
- https://www.ctftools.com/down/
- https://www.ctyun.cn/document/10000101/10006768
- https://www.ctyun.cn/document/10306929/10132519
- https://www.cveshield.com/
- https://www.cyberciti.biz/faq/apt-get-apticron-send-email-upgrades-available/
- https://www.cyberciti.biz/faq/debian-ubuntu-linux-software-integrity-checking-with-aide/
- https://www.cyberciti.biz/faq/howto-check-linux-rootkist-with-detectors-software/
- https://www.cyberciti.biz/faq/linux-hide-processes-from-other-users/
- https://www.cyberciti.biz/faq/linux-kernel-etcsysctl-conf-security-hardening/
- https://www.cyberciti.biz/faq/understanding-etcshadow-file/
- https://www.cyberciti.biz/tips/understanding-linux-unix-umask-value-usage.html
- https://www.cybrary.it/
- https://www.cynerio.com/jekyllbot-5-vulnerability-disclosure-report
- https://www.dailystar.co.uk/news/world-news/russias-new-robot-dog-war-27765427
- https://www.dan.me.uk/torlist/?exit
- https://www.darkrelay.com/courses/professional-penetration-tester
- https://www.defcon.org/html/links/dc-ctf.html
- https://www.desaparecidos.pr.gov.br/desaparecidos/
- https://www.detran.ac.gov.br/consultar-autorizacao-de-estampagem/
- https://www.detran.ac.gov.br/portal-de-servicos/consulta-pontuacao-de-cnh/
- https://www.detran.go.gov.br/psw/#/pages/conteudo/acompanhar-cnh-social
- https://www.detran.go.gov.br/psw/#/pages/conteudo/consulta-multas-renainf
- https://www.detran.go.gov.br/psw/#/pages/conteudo/consulta-processo/1
- https://www.detran.go.gov.br/psw/#/pages/conteudo/primeira-cnh
- https://www.detran.go.gov.br/psw/#/pages/conteudo/prontuario-cnh
- https://www.detran.ma.gov.br/inicio/paginas/Home.xhtml
- https://www.detran.pa.gov.br/servicos/pontuacao/index.php
- https://www.detran.pa.gov.br/sistransito/detran-web/servicos/veiculos/indexRenavam.jsf
- https://www.devglan.com/online-tools/jasypt-online-encryption-decryption
- https://www.diariooficial.ma.gov.br/
- https://www.digitalocean.com/community/tutorials/how-to-install-and-use-logwatch-log-analyzer-and-reporter-on-a-vps
- https://www.digitalocean.com/community/tutorials/understanding-the-ssh-encryption-and-connection-process
- https://www.disquedenuncia.org.br/desaparecidos-list
- https://www.ditecting.com/
- https://www.domainiq.com/reverse_whois
- https://www.ecosia.org/
- https://www.ecovias.com.br/boletim/camera/1
- https://www.ecovias.com.br/boletim/camera/10
- https://www.ecovias.com.br/boletim/camera/11
- https://www.ecovias.com.br/boletim/camera/12
- https://www.ecovias.com.br/boletim/camera/13
- https://www.ecovias.com.br/boletim/camera/14
- https://www.ecovias.com.br/boletim/camera/15
- https://www.ecovias.com.br/boletim/camera/16
- https://www.ecovias.com.br/boletim/camera/2
- https://www.ecovias.com.br/boletim/camera/4
- https://www.ecovias.com.br/boletim/camera/6
- https://www.ecovias.com.br/boletim/camera/7
- https://www.ecovias.com.br/boletim/camera/8
- https://www.ecovias.com.br/boletim/camera/9
- https://www.ecovias.com.br/condicoes-da-via#condition-camera
- https://www.edestinos.com.br/radar
- https://www.editthiscookie.com/
- https://www.eff.org/pages/cell-site-simulatorsimsi-catchers
- https://www.element14.com/community/servlet/JiveServlet/previewBody/41836-102-1-229511/ARM.Reference_Manual.pdf
- https://www.elo7.com.br/
- https://www.elttam.com/blog/ruby-deserialization/
- https://www.email-format.com/i/search/
- https://www.emsisoft.com/en/ransomware-decryption/
- https://www.endpoint.com/blog/2014/04/15/spf-dkim-and-dmarc-brief-explanation
- https://www.enjoei.com.br/
- https://www.escavador.com/
- https://www.estantevirtual.com.br/
- https://www.exim.org/exim-html-current/doc/html/spec_html/ch-encrypted_smtp_connections_using_tlsssl.html
- https://www.exploit-db.com
- https://www.exploit-db.com/
- https://www.exploit-db.com/exploits/21834
- https://www.exploit-db.com/exploits/25136
- https://www.exploit-db.com/exploits/8921
- https://www.exploit-db.com/google-hacking-database/
- https://www.fab.mil.br/voos
- https://www.facebook.com/ads/library/?active_status=all&ad_type=all&country=BR&media_type=all
- https://www.facebook.com/marketplace/?locale=pt_BR
- https://www.fail2ban.org/
- https://www.falecidosnobrasil.org.br/
- https://www.fastmail.com/help/technical/ssltlsstarttls.html
- https://www.fedcourt.gov.au/court-calendar/daily-court-lists
- https://www.feistyduck.com/library/openssl-cookbook/
- https://www.ferryscanner.com/pt/navios-de-ferry
- https://www.ficoupequeno.com/
- https://www.fiema.org.br/home
- https://www.fipeplaca.com.br/
- https://www.fipeveiculos.com.br
- https://www.flightradar24.com/-18.82,-52.19/5
- https://www.flixbus.com.br/track/
- https://www.fortinet.com/blog/threat-research/cve-2020-0796-memory-corruption-vulnerability-in-windows-10-smb-server.html#.Xndfn0lv150.twitter
- https://www.free-sms-receive.com/
- https://www.geeksforgeeks.org/difference-between-stateless-and-stateful-protocol/
- https://www.getmonero.org/get-started/contributing/
- https://www.gigamaisfibra.com.br/onde-estamos/
- https://www.gitbook.com/read/book/firmianay/ctf-all-in-one
- https://www.gnu.org/software/hurd/user/tlecarrour/rng-tools.html
- https://www.goiania.go.gov.br/sing_servicos/consulta-processos/
- https://www.goiania.go.gov.br/sing_servicos/emissao-duam-itu-iptu-issqn/
- https://www.goiania.go.gov.br/sing_servicos/matriculas-web/
- https://www.goiania.go.gov.br/sing_servicos/nota-fiscal-eletronica/
- https://www.google.com/maps/d/u/0/viewer?msa=0&mid=1Xh8EWBDY97vtLnEYuAVLvRGvu2o&ll=-16.816639560865948%2C-51.73607799999998&z=5
- https://www.google.com/search?q=site%3Aapp.powerbi.com%2Fview%3Fr+intext%3A%22brasil%22
- https://www.gov.br/compras/pt-br/painel-covid
- https://www.gov.br/dnit/pt-br/assuntos/aquaviario/atlas-aquaviario/
- https://www.gov.br/dnit/pt-br/assuntos/aquaviario/patrimonio
- https://www.gov.br/inep/pt-br/acesso-a-informacao/dados-abertos/microdados
- https://www.gov.br/pf/pt-br/acesso-a-informacao/dados-abertos/plano-de-dados-abertos-2024-2026
- https://www.gov.br/pf/pt-br/assuntos/produtos-quimicos
- https://www.gov.br/pf/pt-br/assuntos/seguranca-privada
- https://www.gptsecurity.info/
- https://www.gracefulsecurity.com/path-traversal-cheat-sheet-windows/
- https://www.grupopaquera.com.br/
- https://www.gruposexozap.com.br/
- https://www.gruposwats.com/
- https://www.guerrillamail.com/
- https://www.hacked.com.cn/pass.html
- https://www.hackerone.com/
- https://www.hackerone.com/blog-How-To-Server-Side-Request-Forgery-SSRF
- https://www.hackingarticles.in/
- https://www.hackingarticles.in/apache-log-poisoning-through-lfi/
- https://www.hackingarticles.in/rce-with-lfi-and-ssh-log-poisoning/
- https://www.hackthebox.com/
- https://www.hcourt.gov.au/registry/court-lists
- https://www.hiroom2.com/2017/06/09/debian-8-file-integrity-check-with-aide/
- https://www.historicar.com.br/
- https://www.host-tracker.com/
- https://www.howtoforge.com/community/threads/fail2ban-and-ufw-on-debian.77261/
- https://www.howtoforge.com/helping-the-random-number-generator-to-gain-enough-entropy-with-rng-tools-debian-lenny
- https://www.howtoforge.com/how-to-configure-the-aide-advanced-intrusion-detection-environment-file-integrity-scanner-for-your-website
- https://www.howtoforge.com/tutorial/configure-clamav-to-scan-and-notify-virus-and-malware/
- https://www.html5rocks.com/en/tutorials/internals/howbrowserswork/
- https://www.huoxian.cn
- https://www.hybrid-analysis.com/signup
- https://www.ib7.bradesco.com.br/ibpfdetranrj/debitoVeiculoRJConsultaLoader.do
- https://www.ib7.bradesco.com.br/ibpfdetranrj/debitoVeiculoRJDudaSelecionarProduto.do?cdProdutoInicial=INI
- https://www.ib7.bradesco.com.br/ibpfdetranrj/debitoVeiculoRJGrmConsultar.do
- https://www.ib7.bradesco.com.br/ibpfdetranrj/DebitoVeiculoRJGRTLoaderAction.do
- https://www.ib7.bradesco.com.br/ibpfdetranrj/debitoVeiculoRJLoader.do
- https://www.ibge.gov.br/acesso-informacao/institucional/documentos-ibge/1861-novo-portal/institucional/17422-servidores.html
- https://www.ibge.gov.br/cidades-e-estados/
- https://www.ibge.gov.br/estatisticas/downloads-estatisticas.html
- https://www.icrc.org/en/donate/ukraine
- https://www.imei.info/pt/
- https://www.immuniweb.com/darkweb/
- https://www.informecadastral.com.br/
- https://www.inguardians.com/
- https://www.instagram.com/explore/
- https://www.instagram.com/perito_daniel_avilla
- https://www.ipuu.net/
- https://www.ipvabr.com.br/placa
- https://www.iq.com.br/veiculos/consulta-placa/
- https://www.ired.team/
- https://www.it-ebooks.info/
- https://www.jarvisoj.com/
- https://www.java.com/pt-BR/
- https://www.jetbrains.com/zh-cn/decompiler/
- https://www.jiumodiary.com/
- https://www.jucesponline.sp.gov.br/Pre_Visualiza.aspx?nire={VALOR}&idproduto=
- https://www.jusbrasil.com.br/
- https://www.k8slanparty.com/
- https://www.kavak.com/br
- https://www.keplaca.com
- https://www.kwai.com/discover/
- https://www.lddgo.net/en/encrypt/rsa
- https://www.leavesongs.com/
- https://www.leavesongs.com/PENETRATION/use-tls-proxy-to-exploit-ldaps.html
- https://www.linkedin.com/in/rafael-c-ferreira
- https://www.linkedin.com/jobs/search/?keywords=SEU_ALVO&location=Brasil
- https://www.linkedin.com/pulse/20140812222156-79939846-xss-vectors-you-may-need-as-a-pen-tester
- https://www.linuxnix.com/umask-define-linuxunix/
- https://www.lisenet.com/2014/automate-clamav-to-perform-daily-system-scan-and-send-email-notifications-on-linux/
- https://www.ma.gov.br/contatos
- https://www.ma.gov.br/servicos/
- https://www.maketecheasier.com/permanently-disable-windows-defender-windows-10/
- https://www.manning.com/books/application-security-program-handbook
- https://www.manning.com/books/cyber-security-career-guide
- https://www.manning.com/books/cyber-threat-hunting
- https://www.manning.com/books/grokking-web-application-security
- https://www.manning.com/books/making-sense-of-cyber-security
- https://www.manning.com/books/real-world-cryptography
- https://www.manning.com/books/secret-key-cryptography
- https://www.marinetraffic.com/en/ais/home/centerx:-40.1/centery:-3.4/zoom:7
- https://www.mbi.com.br/mbi/biblioteca/utilidades/estado-onde-fica-ddd/
- https://www.mcafee.com/blogs/other-blogs/mcafee-labs/smbghost-analysis-of-cve-2020-0796/
- https://www.mercadolivre.com.br/
- https://www.mercante.transportes.gov.br/g36127/html/Manife/EmbarcConsul.html?noCampo=cdIrin
- https://www.microsoft.com/en-us/evalcenter/evaluate-windows-10-enterprise
- https://www.microsoft.com/en-us/security/blog/2021/03/23/secure-containerized-environments-with-updated-threat-matrix-for-kubernetes/
- https://www.microsoft.com/en-us/software-download/windows10ISO
- https://www.misp-project.org/feeds/
- https://www.modux.co.uk/post/serious-security-issues-uncovered-with-the-enabot-smart-robot
- https://www.mpma.mp.br/servicos/
- https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/
- https://www.netsparker.com/web-vulnerability-scanner/
- https://www.nirsoft.net/utils/credentials_file_view.html
- https://www.nirsoft.net/utils/wireless_key.html
- https://www.nomoreransom.org/zh/index.html
- https://www.nuget.org/packages/PeNet/
- https://www.nyclu.org/en/stingrays
- https://www.oabma.org.br/
- https://www.offensive-security.com/information-security-training/advanced-web-attack-and-exploitation/
- https://www.oi.com.br/portal-oi-cobertura/
- https://www.olhonocarro.com.br/
- https://www.ollydbg.de/
- https://www.olx.com.br/
- https://www.onesearch.com/
- https://www.onlinectf.com/challenges/
- https://www.onlinehashcrack.com/
- https://www.onlinehashcrack.com/tools-online-extract-vba-from-office-word-excel.php
- https://www.openbugbounty.org/reports/722726/
- https://www.oracle.com/database/technologies/instant-client/linux-x86-64-downloads.html
- https://www.osradar.com/install-clamav-debian-9-ubuntu-18/
- https://www.ossec.net/docs/
- https://www.owasp.org/
- https://www.owasp.org/index.php/Category:OWASP_DirBuster_Project
- https://www.owasp.org/index.php/Category:OWASP_Fuzzing_Code_Database
- https://www.owasp.org/index.php/Category:OWASP_WebScarab_Project
- https://www.owasp.org/index.php/Command_Injection
- https://www.owasp.org/index.php/DirBuster
- https://www.owasp.org/index.php/JBroFuzz
- https://www.owasp.org/index.php/OWASP_Xenotix_XSS_Exploit_Framework
- https://www.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013)
- https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet
- https://www.owasp.org/index.php/ZAP
- https://www.patreon.com/user?u=84705980
- https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=7ELM486P7XKKG
- https://www.paypal.com/donate/?hosted_button_id=RPL23NJURMTFA
- https://www.paypal.com/paypalme/iamshubhamkumar
- https://www.paypal.com/paypalme/r0x4r
- https://www.paypal.com/paypalme/six2dez
- https://www.paypal.me/edoardottt
- https://www.paypal.me/glormeau
- https://www.pc.rs.gov.br/desaparecidos
- https://www.pc.rs.gov.br/emitir-certidao-de-antecedentes-policiais
- https://www.pcdf.df.gov.br/servicos/desaparecidos
- https://www.pediy.com/kssd/
- https://www.pegueibode.com.br/
- https://www.pesquisaprotesto.com.br/
- https://www.pm.ce.gov.br/desaparecidos/
- https://www.pm.sc.gov.br/sos-desaparecidos/default/index?sort=-desaparecido_desaparecimento_data
- https://www.pnfsoftware.com/
- https://www.policiacientifica.sp.gov.br/iml/consultadesaparecidos
- https://www.policiacivil.se.gov.br/desaparecidos/
- https://www.policiacivil.sp.gov.br/portal/faces/pages_home/servicos/consultaSituacaoRG
- https://www.pool.ntp.org/en/
- https://www.portaldecompraspublicas.com.br/18/Processos/
- https://www.postman.com/explore/
- https://www.predictasearch.com
- https://www.prefeitura.sp.gov.br/cidade/secretarias/mobilidade/edital/index.php?p=247319
- https://www.prefeitura.sp.gov.br/cidade/secretarias/mobilidade/institucional/sptrans/acesso_a_informacao/index.php
- https://www.proxifier.com/
- https://www.publique-se.org.br/
- https://www.pugetsystems.com/labs/support-software/How-to-disable-Sleep-Mode-or-Hibernation-793/
- https://www.py2exe.org/
- https://www.qimai.cn/
- https://www.qualoperadora.net/
- https://www.qualoperadora.org/
- https://www.qualveiculo.net/
- https://www.qualys.com/enterprises/qualysguard/web-application-scanning/
- https://www.quintoandar.com.br/
- https://www.quora.com/How-is-it-possible-that-a-proxy-tool-like-Burp-Suite-is-able-to-decrypt-HTTPS-communication-like-plain-text-credentials
- https://www.qwant.com/
- https://www.radarbox.com/@-19.21547,-46.45469,z5
- https://www.radare.org/
- https://www.radioamador.com/vhf/repetidorasold.htm
- https://www.radiohaus.com.br/pagina.php?cod=22&nomodal
- https://www.rangeforce.com/
- https://www.rapid7.com/db/
- https://www.rapid7.com/products/nexpose/index.jsp
- https://www.reddit.com/r/linux/comments/arx7st/howtosecurealinuxserver_an_evolving_howto_guide/
- https://www.reddit.com/r/linux/comments/arx7st/howtosecurealinuxserver_an_evolving_howto_guide/egrib6o/
- https://www.reddit.com/r/linux/comments/arx7st/howtosecurealinuxserver_an_evolving_howto_guide/egs1rev/
- https://www.reddit.com/r/linuxadmin/comments/arx7xo/howtosecurealinuxserver_an_evolving_howto_guide/
- https://www.reddit.com/r/linuxquestions/comments/aopzl7/new_guide_created_by_me_how_to_secure_a_linux/
- https://www.reddit.com/r/selfhosted/comments/aoxd4l/new_guide_created_by_me_how_to_secure_a_linux/
- https://www.reddit.com/r/selfhosted/comments/aoxd4l/new_guide_created_by_me_how_to_secure_a_linux/eg4rkfi/
- https://www.reddit.com/r/sysadmin/comments/aph6ee/lets_talk_about_email_spoofing_and_prevention_alt/
- https://www.reddit.com/r/xss
- https://www.redecnpj.com.br/rede/
- https://www.redhat.com/security/data/oval/
- https://www.registrodeimoveis.org.br/cartorios
- https://www.repassa.com.br/
- https://www.researchgate.net/profile/Hartmut-Pohl/publication/263369999_Robot_Operating_System_ROS_Safe_Insecure/links/57fdf86108ae727563ffd5a6/Robot-Operating-System-ROS-Safe-Insecure.pdf
- https://www.reuters.com/world/us/us-senate-has-agreement-fisa-reauthorization-will-vote-friday-night-schumer-says-2024-04-20/
- https://www.robotics247.com/article/alias_robotics_claims_to_find_security_flaws_in_ros_2_open_robotics_responds
- https://www.rodoviasonline.com.br/cameras-ao-vivo-nas-rodovias-do-rio-grande-de-sul-daer-rs/
- https://www.rodoviasonline.com.br/cameras-ao-vivo-viapar-parana/
- https://www.rodoviasonline.com.br/rodovia-governador-ney-braga-br-277/
- https://www.root-me.org/
- https://www.routerpasswords.com/
- https://www.rsyslog.com/doc/v8-stable/configuration/actions.html
- https://www.sans.org/course/advanced-web-app-penetration-testing-ethical-hacking
- https://www.sans.org/course/web-app-penetration-testing-ethical-hacking
- https://www.saojosederibamar.ma.gov.br/detalhe-da-materia/info/diario-eletronico/148327
- https://www.saojosederibamar.ma.gov.br/detalhe-da-materia/info/secretarias/16510
- https://www.saojosederibamar.ma.gov.br/servicos
- https://www.scip.ch/en/?labs.20171214
- https://www.scotthyoung.com/blog/
- https://www.sec-wiki.com/
- https://www.secgeek.net/solutions-for-xss-waf-challenge/
- https://www.secologist.com/open-source-projects
- https://www.securityevaluators.com/casestudies/password-manager-hacking/
- https://www.securityfocus.com/bid/
- https://www.securitytracker.com
- https://www.seebug.org/
- https://www.sempf.net/post/Six-hundred-and-sixty-six-XSS-vectors-suitable-for-attacking-an-API.aspx
- https://www.sgb.gov.br/
- https://www.shentoushi.top/av/av.php
- https://www.shikari1337.com/list-of-xss-payloads-for-cross-site-scripting/
- https://www.shodan.io/
- https://www.shodan.io/search?query=country%3A%22BR%22
- https://www.situacao-cadastral.com/
- https://www.situacaocadastral.info/
- https://www.skymem.info
- https://www.slideshare.net/0ang3el/new-methods-for-exploiting-orm-injections-in-java-applications
- https://www.slideshare.net/slideshow/new-methods-for-exploiting-orm-injections-in-java-applications/62514298
- https://www.smartertools.com/blog/2019/04/09-understanding-spf-dkim-dmarc
- https://www.social-searcher.com/search-users/?q6=NOME+SOBRENOME
- https://www.socketloop.com/tutorials/golang-secure-tls-connection-between-server-and-client
- https://www.sojson.com/
- https://www.somd5.com/
- https://www.spamhaus.org/drop/drop_v4.json
- https://www.speedguide.net/ports.php
- https://www.spreadshirt.de/shop/user/emba+firmware+analyzer/#?affiliateId=1257693
- https://www.sptrans.com.br/terminais
- https://www.ssh.com/ssh/copy-id
- https://www.ssh.com/ssh/public-key-authentication
- https://www.ssh.com/ssh/sshd_config/
- https://www.ssleye.com/ssltool/
- https://www.ssllabs.com/ssltest/index.html
- https://www.ssp.ma.gov.br/disque-denuncia/desaparecidos/
- https://www.ssp.sc.gov.br/dtic/index.php/cameras/cameras-online
- https://www.ssp.sc.gov.br/dtic/index.php/cameras/cameras-online-biguacu
- https://www.ssp.sc.gov.br/dtic/index.php/cameras/cameras-online-florianopolis
- https://www.ssp.sc.gov.br/dtic/index.php/cameras/cameras-online-florianopolis-2
- https://www.ssp.sc.gov.br/dtic/index.php/cameras/cameras-online-florianopolis-trindade
- https://www.ssp.sc.gov.br/dtic/index.php/cameras/cameras-online-sao-jose
- https://www.ssp.sp.gov.br/consultabicicleta
- https://www.ssp.sp.gov.br/servicos/desaparecidos
- https://www.stephenrlang.com/2016/03/using-aide-for-file-integrity-monitoring-fim-on-ubuntu/
- https://www.stm.jus.br/servicos-stm/certidao-negativa/emitir-certidao-negativa
- https://www.subdomain.center/
- https://www.supercloudsms.com/en/
- https://www.synacktiv.com/posts/exploit/im-smbghost-daba-dee-daba-da.html
- https://www.t00ls.net/dnslog.html
- https://www.tabelafipe.website
- https://www.tabelafipebrasil.com
- https://www.tabelafipebrasil.com/placa
- https://www.tabelafipemotos.com.br
- https://www.tcm.go.gov.br/Reports/browse/
- https://www.techbrown.com/harden-ssh-secure-linux-vps-server/
- https://www.tecmint.com/check-integrity-of-file-and-directory-using-aide-in-linux/
- https://www.tecmint.com/find-open-ports-in-linux/
- https://www.tecmint.com/install-rootkit-hunter-scan-for-rootkits-backdoors-in-linux/
- https://www.teleco.com.br/erb.asp
- https://www.telegram-group.com/en/#
- https://www.telenumeros.com/
- https://www.tesourotransparente.gov.br/visualizacao/painel-de-monitoramentos-dos-gastos-com-covid-19
- https://www.thefanclub.co.za/how-to/how-install-psad-intrusion-detection-ubuntu-1204-lts-server
- https://www.thehacker.recipes/
- https://www.thehacker.recipes/ad/movement/credentials/dumping/group-policies-preferences
- https://www.thingiverse.com/thing:4748043
- https://www.tiktok.com/explore
- https://www.tim.com.br/para-voce/cobertura-e-roaming/mapa-de-cobertura
- https://www.tjba.jus.br/portal/busca-resultado/#
- https://www.tjgo.jus.br/index.php/processo-fisico/primeiro-grau
- https://www.tjma.jus.br/portal
- https://www.tldp.org/LDP/sag/html/index.html
- https://www.toolmao.com/baiduapp/routerpwd/
- https://www.transparencia.ma.gov.br/?_gl=1*1tcyjuy*_ga*NjA2MTcyNjc1LjE3MzkxMTU2NTQ.*_ga_43WSLQF7SQ*MTczOTExNTY1My4xLjEuMTczOTExNjE3My42MC4wLjA
- https://www.transparencia.sp.gov.br/home/servidor
- https://www.tre-ma.jus.br/institucional/servicos-disponiveis
- https://www.tripadvisor.com.br/
- https://www.trivago.com.br/
- https://www.trt16.jus.br/servicos/para-o-cidadao-e-advogado
- https://www.tse.jus.br/eleitor/certidoes/certidao-de-crimes-eleitorais
- https://www.tweetstats.com/graphs/PERFIL_ALVO
- https://www.unixmen.com/how-to-get-email-notifications-for-new-updates-on-debianubuntu/
- https://www.unixtimestamp.com/
- https://www.urbs.curitiba.pr.gov.br/mobile/boletim
- https://www.urbs.curitiba.pr.gov.br/mobile/cartao
- https://www.urbs.curitiba.pr.gov.br/mobile/itibus
- https://www.urbs.curitiba.pr.gov.br/mobile/itibus6
- https://www.urbs.curitiba.pr.gov.br/mobile/monitorRod
- https://www.urbs.curitiba.pr.gov.br/mobile/taxiLegal
- https://www.valortabelafipe.com.br
- https://www.vice.com/en_us/article/gv5k3x/heres-how-much-a-stingray-cell-phone-surveillance-tool-costs
- https://www.vice.com/en/article/akeexk/hacker-finds-kill-switch-for-submachine-gun-wielding-robot-dog
- https://www.virustotal.com
- https://www.virustotal.com/gui/join-us
- https://www.vrbo.com/pt-br/
- https://www.vulnmachines.com/
- https://www.vultr.com/docs/how-to-set-up-unattended-upgrades-on-debian-9-stretch
- https://www.vultr.com/docs/install-lynis-on-debian-8
- https://www.wappalyzer.com/
- https://www.webmotors.com.br/
- https://www.webpagetest.org/
- https://www.webshell.cc/4697.html
- https://www.wechall.net/
- https://www.whoxy.com/
- https://www.win-rar.com/download.html
- https://www.windows-commandline.com/enable-remote-desktop-command-line/
- https://www.windowscentral.com/how-stop-updates-installing-automatically-windows-10
- https://www.windy.com/pt/-Webcams/webcams?-16.994,-54.316,5
- https://www.wired.com/story/dcs-stingray-dhs-surveillance/
- https://www.wired.com/story/fbi-section-702-us-person-queries-email/
- https://www.xiaolanben.com/
- https://www.xploit.my.id/2021/07/crimeflare-bypass-tools-cloudflare.html
- https://www.yougetsignal.com/tools/web-sites-on-web-server/
- https://www.youtube.com/@avtv
- https://www.youtube.com/@GolfOscarRomeo
- https://www.youtube.com/@maaxcamaovivo
- https://www.youtube.com/@mundo_aviao
- https://www.youtube.com/@papacharliegolfTV
- https://www.youtube.com/@SBGRLIVE
- https://www.youtube.com/@ViracoposFullHD
- https://www.youtube.com/live/5ndIo1Kx8fk?si=RIKdix6wDkKVVLuj
- https://www.youtube.com/live/6G4Y3_pk18A?si=Rww8JkobPh9bqKkI
- https://www.youtube.com/live/EyYayEqmpkE?si=Cdd8QfP1IcXehNti
- https://www.youtube.com/live/NezodJcGyQ4?si=0piGWLhHz1Xbf9hT
- https://www.youtube.com/live/zQigjIIkBjQ?si=uanfwVUt33IqlWXt
- https://www.youtube.com/screetsec
- https://www.youtube.com/watch?v=1lNNYpSP8Dg
- https://www.zoomeye.org
- https://www.zusms.com/
- https://www2.bauru.sp.gov.br/desaparecidos/
- https://www2.dataprev.gov.br/sabiweb/relatorio/imprimirCRER.view?acao=imprimir_CRER
- https://www2.sercomtel.com.br/mapa-cobertura
- https://www8.receita.fazenda.gov.br/SimplesNacional/controleAcesso/Autentica.aspx?id=16
- https://x.threatbook.cn/
- https://x.threatbook.com/
- https://x64dbg.com/
- https://xss-game.appspot.com/
- https://xsschop.chaitin.cn/demo/
- https://xtea.io/ts_en.html#gsc.tab=0&gsc.q=SEU_ALVO
- https://xz.aliyun.com/
- https://xz.aliyun.com/t/5381
- https://yoomoney.ru/to/4100111364257544
- https://your-deploy-machine-ip/portainer
- https://your-server-ip/api
- https://your-server-ip/files
- https://your-server-ip/portainer
- https://your-webpanel-url/public/commands.php
- https://youtu.be/3WNStFaztfc?si=7QUu5SFZ-eONvGRt
- https://youtu.be/jqF89Xyv-YA?si=OknE6Oo6MLaZCVUj
- https://youtu.be/KuSmct1Qa30?si=-D2LbqtkfORdcgfQ
- https://youtube.com/playlist?list=PLVEFwJhglgHJQEQ6RjMMjcclix94gp1k2&feature=shared
- https://yun.cloudbility.com/
- https://yunduanxin.net/
- https://yunjing.ichunqiu.com/
- https://zh.rakko.tools/tools/21/
- https://zidansec.com/cloudpeler-crimeflare-next-generation/
- https2http:把https的代理变成http的代理
- https劫持理解
- httptunnel
- HTTPUploadExfil: 用于渗透数据/文件的简易 HTTP 服务器
- httpx
- HTTrack
- hu-xiaonan
- huangyz0918/androidwm
- Huawei AppGallery
- Huawei HG255 Directory Traversal[目录穿越]
- HuaYuReportRCE:华域数广Report组件GetShell
- Hub
- Hubble
- huberteff
- Hubii
- Huddle Diaries – DevOps and Data Platform
- huderlem
- Hudson River Trading - Fixing On-Call When Nobody Thinks It's (Too) Broken
- Hudson Rock
- hudsonrock-partnerships
- hue-hive-rce:使用 Hive 劫持 Hadoop 集群
- hugo-syn
- HugoPBrito
- hugsy
- hugsy/defcon_27_windbg_workshop
- Human
- Human Adversaries – Why Information Security Is Unlike Engineering
- Human Development Reports
- Human Hacking – Chris Hadnagy
- HumanEquivalentUnit
- Humanitarian Data Exchange
- humurabbi
- hunch.ly
- Hunchly
- Hundred Finance attack
- Hunner
- Hunt.io
- Hunter
- hunter.how
- Hunter.io
- Hunter.io API integration
- Hunter.io API integration
- HunterShenSmzh
- Hunter资产测绘
- Hunting APT RAT 9002 In Memory Using Volatility Plugin
- Hunting for Lateral Movement Using Windows Event Log
- Hunting for Skeleton Key Implants
- Hunting for threats with Intercept X and the Windows Event Collector
- Hunting for Web Shells
- Hunting in Active Directory: Unconstrained Delegation & Forests Trusts
- Hunting in the Dark - Blind XXE
- HunxByts
- Hướng dẫn sử dụng SchemaSpy
- hur
- hURL
- husnainfareed
- Hussnain Fareed
- hvcs:资产信息整理与脆弱性检测工具(类似与 kscan)
- HVMI
- hvprvtr
- HVVExploitApply:使用JAVAFX图形化界面检测对HVV中常见的重点CMS系统和OA系统的已公开的漏洞进行验证
- hwdsl2
- HxD
- hXOR-Packer
- hxp ctf 2021 - counter
- hxp ctf 2021 - includer's revenge
- hxrshxz
- Hybrid Analysis
- Hybrid OpenID Provider
- hyc
- hydra
- Hydragyrum
- Hyle33ies
- HynekPetrak/javascript-malware-collection
- HypeBears attack
- HyperDbgBot
- Hyperion
- Hyperion: Implementation of a PE-Crypter
- HyperL0gL0g
- Hyperlapse
- Hypersonic
- Hypertext Transfer Protocol Specification
- Hypervisor on Apple Silicon
- HypeStat
- hypn0chka
- hypn0s
- hysteria:恶劣网络环境下的双边加速工具
- Hyuga:一个用来监控带外(Out-of-Band)流量的工具
- hzqst
- hzqst/unicorn_pe
- I Accidentally Uncovered a Nationwide Scam on Airbnb
- I Am The Cavalry
- i-mihal
- I-See_You(Get Location using phishing attack)
- i-shivamsoni
- I’m harvesting credit card numbers and passwords from your site. Here’s how.
- I’m in your cloud: A year of hacking Azure AD
- i0nAy
- I2P
- i2p/i2p.i2p
- i5o
- iabadia/volatility-plugin-tutorial
- IACIS - BCFE: Basic Computer Forensic Examiner course
- iaincollins
- iaito
- Iaitō
- iam-py-test
- IamCarron
- IAMFinder
- iamstolen (UK)
- iamzewen
- Ian Harris - Understanding Social Engineering Attacks with Natural Language Processing
- ianjuma
- ianket
- IBAN calculator
- IBAN checker
- IBM - Why Automating Everything Adds to Your Toil
- IBM QRadar
- IBM X-Force Exchange
- iBoot Firebloom
- iBotPeaches
- ibotpeaches/apktool
- iBreaker
- iBSparkles Breaking Entitlements
- ICANN Whois
- Ice3man543
- iced
- IcedID aka #Bokbot Analysis with Ghidra.
- IcedID with Image used for Steganography
- icepa/icepa
- Icevision.xyz
- iCloud
- iCloud Keychain
- iCloud security and privacy overview
- icodesign/potatso
- ICOM - Red List
- Iconosquare
- Icons8
- ICP-Checker:备案查询,可查询企业或域名的ICP备案信息
- icp-domains:输入一个域名,输出ICP备案所有关联域名
- icpantsparti
- ICS 444 - Computer & Network Security
- icsharpcode/avaloniailspy
- icsharpcode/ilspy
- ICSREF
- icymind/vrouter
- icyphox
- id3s3c
- IDA 7.2 – The Mac Rundown
- IDA 7.4: IDAPython and Python 3
- IDA 7.4: Turning off IDA 6.x compatibility in IDAPython by default
- IDA and common Python issues
- IDA Free
- IDA Hexagon
- IDA on non-OS X/Retina Hi-DPI displays
- IDA Patcher
- IDA Pomidor
- IDA Pro
- IDA Pro Malware Analysis Tips
- Ida Pro Tutorial - Compare Reverse Engineering
- IDA Pro7.0使用技巧总结
- IDA series, part 1: the Hex-Rays decompiler
- IDA series, part 2: debugging a .NET executable
- IDA Sploiter
- IDA-minsc Wins Second Place in Hex-Rays Plugins Contest
- IDA-minsc在Hex-Rays插件大赛中获得第二名(1)
- IDA-minsc在Hex-Rays插件大赛中获得第二名(2)
- IDA7插件
- Idaemu
- IDAPython
- IDAPython Tutorial with example script
- IDAPython vs. r2pipe
- IDAPython:让你的生活更美好(一)
- IDAPython:让你的生活更美好(三)
- IDAPython:让你的生活更美好(二)
- IDAPython:让你的生活更美好(五)
- IDAPython:让你的生活更美好(四)
- idapython/src
- IDAPython实战项目——DES算法识别
- idarlingteam/idarling
- idawnlight
- iDazai
- IDA插件
- Idb
- idb - iOS App Security Assessment Tool
- idb2pat
- IDBot
- IDCrawl
- iddoeldor
- iddoeldor/frida-snippets
- IDEA
- Idealist
- idealphase
- Identifying malware packers through multilayer feature engineering in static analysis
- ideone
- IDiagnosticProfileUAC:另一个 bypass UAC 的工具
- IdiomaX Translation
- idl3r
- IDOR
- IDOR_detect_tool:一款API水平越权漏洞检测工具
- idp_heaxagon
- IDR
- IE11 Information disclosure - local file detection
- ievans
- If HttpOnly You Could Still CSRF… Of CORS you can!
- If you have been scammed…
- ifconfig.co
- ifeLawal
- iFly.com
- ifly53e
- IFN3T
- iftree:图形化展示容器网络结构
- iFunbox
- iggykrajci
- iGio90
- igio90/dwarf
- Ignorance .gdbinit
- igogo-x86/hexrayspytools
- igor-suhorukov
- IgorEisberg
- ihack4falafel
- ihamburglar
- ihebski
- ihoneyBakFileScan_Modify:批量网站备份文件泄露扫描工具
- iii-i
- iimarckus
- iineva/bom
- iiNT3LiiG3NCii
- IIS7以上突破无脚本执行权限限制
- iisproxy: 通过websocket在IIS8(Windows Server 2012)以上实现socks5代理(在无法反弹socks5,仅有webshell权限时,代理进入内网,类似于reGeorg)
- iisScaner:多线程批量检测IIS短文件名漏洞+漏洞利用
- IJCV Paper
- IJEMIN
- ikedam
- ikelos
- ikheetjeff
- ikkitaguchi
- ikp4success
- iksteen
- Il2CppDumper
- Ildasm
- ilesinge
- ILightThings
- ilkka
- IlluminateJs
- ilnytskyi
- ILO World Employment and Social Outlook Trends
- Ilo4_toolbox
- iLocate
- ILOSTAT
- ILoveOpenSourceApplications
- ILPlais
- ILSpy
- im-bug
- Image Brief
- Image by GraphiqaStock
- Image Identification Project
- Image Identifier
- Image prediction notebook
- Image Raider
- Image Search Options
- Image Steganography
- Image Steganography Online
- Image, document and binary file meta data analysis
- imagechan
- ImageMagick
- Imagemagick 邂逅 getimagesize 的那点事儿
- ImageMagick-CVE-2016-3714 命令执行分析
- ImageMagick漏洞凑热闹手札
- Images
- images.google.com
- ImaginaryC2
- Imago Forensics - Image Forensics Tutorial
- Imago-Forensics:Python实现的图像数字取证工具
- iMartzen
- imbillow
- imBTC Uniswap pool attack
- Imdb
- IMF
- IMF World Economic Outlook Database
- Img Flip
- img_ahash
- img_dhash
- img_exif
- img_load
- img_nudity
- img_phash
- imgbot
- ImgBotApp
- ImgOps
- imgtoon
- ImGui
- ImGuiColorTextEdit
- Imgur
- ImHex Plugin Template
- Immunefi Medium
- Immunity Debugger
- ImmuniWeb Mobile App Scanner
- Immutable Infrastructure and Continuous Delivery in the Cloud
- ImNodes
- imp0wd3r
- Impacket
- Impacket implementation of PrintNightmare
- impact of DoH on DNS rebinding attacks
- Impede Detection Platform
- Impersonal.me
- Impersonator
- impersonator.xyz
- Implementation of a monitoring strategy for products based on microservices
- Implementation Of A Secure Data Management System For The Secure Unix Operating System
- Implementing ChatOps into our Incident Management Procedure
- Implementing Distributed Consensus
- Implementing Observability in a Service Mesh
- Implementing Service Level Objectives
- Implementing your own generic unpacker
- Implications of Loading .NET Assemblies
- Implicit OpenID Provider
- ImPlot
- Import Genius (Cargo)
- Important Abstractions and Data Structures
- ImpREC
- Improved Port Knocking with Strong Authentication
- Improving Bash Forensics Capabilities
- Improving efficiency and reducing runtime using S3 read optimization
- Improving how we deploy GitHub
- Improving large monorepo performance on GitHub
- Improving malware detection using multi-view ensemble learning
- Improving Meta’s SLO workflows with data annotations
- Improving open source security during the Google summer internship program
- Improving OSS-Fuzz and Jazzer to catch Log4Shell
- Improving the Deployment Experience of a Ten-Year Old Application
- IMPROVING THE DEVELOPER EXPERIENCE FOR OPERATING SERVICES
- Improving Vrbo Homepage Loading Experience
- ImpulseAdventure
- ImpulsiveDLLHijack:用 c#编写的工具来查找 dll劫持
- ImranR98
- imthenachoman
- imTranslator
- ImuSpirit
- In Plain Sight:1
- In search of performance - how we shaved 200ms off every POST request
- In search of speed — debugging Elasticsearch performance
- In-Memory Data Management (2013)Prof. Hasso Plattner - HPI
- In-toto ITE6
- IN1503 - Advanced C++ Programming, TUM
- IN2124: Basic Mathematical Tools for Imaging and Visualization - TUM - Winter 2021
- IN2377 - Concepts of C++ programming (Winter 2023), TUM
- inbarbarkai
- InBoundio Marketing
- Inc. 5000
- Inca
- Inception
- Incident Analysis and Digital Forensics Summit 2018, 14th of November of 2018
- Incident Handling Automation Project
- Incident Management at Netflix Velocity
- Incident Metrics in SRE
- Incident Postmortem Template
- Incident Report: Inadvertent Private Repository Disclosure
- Incident Response
- Incident Response & Computer Forensics, Third Edition
- Incident response and threat hunting using hayabusa tool
- Incident Response at Heroku
- Incident Response Forensic Framework: nightHawk Response
- Incident Response Techniques for Ransomware Attacks
- Incident Response with Threat Intelligence
- Incident Review and Postmortem Best Practices
- Incident review: API and Dashboard outage on 10 October 2017
- Incident review: Service outage on 25 October 2020, Vault TLS expiry
- IncidentResponse Challenge
- Incidents
- Incidents, fixes, and the day after
- InCloud:运行于GitHub Actions 的仓库中自动化、自定义和执行软件开发工作流程,定制好十种针对网段和域名的不同场景的信息收集与漏洞扫描流程
- Inclusiveness:1
- Incognito Toolkit: Tools, Apps, and Creative Methods for Remaining Anonymous
- incognitojam
- Incolumitas.com
- Increasing developer happiness with GitHub code scanning
- Incremental clustering of malware packers using features based on transformed CFG
- Incremental Control Dependency Frontier Exploration for Many-Criteria Test Case Generation
- Indeed
- Indeed Australia
- Indeed SRE: An Inside Look
- Independent releases
- Index Mundi
- index.js
- India Typing
- Indicators of Compromise (IOCs)
- indonesian-wordlist
- indragiek/inappviewdebugger
- Inducing DNS Leaks in Onion Web Services
- inductor
- Industrial Robotics and Automation - IIT (ISM) Dhanbad
- INE
- Inf1 - Computation and Logic 2015 - University of Edinburgh
- inf3cti0n95
- Infect.cpp
- Infect.lnk
- Infecting the plt/got
- Infection Monkey
- Infer – A Static Analysis tool for Java, C, C++ and Objective-C
- inferno-chromium
- infinitewarp
- infinityhacked
- infinityhacker
- Infisical Agent
- Infisical API
- Infisical CLI
- Infisical Kubernetes Operator
- Infisical PKI Issuer for Kubernetes
- Infisical SDK
- Influence: The Psychology of Persuasion Paperback – Robert B., PhD Cialdini
- influxdata/kapacitor
- info
- Info 290 - Analyzing Big Data with Twitter, UC Berkeley school of information
- Info.com
- info.yewbow.org
- Infobel
- InfoCon - Hacking Conference Archive
- Infoga - Email OSINT
- Infoga.io
- Infogr.am
- InfoMinder
- inforion/idapython-cheatsheet
- Informatics 1 - Cognitive Science 2015/16- University of Edinburgh
- Informatics 1 - Data & Analysis 2014/15- University of Edinburgh
- Informatics 1 - Object-Oriented Programming 2014/15- University of Edinburgh
- Informatics 2A - Processing Formal and Natural Languages 2016-17 - University of Edinburgh
- INFORMATICS 2C - INTRODUCTION TO COMPUTER SYSTEMS (AUTUMN 2016) - University of Edinburgh
- Informatics 2D - Reasoning and Agents 2014/15- University of Edinburgh
- Information Gathering
- Information on the Capital One Cyber Incident
- Information Retrieval - Spring 2018 - ETH Zurich
- Information Retrieval - WS 2022/23 - Universität Freiburg
- Information Retrieval and Web Search Engines - Technische Universität Braunschweig, Germany
- Information Retrieval in High Dimensional Data
- Information Retrieval SS 2014, iTunes - HPI
- Information Security - II - IIT Madras
- Information Security: An Elusive Goal
- Information theoretic method for classification of packed and encoded files
- Information Theory - IISC Bangalore
- Information Theory and Coding - IIT Bombay
- Information Theory, Pattern Recognition, and Neural Networks - University of Cambridge
- Information_Security_Books:信息安全方面的书籍书籍
- Informer
- Infosec
- Infosec Newbie
- infosec reference
- InfoSecLab at Georgia Tech
- infoslack
- Infosniper
- Infospace
- InfoTracer
- InfoTrail
- Infrastructure and the Command Chain Pattern
- Infrastructure as a Code - Chapter 8: Patterns for Updating and Changing Servers
- Infrastructure as code: Create and configure infrastructure elements in seconds
- Infrastructure monitoring with Prometheus at Zerodha
- Infrastructure Observability for Changing the Spend Curve
- Infringement Report
- ingress-nginx
- Initial Structured Specifications for an Uncompromisable Computer Security System
- initstring
- InjectDllTool:多功能DLL注入工具:远程线程注入、消息钩子注入、输入法注入、APC注入、EIP注入、注册表注入
- Injecting Failure at Netflix
- injection-stuff:各种注入 PE 注入、DLL 注入、进程注入、线程注入、代码注入、shellcode 注入、ELF 注入、Dylib注入相关400+工具和350+文章的收集仓库
- injection:Windows 线程注入方法
- InjectJDBC:注入JVM进程 动态获取目标进程连接的数据库
- Injector Pca
- Inkscape
- Inline Bookmarks
- InlineWhispers2:Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2
- Inmate Locator
- Inmate Search
- InmateAid
- InMobPrefix
- Inndy
- Innocentive
- Innovative Computing - Harvard University
- Inodes - an Introduction
- inp2/sherlock
- InQL GraphQL Scanner Demo
- InQuest Labs Samples by Heuristic Match
- Insanity:1
- inscope
- Insecam
- Insecam.org
- InsecInstitute Resources
- Insecure Connection Bootstrapping in Cellular Networks: The Root of All Evil
- Insecure Direct Object References (IDOR)
- Insecure-deserialization-net-poc
- InsecureBank
- Inshorts
- Inside a CODE RED: Network Edition
- Inside GitLab: How we release software patches
- Inside Radio: An Attack and Defense Guide
- Insider CLI
- Insight VM
- Insights into a Product SRE team at LinkedIn
- Insomni’hack
- insomniteaser_2019_l33t_hoster
- insomniteaser_2019_phuck2
- InSp3ctor
- Inspeckage
- Inspiration
- Inspire Geoportal
- Instagram
- Instagram Attack
- Instagram Forensics -Windows App Store | By Justin Boncaldo
- Instagram Search Engine
- instagramCracker
- Install
- Install dependencies
- Install from here
- Install manually
- install.gif
- install.gif
- Installation
- Installation & Usage
- installation guide
- installer.ps1
- Installing
- Installing and using iOS Forensic Toolkit on macOS 10.15 Catalina
- Installing Cilium
- Installing Damn Vulnerable Web Application (DVWA) on Windows 10
- Installing DVWA on Kali running in VirtualBox
- Installing DVWA on Windows using XAMPP
- Installing SchemaSpy to document you database
- Installing the default modules
- Installing the Kubescape CLI
- Instant Google Street View
- Instant Username Search
- InstantAtlas
- instantbox/instantbox
- InstantLogoSearch
- InsTrim
- instructions
- Instructions for AdblockPlus
- Instructions for Control D
- Instructions for dnscrypt-proxy
- Instructions for dnsmasq
- Instructions for dnsmasq (old: pre v2.80)
- Instructions for unbound
- instructions in the whonix/monero-gui repository
- Instructions-based detection of sophisticated obfuscation and packing
- Instya
- Insurance Data Security Model Law
- Integrating Multimodal Radiation Therapy Data into i2b2
- Integrity Considerations For Secure Computer Systems
- Intel 64 and IA-32 Architectures Software Developer's Manual
- intel/haxm
- intel/linux-sgx
- Intelbras Wireless N 150Mbps WRN240 - Authentication Bypass (Config Upload-未经验证即可替换固件)
- Intelius
- Intelius Phone Lookup
- intelliearth
- Intelligence Gathering on U.S. Critical Infrastructure - Industrial Control Systems (ICS) Cyber Security Conference
- Intelligence X
- Intelligence-Driven Incident Response
- IntelligenceX
- Intelligent Automation Platform: Empowering Conversational AI and Beyond at Airbnb
- IntelliTamper
- IntelMQ
- IntelMQ Developers mailing list
- IntelOwl
- IntelTechniques
- intelx.io
- Interactive tutorial
- Interactsh
- interactsh:用于带外数据提取的开源解决方案,一种用于检测导致外部交互的错误的工具,例如:Blind SQLi,Blind CMDi,SSRF等
- Interception of Android implicit intents
- Interested in becoming a Site Reliability Engineer?
- Interesting list of doxxed EVM wallets
- Interesting Macro Obfuscation
- Interesting Things & Useful Information
- Interference API Docs
- Interlace
- Interlock
- Intermediate Intel x86: Architecture, Assembly, Applications, & Alliteration
- Intermediate x86 (32 bit) - Open SecurityTraining
- Interment
- Internal Tools
- Internal transactions
- Internal Web apps
- Internal-Monologue-通过 SSPI 调⽤ NTLM 身份验证,通过协商使⽤预定义 challenge 降级为 NetNTLMv1,获取到 NetNTLMv1 hash
- InternalAllTheThings
- International Energy Agency Statistics
- International Labour Comparisons
- International Trade Center
- International White and Yellow Pages
- Internet Advanced Denial of Service (DDOS) Attack
- Internet Archive: Open Source Videos
- Internet Control Message Protocol ( rfc792 )
- Internet Experts
- Internet Geolocation - Wiki
- Internet Marketing Ninjas
- Internet of Things by Prof. Dr.-Ing. Dietmar P. F. Möller
- Internet of Things Scanner
- Internet Security - Weaknesses and Targets (WT 2015/16)
- Internet Security (WT 2018/19) - HPI University of Potsdam
- Internet Security for Beginners by Dr. Christoph Meinel - HPI
- Internet Security Technology and Hacking
- Internet Storm Center
- Internet Technologies and Applications 2012, Steven Gordon - Thammasat University, Thailand
- Internet Technology - IIT Kharagpur
- Internet-Wide Scan Data Repository
- InternetDB API
- Internetworking with TCP/IP by Prof. Dr. Christoph Meinel - HPI
- INTERPOL Hardware Wallets List
- interprobe
- Interrupts and Interrupt Handlers
- Intersect-2.5
- interview_internal_reference
- intezer/linux-explorer
- inther
- InTheWild.io
- Intigriti
- Intigriti | Hacker tools: Amass – Hunting for Subdomains
- Intigriti Blog
- Intigriti Bug Bytes #120
- Into the Borg – SSRF inside Google production network
- intoDNS
- intrace
- Intranet_Penetration_Tips-内网渗透TIPS
- Intrepid Control Systems
- Intrepid Tools
- Intrigue Core
- Intriguing properties of adversarial ML attacks in the problem space
- Intriguing properties of neural networks
- Intro to Deep Learning and Generative Models Course - Prof Sebastian Raschka
- Intro to Digital Forensics [Part 2 - Methodology and Process Models]
- Intro to DMARC, DKIM, and SPF (via Cloudflare)
- Intro to fault trees
- Intro to Hayabusa
- Intro to Machine Learning and Statistical Pattern Classification - Prof Sebastian Raschka
- Intro to Malware Analysis and Reverse Engineering
- Intro to Quantum Computing - Nathan Wiebe
- Intro to Security
- Intro to Systems Theoretic Process Analysis (STPA)
- Intro x86 (32 bit) - Open SecurityTraining
- Intro. to CTF Course
- introduce
- Introducing Atlas: Netflix’s Primary Telemetry Platform
- Introducing Dispatch
- Introducing Exploit Observer — More than Shodan Exploits, Less than Vulners
- Introducing Exploit Observer — More than Shodan Exploits, Less than Vulners
- Introducing Skynet: Infrastructure as Code for Gojek
- Introducing the GitHub Availability Report
- Introducing the IDA Plugin for VMRay Analyzer
- Introducing the Robot Security Framework
- Introducing Veneur: high performance and global aggregation for Datadog
- Introducing x64dbg and Pizzacrypts Ransomware Unpacking
- Introduction blog post
- Introduction to Active Directory
- Introduction to Algorithms (Spring 2020), MIT OCW
- Introduction to ARM
- Introduction to ARM - Open SecurityTraining
- Introduction to Bioinformatics, METUOpenCourseWare
- Introduction to Bitcoin Investigation by Beatriz Silveira
- Introduction to Buffer Overflow Video
- Introduction to Capture the Flags
- Introduction to Cellular Security
- Introduction to Complex Networks - RIT
- Introduction to Computational Thinking - MIT
- Introduction to Computer Graphics - IIT Delhi
- Introduction to Computing Fundamentals
- Introduction to Cryptography, Christof Paar - Ruhr University Bochum, Germany
- Introduction to Cryptology - IIT Roorkee
- Introduction to Data Communications 2013, Steven Gordon - Thammasat University, Thailand
- Introduction to Data-Centric AI - MIT
- Introduction to DFIR
- Introduction to Docker Hacking
- Introduction to Game Theory and Mechanism Design - IIT Kanpur
- Introduction to Geographic Information Systems - IIT Roorkee
- Introduction to GIS Programming (Fall 2024) - Open Geospatial Solutions
- Introduction to IDAPython for Vulnerability Hunting - Part 2
- Introduction to Image Processing - RPI
- Introduction to Image Processing & Computer Vision - CBCSL OSU
- Introduction to Information Security I - IIT Madras
- Introduction to Large Language Models (LLMs), IIT Delhi
- Introduction to Machine Learning - IIT Kharagpur
- Introduction to Machine Learning - IIT Madras
- Introduction to Machine Learning - Spring 2018 - ETH Zurich
- Introduction to Machine Learning and Pattern Recognition - CBCSL OSU
- Introduction to Machine Learning for Coders
- Introduction to Machine Vision
- INTRODUCTION TO MATRIX ALGEBRA
- Introduction to Mechatronic and Robotics - IIT Bombay
- Introduction to Memory Forensics
- Introduction to Memory Forensics with Volatility 3
- Introduction to Mobile Robotics - SS 2019 - Universität Freiburg
- Introduction to Mobile Robots and Robot Operating System (ROS), HSE 2021
- Introduction to Modern Application Development - IIT Madras
- Introduction to Network Forensics
- Introduction to Neural Computation - MIT OCW
- Introduction to OAuth 2.0 and OpenID Connect
- Introduction to Operating Systems - IIT Madras
- Introduction to physical security
- Introduction to Problem Solving and Programming - IIT Kanpur
- Introduction to programming in C - IIT Kanpur
- Introduction to Quantum Computing and Quantum Hardware - Qiskit
- Introduction to quantum computing course 2022 - NYU
- Introduction to Quantum Computing From a Layperson to a Programmer in 30 Steps (EE225 SJSU)
- Introduction to Quantum Information
- Introduction to Redline
- Introduction to Redline (Update)
- Introduction to reinforcement learning - UCL
- Introduction to Reverse Engineering Software
- Introduction to Robotics @ Princeton
- Introduction to Robotics Course - UNCC
- Introduction to Secure Coding
- Introduction to Security
- Introduction to Service Design and Engineering - University of Trento, Italy
- Introduction to Spatial Data Science, Autumn 2016, University of Chicago
- Introduction to the Binary Ninja API
- Introduction to the ELF Format (Part V) : Understanding C start up .init_array and .fini_array sections
- Introduction to the ELF Format (Part VI) : More Relocation tricks - r_addend execution (Part 3)
- Introduction to the ELF Format (Part VI) : The Symbol Table and Relocations (Part 1)
- Introduction to The ELF Format (Part VI): The Symbol Table and Relocations (Part 2)
- Introduction to the ELF Format (Part VII): Dynamic Linking / Loading and the .dynamic section
- Introduction to Trusted Computing
- Introduction To Unix Signals Programming
- Introduction to Vulnerability Assessment
- Introduction to Web Application Security
- Introduction to Windbg Series 1 Part 23 - Time travellers tracing ( IDNA )
- Introductory Intel x86-64: Architecture, Assembly, Applications, & Alliteration
- Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration
- Introspy-iOS
- Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network, 2016
- intSheep
- intval
- Inv-Link Creator Finder
- Inv3nt0r1
- Inveigh
- Investigating 3 Ethereum Addresses Using The Nansen Wallet Profiler
- Investigating Cryptocurrency Theft Through OSINT
- Investigating Malware Using Memory Forensics - A Practical Approach
- Investigation Mind-Map
- Investigation of AML Instances Around Blockchain Technology
- Investigation Tools & Guides
- Investigations by ZachXBT
- invidio
- invitation link
- Invoke-ACLPwn
- Invoke-Bof:Load any Beacon Object File using Powershell
- Invoke-CleverSpray
- invoke-ir/forensicposters
- invoke-ir/powerforensics
- Invoke-PrintDemon:利用打印机漏洞通过 PowerShell 脚本将任意文件编码成base64后解码写入任意目录,比如system 目录
- Invoke-PSImage:PowerShell 脚本编码存进 PNG 图片中,并生成执行命令
- Invoke-ZeroLogon
- inVtero.net
- IO
- IOActive
- IOActive's Tools and Data
- IOAyman
- IOC Threat Hunt Feeds
- Iodine
- iogi
- IOKit Fundamentals
- iomoath/SharpSpray:Active Directory密码喷洒工具。自动获取用户列表并避免潜在的锁定
- Ion-storm's updated fork of the Swift On Security's sysmon config file
- ionelmc/python-manhole
- ionescu007
- ionescu007/simpleator
- ionescu007/simplevisor
- ios
- iOS - Official Tutorial
- iOS 10 Kernel Heap Revisited
- iOS 11 中的新安全措施及其Forensic Implications
- iOS 12 Jailbreak
- iOS 12 Rootless Jailbreak
- iOS 13 (Beta) Forensics
- iOS 15.0.1 RCE PoC
- iOS App Security, Penetration Testing, and Development
- iOS Application Injection
- IOS Application security – Setting up a mobile pentesting platform
- iOS Continuous Deployment with Bitbucket, Jenkins and Fastlane at UpGrad
- iOS Course, Dave Fisher
- iOS Forensic Toolkit 4.0 with Physical Keychain Extraction
- iOS Forensics Training in Vienna: 17-19 Oct 2018
- iOS forensics trick: pull databases w/o full backup
- iOS Frequent Locations Dumper
- IOS Hacker's Handbook
- iOS Internals vol 2
- iOS Penetration Testing
- iOS Programming Cookbook
- iOS Security
- iOS Security Suite - an advanced and easy-to-use platform security & anti-tampering library
- IOS_Application_Security_Testing_Cheat_Sheet
- iOS-Attack-Defense
- ios-control/ios-deploy
- ios-gamed-0day
- ios-nehelper-enum-apps-0day
- ios-nehelper-wifi-info-0day
- iOS-Security-Guides
- iOS, The Future Of macOS, Freedom, Security And Privacy In An Increasingly Hostile Global Environment
- iOSbackup
- iossefy
- IOST 假充值手法-未公开
- iOS取证技巧:在无损的情况下完整导出SQLite数据库
- iOS越狱和物理取证指南
- IoT devices captures
- IoT Summer School
- IOT_Vul:IOT相关漏洞收集
- IOT_vuln:IOT相关漏洞仓库
- IoT-CTF-2021:2021 西湖论剑 IoT-CTF 赛题仓库
- IoT-vulhub-IoT 固件漏洞复现环境
- iot: DIR-816 823g系列路由器的漏洞利用
- IoT安全教程系列
- iovisor/ply
- IP 2 Geolocation
- IP 2 Location
- Ip Address and Domain Information
- IP Addresses - Wiki
- IP Australia Search
- IP Calculator
- IP Checking
- IP DB
- IP Geolocation
- IP Geolocation API DB-IP
- IP Info
- IP Location
- IP Locator
- IP Quality Score
- ip-api
- IP-FY
- IP/IP段资产扫描-->扫描开放端口识别运行服务部署网站-->自动化整理扫描结果-->输出可视化报表+整理结果
- ip8
- ipaddress
- IpAddrs
- ipapi
- IPC Protocol
- IPC Voucher UaF Remote Jailbreak Stage 2
- IPC Voucher UaF Remote Jailbreak Stage 2 (EN)
- ipcdn:检查 IP 列表属于哪些 CDN 提供商
- IPData.co
- IPED - Indexador e Processador de Evidências Digitais
- IPFingerprints
- IPFS Inter Planetary File System Dapp University
- IPGeoLocation
- ipgrep
- iphelix
- iPhone Data Protection in Depth
- iPhone Jailbreaking, Greenpois0n and SHAtter Trojans
- iPhone performance after Spectre patch
- iPhone X未能幸免 | 以色列取证企业发现解锁任意iPhone设备的方法
- iPhoneLabs
- iphonelinux
- Iphone取证(一)
- iPhone取证的通用方法
- iPhone锁屏却锁不住个人信息,iOS安全性真的很高吗?
- ipify
- ipinfo
- ipinfo.io
- IPIP
- IPIP.NET
- IPList
- IPObfuscator
- ipplus360.com
- IppSec
- ipquery.io
- iprange:计算Ip 范围
- IPs
- IPsec VPN
- ipsw.me
- ipswbeta.dev
- iptable介绍
- IPv6地址查询工具
- IPVanish
- IPVoid
- IPWarden:IPWarden是一个IP资产风险发现工具
- ipwn
- ip代理工具shadowProxy-代理池
- IP地址查询
- ip查询
- iqiyi/xhook
- IR Workflow Gallery
- irazasyed
- IRC
- irc.libera.chat
- iRET (iOS Reverse Engineering Toolkit)
- irfanview.com
- IridiumXOR
- Iris mobile: An open source, mobile interface for incident management
- Iris:一款可执行常见Windows漏洞利用检测的WinDbg扩展
- IRM
- Irma
- iromise
- Iron Finance attack
- ironbee
- IronGeek
- Ironies of Automation: A Comedy in Three Parts
- Ironies of Automation: A Comedy in Three Parts’ with Tanner Lund of Microsoft
- ironstrings
- IRP_MJ_CLEANUP
- IRPMon
- irq8/trackercat
- is
- Is it a good idea to use git for configuration file version controlling?
- Is it possible to ping an address:port?
- Is there a way to delete 100GB file on Linux without thrashing IO/load?
- Is there an easier way to chroot than bind-mounting?
- is-my-node-vulnerable
- is-website-vulnerable
- is2ei
- ISC2 CCSP - Certified Cloud Security Professional
- ISC2 CSSLP - Certified Secure Software Life-cycle Professional
- isclayton
- iscsicpl_bypassUAC:UAC bypass for x64 Windows 7 - 11
- ise-crypto
- iSEEK Education
- isfaaghyth
- Ishan Batish
- IshanBatish
- ishanjain28
- ISIS Lab
- isis.liveuamap.com
- ismailsimsek
- ISO Standards Catalogue
- Isolate containers with a user namespace
- ISOT datasets
- iSpionage
- issue
- Issue #1
- issue #29
- issue 167
- issue 477
- issue/5
- issue/6
- issuehunt.io/r/noraj
- issues
- Issues
- Issues in Designing a Policy Language for Distributed Management of IT Infrastructures
- Issues Plan and track work
- Istio
- Istio访问授权再曝高危漏洞CVE-2020-8595
- ISyE 320 Simulation and Probabilistic Modeling spring 2022, by Qiaomin Xie - University of Wisconsin-Madison
- IT Security for Vehicles
- IT Security, Steven Gordon - Thammasat University, Thailand
- IT-connect.fr
- It's Foss
- It's just SQL!
- It’s Just a Monitoring Change
- Itar-Tass
- Itaybre
- ITAYC0HEN
- itayc0hen/a-journey-into-radare2
- itaysk
- itiB
- ITIL Foundation
- itm4n/vba-runpe
- Itools
- itrace.conflictarm.com
- iTranslate
- iTranslate Voice
- iTrooz
- Its all about Chroot
- Its Been Nicked
- ITS Geonetworking
- ItsIgnacioPortal
- itsmvd
- iTunes debugging disabling ptrace with LLDB
- iuime
- ivankovnatsky
- ivbeg
- ivbeg/awesome-forensicstools
- ivms-8700-0day-poc: 海康威视iVMS-8700综合安防管理平台任意文件上传漏洞
- ivpaste
- IVRE
- ivrodriguezca/re-ios-apps
- iWep Pro - wireless suite of useful applications used to turn your iOS device into a wireless network diagnostic tool
- iximiuz
- IXMaps
- IXPs
- ixquick
- iYouPort OSINT专栏
- iZito
- Izitru
- izqui
- IzzyOnDroid
- j-t-1
- J's Entitlements Database
- j00ru/windows-syscalls
- j04n
- j2osWin:通过动态链接库绕过反病毒软件Hook - Break JVM
- j3ssie
- JAADAS
- Jaap
- jabedude
- jabra-
- Jack28
- jackivanov
- JacksonChen666
- Jacob Wilkin
- jacob-baines
- jacobggman
- jacobsoo
- jacopo-chevallard
- JAD
- Jadavpur University, 2025: Introduction to Reinforcement Learning
- Jadavpur University: Foundation_Math_forML_Autumn23
- jadx
- jaegeral
- jaikishantulswani
- Jailbase
- Jailbreaking iOS in the Post-Apocalyptic Age
- Jailbreakme Takes Advantage of 0-day PDF Vuln in Apple iOS Devices
- Jake Creps
- Jake VanderPlas: Machine learning in Astronomy python tutorial
- Jakub Maćkowski
- jalvarezit
- jamchamb
- James Kettle
- james-d-elliott
- JamesConlan96
- jamesearl
- JamesGee
- jameshabben/evolve
- jamespfennell
- Jamim
- Jan Wikholm
- jan-kiszka
- jangid
- janldk
- Janmm14
- Jannify
- Jannik Hollenbach
- Jannik Hollenbach @J12934
- janowagner
- Jansson
- January Threat Reports
- Japan Night Life - uMap
- Japan time
- japhlange
- jar-analyzer-cli: 一个用于分析Jar包的CLI工具
- jar-analyzer:一个用于分析jar包的GUI工具,尤其适合从事代码安全审计
- Jarbas : 1
- Jarcis-cy
- jaredgonzales
- jaredrummler/apkparser
- jaredthecoder
- jaredthecoder/codestock2017-stuxnet-forensic-analysis
- jarelllama
- Jarilaos
- jarrault
- jasinner
- Jason Haddix | LevelUp 0x02 - The Bug Hunters Methodology v3(ish)
- Jason White
- jasondavies
- jasonstrimpel/volatility-trading
- jasonwhite/ducible
- jasperla
- jasrys
- jauderho
- Java
- Java Decompilers
- Java Infovis Toolkit
- Java Network Launch Protocol (jnlp) / JAR, Downloads Gozi DLL
- Java Power Tools
- Java RMI入门
- java web 压缩文件 安全 漏洞
- Java 反序列化回显的多种姿势
- Java 后反序列化漏洞利用思路
- java 安全开发之 spring boot Thymeleaf 模板注入
- Java_agent_without_file:Java agent without file 无文件的Java agent
- java-decompiler/jd-eclipse
- java-decompiler/jd-gui
- java-deobfuscator/deobfuscator
- Java-Deserialization-Cheat-Sheet
- Java-Deserialization-Cheat-Sheet:关于Java反序列化漏洞的备忘单
- java-gate: 通过简单的 Java 代码实现 Hell's Gate 相关技术(直接的系统调用)
- java-jdwp远程调试利用
- java-object-searcher:java内存对象搜索辅助工具
- Java-Rce-Echo:Java RCE 回显测试代码
- Java-Shellcode-Loader:基于Java实现的Shellcode加载器
- JavaCodeAudit:JAVA代码审计入门的小项目
- JavaDeserialize-Note:Tomcat内存马、XStream、Fastjson、Weblogic T3安全笔记
- JavaFileDict:Java应用的一些配置文件字典,来源于公开的字典与平时收集
- JavaLearnVulnerability:Java漏洞学习笔记
- Javascript - Deobfuscating a Turla JS Backdoor
- javascript - Ways to circumvent the same-origin policy - Stack Overflow
- JavaScript Cheat Sheet
- JavaScript MVC and Templating Frameworks
- Javascript Vulnerability dataset
- javasec:java安全的一些总结,主要是安全审计相关
- JavaSec:一个记录Java安全学习过程的仓库
- javasec.org
- JavaShellcodeInjector:JAVA shellcode 注入工具
- JavaVulnSummary:Java漏洞分析汇合
- JAVA代码审计的一些Tips(附脚本)
- Java代码执行漏洞中类动态加载的应用
- Java学习+面试指南 一份涵盖大部分Java程序员所需要掌握的核心知识
- Java安全相关的漏洞和技术demo
- Java漏洞代码
- java环境下任意文件下载情况自动化读取源码的小工具
- javelinnetworks/ir-tools
- JavierBejMen
- JavierFlores09
- javiersantos/piracychecker
- javuto
- jawallace
- JAWS - Just Another Windows (Enum) Script
- jaxparrow07
- jay_townsend1
- jaylinski
- jayluxferro
- Jaypeggers attack
- Jayy001
- Jazzinghen
- jbevain/cecil
- jblu42
- jboekesteijn
- jboss-autopwn
- jboss-javassist/javassist
- jbruni
- jbuck
- jcassee
- jcavar
- jcesarstef
- jcs090218
- jctello
- JD-GUI
- JDBC-Attack:当 JDBC Connection URL 可控的情况下,可以做那些攻击
- JDK 21 64-bit
- JDumpSpider:HeapDump敏感信息提取工具
- jeannekamikaze
- jeanthom/libitlp
- jedisct1/swift-sodium
- Jeff Tong @Wind010
- jeffbryner/nbdserver
- jeffbryner/volatilityplugins
- jeffmcjunkin
- jeffmendoza
- Jeffrey Friedl's Image Metadata Viewer
- Jeffreys Image Metadata Viewer
- jeffro256
- jekil
- jemalloc
- jenaye
- Jenkins
- Jenkins Documentation
- Jenkins Script Console
- jenkins-attack-framework-Jenkins攻击框架
- Jenkins-CVE-2017-1000353
- jenssegers/optimus
- jerbia
- Jeremias Gomes
- jeremychoi
- JeremyCloarec
- jeremyletang
- jermic/android-crack-tool
- Jeroen Willemsen @commjoen
- jeroenvermeulen
- jeromeleonard
- jeromew
- Jesper Olsson
- Jessy Campos
- JesusChapman
- JesusFreke
- jesusfreke/smali
- JetBrains
- jexbossreverse2.jpg
- jfagoagas
- jfarley248/iTunes_Backup_Reader
- jfcg
- jfoote/exploitable
- jfscan:masscan和 nmap 联合的端口扫描脚本
- jgalat
- jgru
- jhermsmeier/node-udif
- jhsmith
- JHU Domain-Specific Languages (DSL) Class (Summer 2018)
- Jiab77
- jiboutin
- jiceylc
- jieyushi/luffy
- Jigsaw:1
- Jim Manico
- jimen0
- jimmycuadra
- Jimpl
- jindaxia
- jindrapetrik/jpexs-decompiler
- jinnabaalu
- jinnlynn/genpac
- jinsonvarghese
- jipegit/osxauditor
- Jir-thief
- Jira
- Jira-Lens:一款专门扫描 jira 漏洞的工具
- Jira-Scan
- jire vulnerability
- jirfag
- jivoi
- jjjjjjjjjjjjjs: 爬网站JS文件,自动fuzz api接口,指定api接口
- jjnicola
- jjqqkk/chromium
- jjrbg
- jjyg/metasm
- jk45054
- jkho
- jkornev/hidden
- jkppr
- Jlaive:.NET/Native (x64) 可执行文件的防病毒规避工具
- JLECmd
- jmchia
- JMCryptExe
- jmpews/dobby
- JmpUnhook:通用方式构造中转函数进行脱钩
- JNDI 注入利用工具【Fastjson、Jackson 等相关漏洞】
- JNDI-Injection-Bypass
- JNDI-Injection-Exploit-Plus:修改版JNDI注入工具,支持JINDI、反序列化Payload生成、反序列化包装器
- jndiat:专为测试Weblogic T3协议安全的工具
- JNI技术绕过rasp防护实现jsp webshell
- joachimmetz
- joaomatosf
- joaquinlpereyra
- Job Control Commands
- Job Manager
- Job Seeker Australia
- Jobs
- Jobs (Poland)
- jobs page
- Jobsite
- Jobsite (UK)
- Jobstream Separator System Design
- Joe Sandbox
- joe-butler2
- Joedmin
- joefitzgerald/packer-windows
- JoelLarson
- joerez
- Joerger
- Joes Web Tools Obfuscator
- joestringer
- johanna-a
- John Currier
- John Hammond
- John The Jumbo
- John the Ripper
- johnconner122
- johnk-h1
- Johnng007
- johnno1962
- johnno1962/injectionforxcode
- johnno1962/injectioniii
- johnno1962/xprobeplugin
- johnny
- Johns Hopkins Unsupervised Learning spring 2017, by Rene Vidal
- joi-security
- Join the CNCF Slack
- Jok3r
- jolle
- jonahsnider
- jonasagx
- jonashrem
- Jonathan Giles @jonathanGiles
- jonathan-greig
- jonathanmetzman
- JonathanSalwan
- jonathansalwan/ropgadget
- jonathanspw
- JonathonReinhart
- jondonas/linux-exploit-suggester-2
- jondot
- jonpalmisc/ObjectiveNinja
- jonstewart/sifter
- Joomla
- Joomla XSS
- JoomlaScan
- joomscan
- Jora Australia
- jordan-wright
- JordanChenCN
- jorgectf
- JorianWoltjer
- Joris-van-der-Wel
- josedonizetti
- JosephGregg
- josephw/titl
- Josh Grossman @tghosth
- Josh961
- joshuamabina
- JosiahRaySmith
- Joss Sparkes @RemakingEden
- Josue87
- Journal Guide
- Journal Seek
- Joxean Koret
- joxeankoret/diaphora
- joxeankoret/pigaios
- Joy
- Joy:捕获数据包、分析网络流量数据、网络取证及安全监控工具
- joyent/mdb_v8
- JPCERT
- jpcertcc/aa-tools
- jpcertcc/logontracer
- jpcertcc/malconfscan
- jpcertcc/sysmonsearch
- JPEGsnoop
- JPG
- JpGraph
- JPGtoMalware:制作 JPG 木马
- jpleasu
- jpts
- jpyamamoto
- jqPlot
- JQuery
- jrajahalme
- jrbancel/chromagnon
- jroimartin
- jrottenberg
- JS
- JS Beautifier
- js-string-escape
- js-vuln-db:带有 PoC 的 JavaScript 引擎 CVE 集合
- js-x-ray
- js-xss
- JSAC 2023
- jsav0
- jsbin
- JSBypassAV:适用于 CS 下生成 jsbypass
- JSCU-NL (Joint Sigint Cyber Unit Netherlands) Logging Essentials
- JSFiddle
- JSFinder是一款用作快速在网站的js文件中提取URL,子域名的工具
- jsForward:解决web及移动端H5数据加密Burp调试问题
- JShell
- JSleak
- JsLoader-js免杀shellcode,绕过杀毒添加自启
- JSmith-Aura
- JSON
- JSON API
- json attack
- JSON hijacking
- JSON hijacking for the modern web
- JSON hijacking for the modern web | Blog
- JSON UAF Bypass
- JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants
- json_decode
- json_decode_stream
- json_encode
- JSONBee
- jsoncrack.com
- JsonExp: fastjson漏洞批量检测工具
- JSONP与CORS漏洞挖掘
- JSONP注入解析
- JSONSEC
- jsoref
- JSP Webshell那些事 -- 攻击篇
- JSP-Webshells集合【2020最新bypass某云检测可用】
- JSPHorse:结合反射调用、Javac动态编译、ScriptEngine调用JS技术和各种代码混淆技巧的一款免杀JSP Webshell生成工具,已支持蚁剑免杀
- jsql-injection
- jsteg
- JSTOR
- Jsunpack-n
- jtbandes
- jtbennett-fe
- JTegraNX
- jtkristoff
- jtool2
- jtorreno
- juananpe
- juanhundo
- juanquintela
- judaschwartz
- judyrecords
- juergw
- Juice Shop CTF
- JuiceShopBot
- Juicing V8: A Primary Account for the Memory Forensics of the V8 JavaScript Engine
- Juicy Potato
- Juicy Potato (abusing the golden privileges)
- JukArkadiy
- juliancnn
- julianoborba
- julianwiedmann
- JuliaRT
- juliazero
- juliourena
- July Threat Reports
- jumanji144
- JunaidLoonat
- Junar
- JundeadShell: Java内存马注入工具
- June Threat Reports
- Juneezee
- jurelou
- Jürgen Skrotzky
- Jus-Codin
- Just Call Me Buffy the Proto Slayer – An Initial Look into Protobuf Data in Mac and iOS Forensics
- Just Delete Me
- JustArchi
- JustasMasiulis
- justbuchanan
- justCTF 2020 - BabyCSP
- justdeleteme
- justeat/justlog
- Justia Blawg Search - Law Blogs, Lawyer Blogs, Legal Blogs Directory & Search Engine
- justiceleague
- JusticeRage
- Justin
- Justin Henderson (@smapper)
- Justin's DoStackBufferOverflowGood
- Justin's DoStackBufferOverflowGood
- JustinGrote
- Justniffer
- justpaste
- justpastit
- justtryingthingsout/sepsplit-rs
- justuswilhelm
- Justxd22
- jvdsn
- jvehent
- JVN(Japanese)
- jvoisin
- jweny
- jwilk
- jwt
- JWT Misconfiguration
- JWT Vulnerabilities
- Jwt_Tool - 用于验证、伪造、扫描和篡改 JWT(JSON Web 令牌)
- jxy-s
- JyothishmathiCV
- jyoung8607
- jzarca01
- jzold
- k-nut
- k03mad
- K0RSHAK
- k1nd0ne
- K2OSINT Bookmarklet
- k4lizen
- k4yt3x
- k8gege/k8tools
- K8s 6443批量入侵调查
- K8s数据安全之Secrets防护方案
- K8s渗透测试etcd的利用
- K8s渗透测试之kube-apiserver利用
- kabeor
- Kadabra
- Kadimus
- Kaens
- kaganisildak
- Kaggle Link
- Kagi
- Kahvi-0
- kaiko.com
- Kaitai Struct
- kaitai_struct_compiler
- kaitai_struct_cpp_stl_runtime
- kaitai_struct_csharp_runtime
- kaitai_struct_formats
- kaitai_struct_java_runtime
- kaitai_struct_javascript_runtime
- kaitai_struct_lua_runtime
- kaitai_struct_nim_runtime
- kaitai_struct_python_runtime
- kaitai_struct_ruby_runtime
- kaitai_struct_swift_runtime
- kaitai_struct_tests
- kaito.ai
- Kali
- Kali 2021.4
- Kali Linux
- Kali Linux CTF Blueprints
- Kali Linux Revealed
- Kali Linux Revealed Book
- Kali Nethunter
- kali-whoami: 隐私工具, 旨在让您在 Kali Linux 上保持最高级别的匿名性
- kalibrate-rtl
- kam1n0
- kamyabnazari
- kanglib/edu_for
- kanzure
- kao
- KapJI
- kaplanelad
- Kaqtus14
- karbassi
- Karlin:一款支持17种OA、19种CMS的批量漏洞检测利用工具
- karliss
- karlmortensen
- karma9874
- KarmaDecay
- Karneades
- karolpiateknet
- KartaView
- Kartograph
- kasketis/netfox
- Kaspersky
- Kaspersky Cyberthreat real-time map
- Kaspersky Security for Microsoft Exchange
- Kaspersky TIP
- kasperskylab/forensicstools
- kasutu
- katana
- KatanaFramework
- Katbin
- Kate Temkin
- KathanP19
- katjahahn/portex
- KawaiiDeauther
- Kayak
- kazarmy
- kazegls
- Kazgangap
- kazkansouh
- kazuminn
- KB-Vuln: 3
- Kbd-audio
- kbirkeland
- kbnlresearch/forensicimagingresources
- kc0bfv
- kcc
- KCP-based
- kcq
- kd8bny/limeaide
- KDD Cup 1999 Data
- kderck
- kdevb0x
- kdmapper:KDMapper 是一个简单的工具,它利用 iqvw64e.sys 英特尔驱动程序在内存中手动映射未签名的驱动程序
- kdomanski
- kdpryor/linuxvolprofiles
- KDSS-Research
- KDStab:a Beacon Object File combined implementation of Yaxser's Backstab and pwn1sher's KillDefender for use with Cobalt Strike
- Kedae
- KeeFarce
- Keen Security Lab Blog
- KeePass Password Safe
- keepass-password-dumper: CVE-2023-32784 KeePass 信息泄露漏洞
- Keeping Customers Streaming — The Centralized Site Reliability Practice at Netflix
- Keeping testing and production server environments clean, in sync, and consistent
- Keeping the Balance: Internet-Scale Loadbalancing Demystified
- keimpx
- kellykelly3
- kelvinBen
- Ken Munro & Dave Lodge - Hacking the Mitsubishi Outlander & IOT
- kengwang
- kenke7
- Kenna Security - Building a Scalable Monitoring System
- kennwhite
- kenohassler
- kensternberg-authentik
- Kento Stewart | Mapping Your External Perimeter during an Incident with OWASP Amass
- Kerberos Golden Tickets are Now More Golden
- kerberos介绍
- Kerberos协议探索系列之委派篇
- Kermalis
- Kernel Exploits
- Kernel Heap by Stefan Esser
- Kernel Programming Guide
- kernel-exploits
- kernel-sanders
- kerrymilan
- kershrita
- keshavgbpecdelhi
- Kevgir
- kevgliss
- kevgo
- Kevin Mitnick | Talks at Google
- Kevin Mitnick: Live Hack at CeBIT
- Kevin W. Wall
- Kevinr99089
- kevoreilly
- kevthehermit/volatility_plugins
- kevthehermit/volutility
- key_trunc_pad
- Key-Based Authentication (Public Key Authentication)
- Keychain-Dumper
- Keydroid
- Keyed Caesars cipher
- keyhacks.sh
- Keylogger into a JPG image
- KeymouseGo: 类似按键精灵的鼠标键盘录制和自动化操作 模拟点击和键入
- keyring
- Keyscope
- keystone
- Keystone Engine
- keystone-engine/keypatch
- keytotpm
- keyvalue (supported, complete,
- keywolf
- Keyword Discovery
- Keyword Spy
- KeywordTool
- KFIOFan:1
- khaireddines
- khast3x
- khemso
- Khepri:使用Golang和C++编写类似CobaltStrike的后渗透工具,免费、开源、跨平台C2工具
- khiemdoan
- khronosgroup/spirv-cross
- Kibana visualizations
- kibana由原型污染导致RCE的漏洞(CVE-2019-7609)
- kickthemout
- KICS
- kiddinn
- kijeong
- kiliczsh
- Kill chains (Wikipedia)
- killchain
- KillDefender_BOF:KillDefender的BOF 实现
- KillDefender:通过删除其令牌特权并降低令牌完整性来杀掉defender
- KillDriverProtect:关闭恶意驱动的文件和注册表保护
- killerbee
- killshot
- kilos
- kimlisa
- kimocoder
- kindling: 基于eBPF的云本地监控工具
- King Phisher
- KingAkeem
- Kingslayer A supply chain attack
- kinject: 内核Shellcode注入器
- Kioprtix: 5
- Kioptrix : Level 1.1
- Kioptrix : Level 1.2
- Kioptrix : Level 1.3
- Kippo
- Kippo-graph
- Kiranshastry
- kirk-sayre-work
- Kismet
- KitPloit
- Kitploit - Top 20 Most Popular Hacking Tools in 2021
- KJ202
- kjacks
- kjcracks/clutch
- kjlubick
- Kkrunchy
- KLara
- klau5dev
- Klear
- KleeFL
- kleozzy
- klizhentas
- klks
- Kloth
- Klout
- Kluster.ai
- kmathisbf
- kn0wl3dge
- knah
- knavesec
- knikolenko
- Knock
- Knockmail
- Knoema
- Knot Resolver — with ad blocking
- Know Your Meme
- Knowem
- KnowEm Username Search
- Knowledge Base 慢雾安全团队知识库
- Knowledge Engineering with Semantic Web Technologies by Dr. Harald Sack - HPI
- Knowledge guide to international company registration
- Knowledge-base by Breadcrumbs
- Known Exploited Vulnerabilities Catalog
- Known incompatibilities
- known issue
- knownsec/kcon
- Knownsec404team
- knqyf263
- KnugiHK/iphone_backup_decrypt
- ko-dork
- ko-fi.com/ascotbe
- ko-fi.com/ascotbe
- ko-fi.com/atlasos
- ko-fi.com/atlasos
- ko-fi.com/botherder
- ko-fi.com/edoardottt
- ko-fi.com/epi052
- ko-fi.com/gztime
- ko-fi.com/hacker
- ko-fi.com/hwdsl2
- ko-fi.com/j3ssie
- ko-fi.com/matomo
- ko-fi.com/mitchellkrog
- ko-fi.com/noraj
- ko-fi.com/prbhtkumr
- ko-fi.com/R0X4R
- ko-fi.com/StanGirard
- ko-fi.com/swissky
- ko-fi.com/thelazza
- ko-fi.com/thepbone
- ko-fi.com/xtekky
- ko-fi.com/yokoffing
- ko-fi.com/zidansec
- koa-helmet
- koadic
- kobalicek
- KobeW50
- koczkatamas
- KodjoB
- kodykinzie
- koenkk/zigbee2mqtt
- koeppea
- Koh:用C#实现的通过 BOF 文件来窃取目标的 token 和登录 session
- kohnakagawa
- kojawafft
- Kojoney
- KOLANICH
- Komodo Consulting
- Kompass
- Konano
- kongbest
- konloch/bytecode-viewer
- kontsevoy
- Koodous
- KOPACb
- kops
- Korben - Blog Post
- korcankaraokcu
- korcankaraokcu/pince
- Koscher et al. Experimental Security Analysis of a Modern Automobile, 2010
- kotakanbe
- kotori2
- kpcyrd
- kpcyrd/booty
- kpwn / qwertyoruiop's Papers
- kpwn / qwertyoruiop's Wiki
- KpwnZ
- kqlio67
- Kr3sZ
- Krackattacks-scripts
- Kraemii
- kraigu
- Krakatau:Java 反编译器、汇编器和反汇编器
- Kraken
- Kraken-ng
- kraxel
- KrbRelay:Kerberos中继框架
- Kribrum
- Kriechi
- krishnasism
- kriss-u
- Krlier
- krmaxwell
- krnick
- krol3
- kroosec
- Kscan-一款轻量级的资产发现工具,可针对IP/IP段或资产列表进行端口扫描以及TCP指纹识别和Banner抓取,在不发送更多的数据包的情况下尽可能的获取端口更多信息
- kshjessica
- kslgroup/threadmap
- kslgroup/tokenimp-token_impersonation_detection
- kslgroup/winobj
- kste
- ksubdomain:一款基于无状态子域名爆破工具
- ktool
- KTRW by Brandon Azad
- KTRW: The journey to build a debuggable iPhone
- ktsaou
- Kube-Bench
- Kube-forensics
- Kube-hunter
- kubectx
- Kubernetes
- Kubernetes - A Practical Introduction for Application Developers
- Kubernetes Auth
- Kubernetes clusters
- Kubernetes External Secrets
- Kubernetes Gated Deployments
- Kubernetes operator
- Kubernetes security
- Kubernetes中使用Helm2的安全风险
- Kubernetes安全入门
- Kuchiriel
- kudelskisecurity/volatility-plugins
- KuhakuPixel
- Kuiper
- Kunlun-Mirror 专注于安全研究员使用的代码审计辅助工具
- Kurausukun
- kurogai
- kustermariocoding
- Kuya:1
- kvm
- kwart/jd-cmd
- kwetza
- kwirk
- Kwprocessor
- kxynos
- Kyckr Company Search
- kycp.org
- Kyshman
- kyson/androidgodeye
- kzantow
- L0r3m1p5um
- L1Cafe
- L1ghtn1ng
- l3m0n:从零开始内网渗透学习
- l3yx
- l4ys/lazyida
- laampui
- Labeless Part 1: An Introduction - Check Point Research
- Labeless Part 2: Installation - Check Point Research
- Labeless Part 3: How to Dump and Auto-Resolve WinAPI Calls in LockPos Point-of-Sale Malware - Check Point Research
- Labeless Part 4: Scripting - Check Point Research
- Labeless Part 5: How to Decrypt Strings in Boleto Banking Malware Without Reconstructing Decryption Algorithm. - Check Point Research
- Labeless Part 6: How to Resolve Obfuscated API Calls in the Ngioweb Proxy Malware - Check Point Research
- labo-flg
- LabRats - Intro to HijackThis (Video)
- lachlan2k
- laciKE
- lahuke
- Laika BOSS
- LaiKash
- lainedfles
- Lakr233's Research
- lalaithan
- LALIN
- LaloHao
- Lambda Watchdog
- Lampiao : 1
- LAMPSecurity: CTF 4
- LAMPSecurity: CTF 5
- LAMPSecurity: CTF 7
- LAMPSecurity: CTF 8
- LAMPSecurity: CTF6
- Land Information (NZ)
- Land Net
- Land Viewer
- Landau Computational Physics Course
- LandMatrix
- LandrayOATreexmlRCE:蓝凌OA Treexml远程命令执行
- lang:qam
- lang:qct
- lang:qht
- lang:qme
- lang:qst
- lang:und
- lang:zxx
- langchain for custom llm wrapper
- LangNetworkTopologys-快速进行内网资产扫描,支持端口扫描,指纹识别,网站探测,结果支持图表展示
- Language 2000
- Languages & Translators - UCLouvain LINFO2132
- lanjelot
- LANs.py
- Lanyrd
- laozi999
- laramies
- Laravel
- laravel-exploits:Exploit for CVE-2021-3129
- Large-scale analysis of style injection by relative path overwrite
- Large-Scale Convex Optimization: Algorithms & Analyses via Monotone Operators by Ernest Ryu and Wotao Yin
- Larryxi
- LasCC
- lasrx
- Lasso
- last_err
- LastActivityView
- Lastpass
- LastPass Password Manager
- lateral
- Lateral Movement — SCM and Dll Hijacking Primer
- Latest development snapshot
- Latest docs
- Latest Linux ARM binaries
- Latest Linux ARM64 binaries
- Latest Linux binaries
- Latest Mac binaries
- Latest Mac M1 binaries
- latest release
- Latest releases
- Latest stable release
- Latest YT playlists
- LaTeX Source
- Latinobarometro
- latortuga71
- Lattice-based access control models
- Laturi
- LauKr
- Launcher
- LaunchPad
- Laura Barbera
- LaurenceJJones
- LAVA
- lavafroth
- lavaicer
- lavamoat
- lawrencium
- laxa
- Layer 8 conference and podcast
- layer8secure
- Layer子域名挖掘机-Layer5.0 SAINTSEC
- LaZagne:一键抓取目标机器上的所有明文密码(有点类似于mimikatz)
- lazfinder:快速遍历目标目录中所有指定后缀文件中包含的敏感信息
- Lazy Scholar
- Lazy String Decryption Tips With IDA PRO and Shade Ransomware Unpacked!
- LazyHatGuy
- LazyKali
- Lazymux
- Lazysysadmin
- lazza/recuperabit
- lbonanomi
- lc
- lcamtuf:灾难计划
- lckjosh
- lcotonea
- ldap389
- ldapdomaindump
- LDNS
- ldr: BOF/COFF loader in Rust
- Le1a
- le4f/pcap-analyzer
- Lead Ferret
- Leading without Managing: Becoming an SRE Technical Leader
- leafblower
- Leaflet
- League of Legends: Wild Rift
- Leak-Lookup
- Leak.sx
- LeakCheck.io
- Leaked
- Leaked Keys Look Up
- Leaked Slides Show How Chainalysis Flags Crypto Suspects for Cops
- Leaked Source
- LeakedHandlesFinder:查找泄露的 Windows 进程句柄
- leakedin.com
- LeakedPassword
- leakix.net
- LeakLooker
- LeakPeek
- LeakRadar
- leaky-paths-一份有关major web CVEs, known juicy APIs, misconfigurations这类的特别应用路径字典收集
- leandromoreira/linux-network-performance-parameters
- Learn about robots.txt (via Moz.com)
- Learn about Sitemaps
- Learn Computer Forensics with Online Courses and Lessons | edX
- Learn EVM Attacks
- Learn how your Kubernetes clusters respond to failure using Gremlin and Grafana
- Learn new skills to fight financial crime with the Basel Institute’s free eLearning courses and practical resources for law enforcement, anti-money laundering and compliance professionals.
- Learn Social Engineering - Erdal Ozkaya
- Learn Social Engineering – Dr. Erdal Ozkaya
- Learn the art of mobile app development
- learn-c
- Learning Android Malware Analysis
- Learning Chaos Engineering: Discovering and Overcoming System Weaknesses Through Experimentation
- Learning from Incidents at Expedia Group
- Learning from incidents: getting Sidekiq ready to serve a billion jobs
- Learning from the enemy: the GUNMAN project (NSA)
- Learning Pathways
- Learning Resources
- Learning SQL
- Learning to evade static PE machine learning malware models via reinforcement learning
- Learning-Android-Security
- learning-codeql:CodeQL Java 全网最全的中文学习资料
- LearnPwn
- LearnWebCode Brad Schiff
- lebr0nli
- LECmd.exe (v0.9.2.0)
- Lecture 4: Privilege Separation (6.858 from MIT)
- Lecture: Visual Navigation for Flying Robots
- Lectures in Quantum Computation and Quantum Information (IIT Madras)
- ledgerql.com
- leebaird
- leecher1337/ntvdmx64
- leeclemens
- leeps
- left-pad
- Legacy
- Legends Always Die -- FireEye Summit中英雄联盟供应链攻击简述
- Legion
- legithubert
- leibnitz27/cfr
- Leibniz Information Centre For Science and Technology University Library
- leijurv
- LemmyMwaura
- LemonSqueezy:1
- Lena151: Reversing With Lena
- Lendf.Me attack
- lennylxx/ipv6-hosts
- leolashkevych
- leonid-s-usov
- leosulake
- leotrubach
- leowhitehead
- lesander
- Lesser-known Tools for Android Application PenTesting
- Lessons from Building Observability Tools at Netflix
- Lessons from VAX/SVS for High-Assurance VM Systems
- Lessons from Virginia - A Comparative Forensic Analysis of WinVote Voting Machine
- Lessons in iteration from a new team in infrastructure
- Lessons learned from building a high assurance crypto gateway
- Lessons learned from running GraphQL at scale
- Lessons Netflix Learned from the AWS Outage
- lesspass/lesspass
- Let the Chaos Begin—SRE Chaos Engineering Meets Cybersecurity
- letoram/senseye
- Lets Enchance
- Lets-create-an-edr-and-bypass
- leumasme
- Level Up Your Incident Response With Gameplay
- Level Up! - Practical Windows Privilege Escalation (Presentation Slides)
- Level Up! Practical Windows Privilege Escalation by Andrew Smith
- Level Up! Practical Windows Privilege Escalation by Andrew Smith
- Leveraging AI for efficient incident response
- Leveraging CybOX with Volatility
- Leveraging DDS Security in ROS 2
- LEVERAGING GOLANG FOR GAME DEVELOPMENT AND OPERATIONS
- Leveraging Intel DCI for Memory Forensics
- Leveraging Intelligence with FireEye Network Forensics
- Leveraging Microsoft Graph API for memory forensics
- Leveraging OSINT to fight financial crime
- Leveraging Telegram for OSINT purposes
- leviathan
- Leviathan - Wide Range Mass Audit Toolkit
- Levin's - The Apple Sandbox
- Levin's Code Signing
- Levin's Dyld
- Levin's Who needs task_for_pid() anyway...
- Levitate
- levskaya/jslinux-deobfuscated
- Lexicool Translation
- Lexus89
- LFISuite
- lgandx
- lgg
- LGLZ
- LGP.png
- lgtm-migrator
- liamg
- liamosaur
- LIAPP
- liba2k
- Libdnet
- liberapay.com/edoardottt
- liberapay.com/gildas
- liberapay.com/ismailtasdelen
- liberapay.com/keepassxc
- liberapay.com/Matomo
- liberapay.com/noraj
- liberapay.com/sebres
- liberapay.com/yokoffing
- Libertify attack
- libewf
- libfmt
- libformatstr
- libfuse/sshfs
- Libfvde
- libgen
- Libimobiledevice - library to communicate with the services of the Apple ios devices
- libimobiledevice.org
- libimobiledevice/idevicerestore
- libimobiledevice/libplist
- libimobiledevice/usbmuxd
- libimoibledevice/libirecovery
- libpcap
- Library Genesis
- Library of Congress: Ask a Librarian
- Library-POC: 基于Pocsuite3、goby编写的漏洞poc&exp存档
- Library, University of Michigan: Statistics and Datasets
- library.dedaub.com
- LibreCTF
- Libreswan
- libreswan/libreswan
- LibreWolf Browser
- libscanmem
- Libsignal-service-java
- libyal/libfsapfs
- License
- License Information
- Licenseplates
- lich4
- LIEF
- lief-project/lief
- Lien attack
- Life of a Feature
- Life of a schema change
- lifeengines
- lifepillar/csvkeychain
- Liffy
- lifting-bits/mcsema
- Light pollution map
- Lighthouse Docs
- Lightstep - Building Service Ownership Using Documentation, Telemetry, and a Chance to Make Things Better
- lightswitch05
- ligolo:用于渗透时反向隧道连接工具
- Lijantropique
- Like Apache: .htaccess
- LikeAlyzer
- lilhoser
- LilligantMatsuri
- Limacharlie
- limboemu/limbo
- LiME
- Limelighter-应用程序伪造签名
- limera1n
- LimerBoy
- LimeSDR-Mini
- Limitations
- Limitations in x64dbg
- limits
- Limits of static analysis for malware detection
- limneos/classdump-dyld
- Lin-jun-xiang
- Lin.Security
- Line CTF 2023 - Momomomomemomemo
- Line CTF 2024 - graphql-101
- Line CTF 2024 - Heritage
- Line CTF 2024 - zipviewer-version-clown
- Linear Algebra (Princeton University)
- Linear Algebra Review - CMU
- LINFO 1104 - Paradigms of computer programming, Peter Van Roy, Université catholique de Louvain, Belgium - EdX
- LINFO 2266 Advanced Algorithms for Optimization 2021, by Pierre Schaus - UCLouvain
- linglong-一款甲方资产巡航扫描系统,系统定位是发现资产,进行端口爆破。帮助企业更快发现弱口令问题。主要功能包括: 资产探测、端口爆破、定时任务、管理后台识别、报表展示
- Linguee
- LingvoSoftOnline
- linhe0x0
- Link
- link1
- link2
- LinkBase
- LinkBaza
- Linkedin
- LinkedIn Automation Email Retrieval
- Linkedin Groups
- LinkedIn Recon Tool
- LinkedIn Sales Navigator
- LinkedIn X-Ray Search Tool
- LinkedIn X-Ray Search Tool | Sourcinglab
- linkedin/qark
- linkedin2username
- LinkedInt
- LinkedOut: A Request-Level Failure Injection Framework
- LinkFinder
- LinkScope
- Linkuroius
- linpeas
- lint-action
- LinusHenze/Fugu
- Linux
- Linux - Privilege Escalation
- Linux ate my ram!
- Linux Capability Exploration Lab
- Linux elevation of privileges ToC
- Linux ELF Runtime Crypter
- Linux Filesystem Hierarchy - /proc
- Linux Firewall Exploration Lab
- Linux Format #232
- Linux Format #280
- Linux Host Review
- Linux how long a process has been running?
- Linux Implementation/Administration Practicum - Redhat by Tulio Llosa
- Linux load average - the definitive summary
- Linux Load Averages: Solving the Mystery (original)
- Linux Magazine #259
- Linux Magazine Polska #194
- Linux Malware Detect
- Linux Memory Diff Analysis using Volatility
- Linux Memory Dump with Rekall
- Linux Password & Shadow File Formats
- Linux Privilege Escalation
- Linux Privilege Escalation - Tradecraft Security Weekly #22
- Linux Privilege Escalation – Exploiting User Groups
- Linux privilege escalation by Jake Williams
- Linux Privilege Escalation Check Script
- Linux privilege escalation for fun, profit, and all around mischief
- Linux Privilege Escalation using Misconfigured NFS
- Linux Privilege Escalation using weak NFS permissions
- Linux Privilege Escalation via Dynamically Linked Shared Object Library
- Linux Processes
- Linux Programming & Scripting - IIT Madras
- Linux Restricted Shell Bypass
- Linux Screenshot XWindows – Volatility Plugin To Extract X Screenshots From A Memory Dump
- Linux server performance: Is disk I/O slowing your application? (original)
- Linux Soft Exploit Suggester
- Linux sudo提权辅助工具—查找sudo权限配置漏洞
- Linux User
- Linux_Exploit_Suggester
- Linux_injector
- linux-kernel-exploitation
- linux-kernel-exploits Linux平台提权漏洞集合
- linux-kernel-sysctl-hardening.md
- linux-smart-enumeration
- linux-suid-privilege-escalation
- Linux, OpenBSD, AND Talisker: A comparative complexity analysis
- LinuxEelvation:Linux 提权漏洞集合
- LinuxFlaw:Linux 平台的漏洞 PoC、Writeup 收集
- LinuxMirrors:GNU/Linux 一键更换国内软件源
- Linuxprivchecker.py
- LinuxSecNotes
- LinuxServer
- Linux下内存取证工具Volatility的使用
- linux信息收集/应急响应/常见后门检测脚本
- Linux入侵取证:从一次应急事件讲起
- Linux内存取证:解析用户空间进程堆(上)
- Linux内存取证:解析用户空间进程堆(下)
- Linux内存取证:解析用户空间进程堆(中)
- Linux内网渗透
- Linux取证技术实践
- Linux平台-CVE-2020-8597: PPPD 远程代码执行漏洞
- Linux提取-Linux kernel XFRM UAF poc (3.x - 5.x kernels)2020年1月前没打补丁可测试
- Linux提取其他用户密码的工具(需要root权限)
- Linux提权-CVE-2019-13272 A linux kernel Local Root Privilege Escalation vulnerability with PTRACE_TRACEME
- Linux提权辅助检测Perl脚本
- Linux提权过程中的各种姿势
- Linux权限提升辅助一键检测工具
- Linux系统内存执行ELF的多种方式
- lior-orca
- liorazi
- LiPolymer
- liquidsec
- LIR allocation
- lirantal
- Lircyn
- Lirt
- LiSa
- LISA13 - How Netflix Embraces Failure to Improve Resilience and Maximize Availability
- LisoUseInAIKyrios
- liss-bot
- Lissy93
- lissy93/web-check
- List by ZachXBT
- List of 24 Analytics Tools on Avalanche
- List of 31 Analytics Tools on Polygon
- List of bug bounty writeups
- List of common file signatures
- List of Computer Forensics Tools (Part 1)
- List of header response fields
- List of Linux distributions
- list of metadata extractors
- List of Modules
- List of Newspapers.com
- List of Presets
- List of record types
- List of security-focused operating systems
- List of TCP & UDP Port Numbers
- List of Tools by Alchemy
- List of tutorials
- List of UNIX alternatives with desirable capabilities
- List of ways to find side channels in hardware/software
- List the contents of a tar or tar.gz file
- listener
- Listify
- ListRDPConnections-C# 读取本机对外RDP连接记录和其他主机对该主机的连接记录,从而在内网渗透中获取更多可通内网网段信息以及定位运维管理人员主机
- lists
- LITEDDOS
- LITESPAM
- Lithnet Password Protection for Active Directory
- LittleSis
- littlesis.org
- LiuJi-Jim
- Live AIS Ships Map!---shipfinder
- Live AIS Vessel Tracker with Ship and Port Database
- Live ATC
- Live Book
- Live Bug Bounty Recon Session on Yahoo (Amass, crts.sh, dirsearch) w/ @TheDawgyg
- Live Coin Watch
- Live Cruise Ship Tracker
- Live Cyber Attack Threat Map
- Live forensic collection and triage using CyLR, CDQR and Skadi
- Live Forensics Case Investigation using Autopsy
- Live HTTP headers
- Live memory analysis using Rekall
- Live memory analysis using Rekall, (Tue, Dec 25th)
- Live Overflow
- Live Stream
- Live Traffic
- Live View of Quay West Sydney
- Live View of Sydney Harbour
- Livejasmin R18+
- LiveLeak
- Liveuamap
- liveuamap.com
- Liveumaps
- LiveUnderflow
- LiveWorldWebcams
- Living off the False Positive
- Living off the Hardware
- Living Off The Land and Exploitation Active Directory
- Living Off The Land Applications
- Living Off The Land Drivers
- Living Off The Land ESXi
- Living Off The Land Security Tools
- Living Off the Orchard: macOS Binaries
- Living Off the Pipeline
- Living Off The Tunnels
- lixingchen12138/libvmi-volatility-master
- LizaTretyakova
- lizrice
- LjungErik
- lkarlslund
- LKAS
- llazzaro
- LLDB
- LLDBagility: practical macOS kernel debugging
- LLDBFuzzer: Debugging and Fuzzing the Apple Kernel with LLDB Script
- lldbinit - Improving LLDB
- lldb命令
- llm4decompile-6.7b-uo
- LLM4Decompile-9B-v2
- llvm-mirror/lldb
- llvmlite
- llx418
- LM Studio
- lm-sec
- LM-X License Manager
- LME × Hayabusa - Windowsイベントログの集約と解析の効率化
- lmeyerov
- lmirosevic/gbdeviceinfo
- lmirosevic/gbping
- LMU Munich Introduction to Machine Learning
- lndrtrbn
- LNK
- lnk2bodyfile
- Load Testing Kubernetes: Building a Framework (Part-1)
- Load Testing Kubernetes: Resolving bottlenecks and improving performance (Part-2)
- Loaded Dice: True Story of a Casino Cheat
- loader plugins
- Loading tweets into Kafka and Neo4j
- loadingram
- loc.alize
- Local DNS Attack Lab
- Local File Inclusion (LFI)
- Local File Inclusion (LFI) Cheat Sheet #1
- Local File Inclusion (LFI) Cheat Sheet #2
- Local Linux Enumeration & Privilege Escalation
- Local Linux Enumeration & Privilege Escalation Cheatsheet
- Local Linux privilege escalation overview
- Local Priv Esc - Linux
- LocalFocus
- localhost vs. 127.0.0.1
- localhost:8080/challenge/challenge-1
- localhost:8080/challenge/challenge-12
- localhost:8080/challenge/challenge-13
- localhost:8080/challenge/challenge-14
- localhost:8080/challenge/challenge-15
- localhost:8080/challenge/challenge-16
- localhost:8080/challenge/challenge-17
- localhost:8080/challenge/challenge-18
- localhost:8080/challenge/challenge-19
- localhost:8080/challenge/challenge-2
- localhost:8080/challenge/challenge-20
- localhost:8080/challenge/challenge-21
- localhost:8080/challenge/challenge-22
- localhost:8080/challenge/challenge-23
- localhost:8080/challenge/challenge-24
- localhost:8080/challenge/challenge-25
- localhost:8080/challenge/challenge-26
- localhost:8080/challenge/challenge-27
- localhost:8080/challenge/challenge-28
- localhost:8080/challenge/challenge-29
- localhost:8080/challenge/challenge-3
- localhost:8080/challenge/challenge-30
- localhost:8080/challenge/challenge-31
- localhost:8080/challenge/challenge-32
- localhost:8080/challenge/challenge-33
- localhost:8080/challenge/challenge-34
- localhost:8080/challenge/challenge-35
- localhost:8080/challenge/challenge-36
- localhost:8080/challenge/challenge-37
- localhost:8080/challenge/challenge-38
- localhost:8080/challenge/challenge-39
- localhost:8080/challenge/challenge-4
- localhost:8080/challenge/challenge-40
- localhost:8080/challenge/challenge-41
- localhost:8080/challenge/challenge-42
- localhost:8080/challenge/challenge-43
- localhost:8080/challenge/challenge-48
- localhost:8080/challenge/challenge-49
- localhost:8080/challenge/challenge-5
- localhost:8080/challenge/challenge-50
- localhost:8080/challenge/challenge-51
- localhost:8080/challenge/challenge-52
- localhost:8080/challenge/challenge-54
- localhost:8080/challenge/challenge-55
- localhost:8080/challenge/challenge-6
- localhost:8080/challenge/challenge-8
- LocalPotato:一个使用新potato技术来进行windows本地提权
- localtunnel/server
- localxrefs
- Locate Family
- Locate IPv6 Address Online
- loch.one
- Lockbin
- Lockfile based Scan
- lockfile-lint
- Lockphish (Grab target LOCK PIN)
- LOFLCAB
- Log all commands run by admins on production servers
- log2timeline-dev
- log2timeline-discuss
- log2timeline/dftimewolf
- log2timeline/dfvfs
- log4j_detect:类似于所谓的rasp的通过java native agent检测log4j的漏洞利用检测工具
- Log4j_RCE_Tool:Log4j 多线程批量检测利用工具
- log4j2_rce
- LOG4J2-3230 Certain strings can cause infinite recursion
- Log4jscanlinux
- Log4jscanwin
- Log4Pot
- Log4shell vulnerability overview
- loganmeetsworld
- Logdissect
- LogESP
- Logging at Twitter: Updated
- Logging at Zerodha
- Logging events
- Logging, Monitoring, & Threat Hunting
- Logic for CS - IIT Delhi
- Logical Forensics of an Android Device using AFLogical
- LogicAndTrick
- LOGICUBE INTRODUCES EDUCATIONAL VIDEO SERIES FOR IT’S NEXT-GENERATION FORENSIC IMAGER, FALCON-NEO | from Logicube
- login-securite
- LogonTracer
- LogonTracer – Investigate Malicious Windows Logon By Visualizing And Analyzing Windows Event Log
- Logsensor:用于发现登录面板和 POST 表单的 SQLi
- Logstash files to accommodate your environment
- loguru
- Lohita9
- Loi Liang Yang
- LOIC
- Loki
- LOLBAS
- LOLC2
- Lolginer
- Loly:1
- LOMAC: Low Water-Mark Integrity Protection for Linux
- Loneyers
- longitudinal maneuvers
- Longlone - @WAY29
- longvuu
- lonnywong
- loohalh
- Look Mom, I don't use Shellcode - Browser Exploitation Case Study for Internet Explorer 11
- Looking at the Kubernetes Control Plane for Multi-Tenancy
- Looking back at the Bell-LaPadula Model
- Looking for the insider: Forensic Artifacts on iOS Messaging App
- lookr
- Lookup-ID.com
- LookUpUK
- LoranKloeze/WhatsAllApp
- LoRaWAN Auditing Framework
- Lord of the Root
- Lord-Topa
- LordPE
- lorecioni/imagesplicingdetection
- lorenzleutgeb
- lorescan.com
- loretanr
- LoRexxar
- Lorna0
- lostcontrol
- LostSoulfly
- LOT
- LotemBY
- Loubaris
- louib
- LouisBrunner
- louy2
- Lovely Potato
- loviuz
- Low Context DevOps: Improving SRE Team Culture through Defaults, Documentation, and Discipline
- Low Cost Attacks on Tamper Resistant Devices
- Low Tech Hacking: Street Smarts for Security Professionals - Jack Wiles, Terry Gudaitis, Jennifer Jabbusch, Russ Rogers
- Low-Hanging Apples: Hunting Credentials and Secrets in iOS Apps
- loweryaustin
- lowfuel
- lowlevel01
- lowleveldesign/wtrace
- Loyie King
- LPVS
- lsasolutions/makegpg
- Lsassy
- lscript
- LSTAR:CobaltStrike 综合后渗透插件
- lstep
- lstipakov
- LsvanDarko
- LTE PROTOCOL EXPLOITS: IMSI CATCHERS,BLOCKING DEVICES AND LOCATION LEAKS
- LTE Pwnage: Hacking HLR/HSS and MME CoreNetwork Elements
- LTE Recon - (Defcon 23)
- LTE Security – How Good Is It?
- LTE security and protocol exploits
- LTE Security Disabled—Misconfiguration in Commercial Network
- LTE/LTE-A Jamming, Spoofing, and Sniffing - Assessment and Mitigation
- ltearno
- LTRACK: Stealthy Tracking of Mobile Phones in LTE
- Lua程序逆向之为Luac编写IDA Pro处理器模块
- luca-bondi
- luca364
- lucadidomenico
- LucaIcaro
- lucascherzer
- lucasfcnunes
- lucasg
- lucasg/dependencies
- Luci-d
- Lucidchart
- luckytyphlosion
- Lucy Phishing Server
- lucyoa
- luh2
- luhring
- LuiDavinci
- luigi1111
- luis261
- luisdamiano/rfinance17
- luisfontes19
- LuitelSamikshya
- LuizDevitte
- luject:可以将动态库静态注入到指定应用程序包的工具,目前支持Android/iPhonsOS/Windows/macOS/Linux
- lukasgabriel
- lukasloetkolben
- lukaszgryglicki
- lukdog/backtolife
- Luke's Practical hacking tips and tricks
- Luke's Practical hacking tips and tricks
- lukechilds
- LukeTeaKirk
- Lullar
- Lumen Database
- LumiFae
- lumjjb
- Lunapic
- lunaray.co
- LunaSec
- Luneye
- lunixbochs
- Lunsit
- luojunyuan
- luoluoTH
- Lupovis
- lur1el
- LuxuryPanda
- Luyten
- LVM dangers and caveats (original)
- lvrach
- lwierzbicki
- LwVM Lightweight Volume Manager
- lxc/lxc
- LxMLS Lisbon Machine Learning School 2024
- ly4k
- Lycos
- Lycos Image Search
- LyleMi
- lynchjames/obsidian-mind-map
- Lyncsmash
- Lynis
- lyxhh/lxhtoolhttpdecrypt
- Lyzem
- lz4
- lz520520
- LzExe
- m-1-k-3
- m0bilesecurity
- m0dern_p4cker
- m0mosenpai
- m0nad
- m0rtem
- m1guelpf
- m1stadev/PyIMG4
- m3n0sd0n4ld
- m417z
- m4b Mach Binaries
- m6sec
- m8sec
- MAB-Malware: A reinforcement learning framework for attacking static malware classifiers
- mablanco
- Mac and iOS Internals by Levin
- Mac Memory Analysis with Volatility
- Mac OS Internals by Singh
- Mac OSX
- MAC OSX Artifacts
- Mac_apt
- mac4n6 Presentations
- macaddress.io
- Macchina M2
- Mach
- Mach and the Mach Interface Generator by nemo
- Mach-O - A look at apple executable files
- Mach-O file format reference
- Mach-O internals
- Mach-O modification
- Mach-O support (including Universal Binaries and Apple Code Signatures)
- Mach-O 脱壳技巧一则
- mach-o格式分析
- Mach-O的动态链接相关知识
- Machine learning
- Machine Learning - Pedro Domingos- University of Washington
- Machine Learning - Professor Kogan (Spring 2016) - Rutgers
- Machine Learning (COMP09012)
- Machine Learning & Causal Inference: A Short Course
- Machine Learning 2013 - Nando de Freitas, UBC
- Machine Learning Crash Course 2015
- Machine Learning for Computer Vision - TU Munich
- Machine Learning for Computer Vision - Winter 2017-2018 - UniHeidelberg
- Machine Learning for Engineers 2022
- Machine Learning for Malware Detection - 4 - Portable Executable (PE) Files
- Machine Learning for Robotics and Computer Vision, WS 2013/2014 - TU München
- Machine Learning for Trading | Udacity
- Machine Learning in IoT
- Machine Learning Summer School 2013 - Max Planck Institute for Intelligent Systems Tübingen
- Machine Learning System Design - System Design Fight Club
- Machine Learning, 2014-2015, University of Oxford
- Machine-Learning-driven-Web-Application-Firewall
- MachO tricks
- MacLocationsScraper
- maclookup.app
- Macmod
- macMRUParser
- macollins
- macOS Scripting for Configuration, Backup and Restore
- macos_shell_memory:通过CGO 在Macos内存中执行二进制文件
- macos-all:Mac 上实用的有关渗透测试命令技巧
- macOS-Security-and-Privacy-Guide
- MacPorts
- Macquarie embraces DevOps
- MacQuisition
- Macrome
- MacroRaptor
- mactime2
- MACVendorLookup.com
- macvendors.co
- macvendors.com
- Madaari: Ordering for the Monkeys
- maddiestone/androidappre
- maddiestone/idapythonembeddedtoolkit
- maddnias
- madeye
- Madhu Akula @madhuakula
- madjin
- madpowah/forensicpcap
- MAE 509 Linear Matrix Inequality Methods in Optimal and Robust Control, by Matthew M. Peet
- maehw
- maestron/reverse-engineering-tutorials
- mafaca
- Magento-malware-scanner
- Magic Pairing: Securing Bluetooth Peripherals
- magicansk
- Magisk
- Magisk Systemless Root - Detection and Remediation
- Magisk v20.2 - Root & Universal Systemless Interface
- MagiskFrida - Android
- Magma
- Magnet AXIOM
- MAGNET RAM
- MagnetForensics CTF Challenge
- MagPortal
- mahaloz
- Mahaputra Ilham Awal @mahaputrailhamawal
- maheshrijal
- mahtd
- maidul98
- Maigret
- Maikuolan
- Mail.Ru Social Network Search
- Mailaender
- Mailbox
- Mailboxvalidator
- Maildb
- Mailinator
- mailing list
- Mailoney
- MailTester
- Mailvelope
- Main
- Main Documentation
- main.yml
- MaineK00n
- mainrs
- Maintaining a healthy fleet
- Maintaining hyper-sonic releases at Dream11
- Maitland: Analysis of packed and encrypted malware via paravirtualization extensions
- majd
- Majestic
- majr
- Make computers keep secrets
- Make least privilege a right (not a privilege)
- Making a Blind SQL Injection a little less blind
- Making Blockchain Analytics Easy
- Making loveholidays 18% faster with HTTP/3
- Making Order in CI/CD Mess
- Making our own executable packer
- Making Volatility work for you
- maktm/flirtdb
- mal-cap
- Mal-EVE: Static detection model for evasive malware
- Mal-flux: Rendering hidden code of packed binary executable
- Mal-XT: Higher accuracy hidden-code extraction of packed binary executable
- Mal-xtract: Hidden code extraction using memory analysis
- malapi.io
- malathit
- Malboxes
- malcolmrbnsn
- MalConfScan with Cuckoo: Plugin to Automatically Extract Malware Configuration
- Maldev
- maldevel
- maldevel/clearlogs
- Maldoc Templates - a310Logger, NONE, AZORult, BuerLoader, Loki, Formbook, TrickBot, Hancitor
- Maldoc Templates - Adwind, NONE, Formbook, IcedID, Dridex, RemcosRAT, Loki, DoubleBack, AgentTesla, SnakeKeylogger, Gozi, Quakbot, njrat
- Maldoc Templates - April 05 - April 09: TrickBot, IcedID, NONE, BuerLoader, Formbook, Heodo, Hancitor, SilentBuilder, Dridex, Gozi
- Maldoc Templates - April 12 - April 16: Formbook, TrickBot, Dridex, SilentBuilder, AgentTesla, SnakeKeylogger, njrat, Quakbot, AZORult, Hancitor, Heodo, Loki, Gozi
- Maldoc Templates - April 19 - April 23: Dridex, AgentTesla, IcedID, NONE, Quakbot, RedLineStealer, Loki, Gozi, TrickBot
- Maldoc Templates - AsyncRAT, Quakbot, AveMariaRAT, Formbook, Loki, TrickBot, AgentTesla, SnakeKeylogger, ArkeiStealer, Hancitor, NONE, Dridex
- Maldoc Templates - BazaLoader, Loki, NONE, Hancitor, CobaltStrike, Dridex, RedLineStealer
- Maldoc Templates - Dridex, NONE, Adwind, RemcosRAT, TrickBot, AgentTesla, FickerStealer, IcedID, Loki, BazaLoader, SilentBuilder, Hancitor, Quakbot
- Maldoc Templates - Heodo, AgentTesla, NanoCore, Loki, SilentBuilder, Hancitor, NONE, Quakbot
- Maldoc Templates - Heodo, Formbook, AgentTesla, Loki, NanoCore, NONE, Quakbot
- Maldoc Templates - Heodo, Loki, BluStealer, Dridex, Quakbot, NONE, IcedID, AgentTesla, TrickBot
- Maldoc Templates - Heodo, Quakbot, Loki, Hancitor, SilentBuilder, NONE, Formbook, Dridex, BitRAT, IcedID
- Maldoc Templates - IcedID, Gozi, RustyLoader, NONE, njrat, Loki, CobaltStrike, Formbook, Dridex, TrickBot
- Maldoc Templates - IcedID, SilentBuilder, AgentTesla, BuerLoader, TrickBot, Loki, ArkeiStealer, RaccoonStealer, AsyncRAT, NONE, Quakbot, Dridex, Hancitor
- Maldoc Templates - Maldoc Templates - Quakbot, Formbook, IcedID, SilentBuilder, Dridex, Loki, AgentTesla, AsyncRAT, QuasarRAT, NONE
- Maldoc Templates - March 01 - 05 - Gozi, BazarCall, SilentBuilder, Quakbot, Loki, CobaltStrike, SnakeKeylogger, TrickBot, AgentTesla, Dridex, NONE, Hancitor
- Maldoc Templates - March 08 - 12, 2021: BuerLoader, SilentBuilder, TrickBot, Gozi, AgentTesla, BazaLoader, NetWire, AveMariaRAT, Loki, NONE, Quakbot, IcedID, ZLoader, Dridex, BazarCall
- Maldoc Templates - March 15 - 19, 2021: Dridex, TrickBot, QuakBot, AgentTesla, SilentBuilder, Gozi, IcedID, Hancitor
- Maldoc Templates - March 22 - 22, 2021: AgentTesla, SilentBuilder, IcedID, AsyncRAT, Loki, Dridex, Formbook, NanoCore, TrickBot, BazaLoader, Quakbot, LemonDuck
- Maldoc Templates - March 29 - April 02: Gozi, BuerLoader, AgentTesla, BitRAT, IcedID, Loki, SilentBuilder, NONE, gozi, Dridex, Quakbot
- Maldoc Templates - NONE, Adwind, Quakbot, AgentTesla, IcedID, Formbook, Gozi, TrickBot, SnakeKeylogger, Dridex
- Maldoc Templates - NONE, Dridex, TrickBot, BazaLoader, NanoCore, Loki, AsyncRAT, IcedID, SnakeKeylogger, njrat, SilentBuilder, Formbook, RemcosRAT, OskiStealer, Gozi, Quakbot
- Maldoc Templates - NONE, njrat, TrickBot, ArkeiStealer, CrimsonRAT, SilentBuilder, Quakbot, Dridex, SnakeKeylogger, IcedID, Adwind, RedLineStealer, AZORult, Hancitor, AgentTesla, Loki
- Maldoc Templates - NONE, SnakeKeylogger, QuasarRAT, Quakbot, IcedID
- Maldoc Templates - OskiStealer, RemcosRAT, Loki, NONE, NanoCore, Quakbot, SnakeKeylogger, Formbook, Heodo
- Maldoc Templates - Quakbot, TrickBot, FickerStealer, Dridex, AgentTesla, NONE
- Maldoc Templates - QuasarRAT, SnakeKeylogger, NONE, Formbook, Loki, AveMariaRAT, AsyncRAT, SilentBuilder, GuLoader, Heodo
- Maldoc Templates - SilentBuilder, Heodo, Quakbot, NanoCore, NONE, Loki
- Maldoc Templates - SnakeKeylogger, Dridex, Quakbot, AgentTesla, NONE, Hancitor, Loki, TrickBot, SilentBuilder, Heodo, njrat, Formbook, Gozi, AZORult
- Maldoc Templates - TrickBot, Dridex, AsyncRAT, SnakeKeylogger, QuasarRAT, RemcosRAT, SilentBuilder, Quakbot, AveMariaRAT, NONE, Heodo, BitRAT, BazaLoader
- Maldoc templates Dec 07 - Dec 11. 7 groups: 1 - 5 Dridex, 6 BitRat, 7 Emotet
- Maldoc templates Dec 14 - Dec 18. 17 groups: Dridex, TA505 and Emotet
- Maldoc templates Dec 21 - Dec 25, 11 groups: Emotet, Dridex and 1 unknown
- Maldoc templates for Dec 28 - Jan 01, 3 groups: Emotet, Dridex, Emotet
- Maldoc templates for Feb 01 - 05, 3 groups: SilentBuilder and Emotet
- Maldoc Templates for February 08 - 12, 4 groups: Dridex, Heodo/Emotet, Unknown
- Maldoc Templates for February 22 - 26, 2021: SilentBuilder, TrickBot, Hancitor, Dridex, AsyncRAT, Quakbot, MassLogger, Formbook
- Maldoc templates for Jan 04 - 08, 6 groups: Emotet, Trickbot, Dridex
- Maldoc templates for Jan 11 - 15, 8 groups: Emotet, Dridex
- Maldoc templates for Jan 18 - 22, 4 groups: Emotet, Dridex
- Maldoc templates for Jan 25 - 29, 2 groups: Emotet, Unknown
- Maldoc templates for the week of Nov 02 - Nov 06
- Maldoc templates for the week of Nov 09 - Nov 13
- Maldoc templates for the week of Nov 16 - Nov 20
- Maldoc templates for the week of Nov 23 - Nov 27
- Maldoc templates for the week of Nov 30 - Dec 04
- Maldoc templates for the week of Oct 19 - Oct 23
- Maldoc templates for the week of Oct 26 - Oct 30
- Maldoc uses template injection for macro execution
- Maldocs - Automating Download URL Extraction with Python
- Maldocs - Getting Started with Excel 4 Macros (XLM Macros)
- Maldocs - Living Off The Land with Powershell
- Maldoct Templates for February 15 - 19: NetWire, TrickBot, SilentBuilder, AgentTesla, AveMariaRAT, SnakeKeylogger, njrat, NONE, ZLoader, Dridex, Loki, Quakbot, RemcosRAT, FickerStealer
- Maldrolyzer
- MaleX
- Malfease
- Malfrats Industries
- malhal
- Malheur
- MaliCage: A packed malware family classification framework based on DNN and GAN
- Malicia
- Malicious Compliance
- Malicious DLL execution using Apple's APSDaemon.exe signed binary
- Malicious PE files discovered on Google Play
- Malicious URLs Dataset
- Malicious-pdf
- malikashish8
- Malleable-C2-Profiles-Cobalt Strike的C2隐藏配置文件相关
- Malleable-C2-Randomizer:随机生成 cobaltstrike 的C2配置文件,以降低被标记和发现的概率
- Mallory
- MalSeclogon:一个使用 Seclogon 服务的小工具,支持Dump lsass、句柄欺骗、句柄克隆
- MalShare
- malta-js-obfuscator
- Maltego
- Maltego Blog
- Maltego Ethereum Transform with SocialLinks and Bloxy.info - How to start
- Maltego Guide
- Maltego Telegram
- Maltego Transforms List
- Maltego WhatsMyName Transforms
- maltego.com
- Maltiverse
- maltrail
- Maltrail Add-on for Splunk
- Maltrail decoder and rules for Wazuh
- MALtUNEsmu
- MalUnpack
- malus-security/sandblaster
- Malvoz
- Malware Analysis
- Malware Analysis is for the (Cuckoo) Birds – Working with Proxmox
- Malware Analysis Of Backdoor Creator : TheFatRat
- Malware Analysis Tutorials: a Reverse Engineering Approach
- Malware analysis using multiple API sequence mining control flow graph
- Malware analysis using visualized images and entropy graphs
- Malware Analysis With Ghidra - Stuxnet Analysis
- Malware analysis with VM instrumentation, WMI, winexe, Volatility and Metabrik
- Malware and Memory Forensics Training
- Malware and Memory Forensics Training in 2019!
- Malware Archaeology Cheat Sheets
- Malware Archeology Advanced Windows Logging Cheat Sheet
- Malware Archeology ATT&CK Logging Cheat Sheet
- Malware Archeology File Auditing Cheat Sheet
- Malware Archeology PowerShell Logging Cheat Sheet
- Malware Archeology Registry Auditing Cheat Sheet
- Malware Archeology Splunk Logging Cheat Sheet
- Malware Archeology Sysmon Logging Cheat Sheet
- Malware Archeology Windows Logging Cheat Sheet
- Malware detection through opcode sequence analysis using machine learning
- Malware Development Essentials Part 1
- Malware Domain List
- Malware Dynamic Analysis - Open SecurityTraining
- Malware family classification method based on static feature extraction
- Malware images: Visualization and automatic classification
- Malware makeover: Breaking ML-based static analysis by modifying executable bytes
- Malware obfuscation techniques: A brief survey
- Malware obfuscation through evolutionary packers
- Malware Theory - PE Malformations and Anomalies
- Malware Training Sets
- Malware Unicorn Reverse Engineering Tutorial
- Malware Unicorn Workshops
- Malware_development_part
- malware-jail
- Malware: Process Explorer & Procmon
- MalwareBazaar
- MalwareGallery
- MalwareMechanic
- Malwares.com
- MalwareSamples
- MalwareTech Challenges
- MalwareTips
- MalwareTraffic Analysis
- MalwareWorld
- Malwise - An effective and efficient classification system for packed and polymorphic malware
- Malzilla
- mamadoudicko
- mamarto
- Mamont
- Man-in-the-middle inject BeEF hook
- Manage Multiple Users
- Manage Neon database
- Manage render PostgreSQL
- Manage Supabase PostgreSQL
- Managed detection and response (MDR)
- Managed Identity credentials
- ManageFlitter
- Managing hundreds of servers for load testing: Autoscaling, custom monitoring, DevOps culture
- Managing Secrets Using Hashicorp Vault
- Managing Tailpipe
- Managing the keyring
- Managing Xcode
- Manalyze
- manasghandat
- manbanggroup/phantom
- Mancy
- Mandiant Blog: Greater Visibility Through PowerShell Logging
- mandibule:一个允许将 ELF 文件注入远程进程的程序
- ManDude
- manesec
- Mangle:修改已编译的EXE 或者 DLL 文件用以绕过EDR检查
- Manim
- Manisso
- manjusaka:牛屎花 一款C2远控
- manorit2001
- Manta
- Manticore
- Mantis
- manually
- manuelbcd
- manuelbua
- manufacturing error
- Manx
- many others
- maormagori
- Map Devleopers
- Map Maker
- MAP6264 - Queueing Theory - FAU
- MapAList
- mapausch
- MapBox
- Mapbuildr
- Mapchart.net
- MapChecking
- Mapd Tweet Map
- Maperitive
- MapHub
- Mapillary
- mapillary.com
- MapJam
- Mapline
- Mapping MITRE ATT&CK with Window Event Log IDs
- Mapquest
- Maps Me (Mobile Offline Maps)
- maps.google.com
- maptia.com
- MARA Framework
- maraoz
- Marc Chang Sing Pang @mchangsp
- Marc Poulhiès
- marc-etienne
- MarcaDian
- marcelomagina
- March 20 ChatGPT outage: Here’s what happened
- March Threat Reports
- Marcin Nowak @drnow4u
- marcinguy
- Marcioshub
- MarcoG3
- Marcos Rodrigues de Carvalho
- MarcRler
- marcruef
- MarcT0K
- marcus-cr
- marczalik
- MareNectaris
- Mariana Trench
- marieflorescontact
- Marine Traffic
- Marine Vessel Traffic
- MarineTraffic: Global Ship Tracking Intelligence | AIS Marine Traffic
- mariovilas/winappdbg
- mariuskimmina
- mark-sercombe
- markbaggett/srum-dump
- MarkCyber
- Markdown Source
- MarketVisual
- markmap-cli
- markmap/mkdocs-markmap
- markmckinnon
- markmichon
- MarkoShiva
- Markov Processes - Spring 2023
- marksmayo
- markus-gitdev
- marky1124
- MarMarIV
- Marmelatze
- marpaia
- Mars-战神TideSec出品的WDScanner的重写一款综合的漏洞扫描,资产发现/变更,域名监控/子域名挖掘,Awvs扫描,POC检测,web指纹探测、端口指纹探测、CDN探测、操作系统指纹探测、泛解析探测、WAF探测、敏感信息检测等等工具
- Marshal
- Marshall-Hallenbeck
- marshalsec
- MarshMello0
- MarsVenx01
- Mart
- Mart124
- marten4n6/email4n6
- martijnrusschen
- Martin Carlisle
- martinboehme
- martinbydefault
- martink90/volatilitybot_public
- MartinMuzatko
- martinsohn
- martinvigo
- Marven11
- Marvin - Analyzes Android applications and allows tracking of an app
- Mary
- masagrator
- masahiro331
- mashaz
- Mask
- Maskcrafter: 1.1
- maskprocessor
- MasoudKaviani
- Mass Assignment
- Mass_archive
- Mass_Assignment_Cheat_Sheet
- Mass-deauth
- Masscan
- masscan_to_nmap-基于masscan和nmap的快速端口扫描和指纹识别工具
- Massdns
- massongit
- Master Password
- Master Solidity - Dapp University
- Master Thieves: The Boston Gangsters Who Pulled Off the World's Greatest Art Heist
- master131
- Mastering Chaos - A Netflix Guide to Microservices
- Mastering Wireshark
- masterugwee
- masterzen/winrm
- Masto
- MAT123 Introduction to Calculus (Fall 2015) - Stony Brook
- Matano
- Match Australia
- MateuszEx:bypass AV生成工具,目前免杀效果不是很好了,但是过个360,火绒啥的没问题
- Math & Cryptography
- Math 510 - Linear Programming and Network Flows - Colorado State University
- Math for Deep Learning — Andreas Geiger
- Math Modelling
- MATH69122 Stochastic Control for Finance
- Mathematical Finance - IIT Guwahati
- Mathematical Foundations of Machine Learning (Fall 2021) - University of Chicago - Rebecca Willett
- Mathematical Statistics - 2024
- Mathematics for Machine Learning, Lectures by Ulrike von Luxburg - Tübingen Machine Learning
- Mathematics of Data Science - ETH Zurich
- matheusfelipeog
- mathew-fleisch
- mathew19
- mathewmarcus
- mathewsachin/captura
- Maths courses all topics covered - Khan Academy
- matiassingers/awesome-readme
- Matkap
- matkoniecz
- matonis/page_brute
- MatOwasp
- Matrix
- Matrix-3
- Matrix-Cain
- Matrix:1
- Matrix:2
- matrix1001
- Matrix86
- Matt Brown
- Matt Clarke: Senior Backend Infrastructure Engineer
- mattab
- Matteo F.
- Matteo Lodi
- matteyeux/ida-iboot-loader
- matteyeux/seprom-loader
- matthewclarkmay/ftriage
- matthewpierson/1033-ota-downgrader
- MatthewShao
- matthiasantierens
- matthiaskaiser
- matthieujacq
- mattiaisgro
- Mattiwatti
- mattjay
- mattmundell
- mattnotmax/volatility_mind_map
- mattock
- mattzcarey
- mauke
- maurermj08/vftools
- maurosoria
- Maven
- Mavinject | Dll Injected
- Mavituna testsparker
- mawangyejizhiyan
- maxbachmann
- MaxGranzow
- maxgrok
- maximevince
- Maxkersten Binary Analysis
- maxmcd/webtty
- Maxmind
- MaxNad
- maxprogrammer007
- MaxSecurity
- maxspl
- maxt3r
- Maxthon
- maxxk
- MaxXor
- maxzinkus
- May 30 SSL incident
- May Threat Reports
- may215
- Maye Lite
- Mayfly277
- mayor-cruz
- Maza ad blocking
- Mazda AIO Tweaks
- mazda_getInfo
- MBE_lectures.tar.gz
- MBE_release.tar.gz
- MBE_VM.vmdk.gz
- mbechler
- mbg033
- mbharanya
- Mblocks
- mbrg
- mbrla0
- mbrown1413/sqlitefind
- MBSD Technical Whitepaper - A few RPO exploitation techniques
- McBoost: Boosting scalability in malware collection and analysis using statistical classification of executables
- MCC-MNC Codes for Base Stations
- mccartney
- mcgill-dmas/kam1n0-community
- mcieno
- MCIR (Magical Code Injection Rainbow)
- mcnorton05
- mcsema
- MD-Levitan
- md5
- MD5 (Message Digest 5)
- MD5 Cracking and Hashing
- md5deep
- md5hash
- MDA1422
- MDAT-一款用于数据库攻击的利用工具,集合了多种主流的数据库类型
- mdenzel/acpi-rootkit-scan
- mdhvg
- mdilai
- mdmahib10
- MDMCK10
- MDUT:一款中文的数据库跨平台利用工具,基于前人 SQLTOOLS 的基础开发了这套程序
- ME 597 – Autonomous Mobile Robotics – Fall 2014
- ME 780 – Perception For Autonomous Driving – Spring 2017
- Me and My Girlfreind:1
- Me.Me
- ME142 - Mechatronics Spring 2020 - UC Merced
- ME780 – Nonlinear State Estimation for Robotics and Computer Vision – Spring 2017
- Measure Anything, Measure Everything
- Measure Theoretic Probability
- Measuring OSX meltdown patches performance
- MEAT
- Mechanism and Robot Kinematics - IIT Kharagpur
- Mechatronic System Design - TU Delft
- Mechatronics
- Med Amine Jouini
- medbenali/cyberscan
- MediaBugs
- Mediaservice
- Medieval Sieges and Siegecraft
- Mediterranean Machine Learning summer school 2024
- Medium
- Medium post
- MEDUSA | Android Malware Analysis 101
- MEDUSA | Android Penetration tool
- meduzen
- MEE5114 Advanced Control for Robotics from Southern University of Science and Technology
- meeehow
- meepwn_2018_pycalx
- Meerkat
- meetcshah19
- meetecho/janus-gateway
- Mefeedia
- Mega
- megadose
- MegaDumper
- Megalite
- Megaparse
- megatronking/httpcanary
- megatronking/netbare
- megatronking/stringfog
- mehaase
- Mehdzor
- MehulKChaudhari
- meitinger
- meitu/mthawkeye
- meituan-dianping/robust
- meituan-dianping/walle
- mekhalleh
- melboone
- Melbourne - Victoria
- Melissa - Emailcheck
- Melissa Data
- MelissaDATA
- melizeche
- Melkor-android
- Mellivora
- Meltdown
- meltingice1337
- Meltwater
- Mem
- Memcrashed
- Memdumps, Volatility, Mimikatz, VMs – Overview
- Memdumps, Volatility, Mimikatz, VMs – Part 1: Mimikatz & lsass.exe Dump
- Memdumps, Volatility, Mimikatz, VMs – Part 2: Windows 7 Full Memory Dump & Get Hashes
- Memdumps, Volatility, Mimikatz, VMs – Part 3: WinDBG Mimikatz Extension
- Memdumps, Volatility, Mimikatz, VMs – Part 6: VMWare Workstation
- Memdumps, Volatility, Mimikatz, VMs – Part 7: ESXi Server
- Memdumps, Volatility, Mimikatz, VMs – Part 8: ESXi Attacking Scenario – Volatility on ESXi
- Memdumps, Volatility, Mimikatz, VMs – Part 9: Logging & Monitoring ESXi
- Meme Center
- Meme Droid
- memit:在 Linux 中直接从内存中运行二进制文件
- MemLabs
- memloader
- Memory Analysis of .NET and .Net Core Applications
- Memory Analysis of macOS Page Queues
- Memory analysis using volatility3 (1) - Windows 11
- Memory analysis using volatility3 (2) - Ubuntu Linux
- Memory analysis using volatility3 (3) - macOS
- Memory anti-anti-forensics in a nutshell - Fuschini & Rodrigues - H2HC 2013
- Memory behavior-based automatic malware unpacking in stealth debugging environment
- Memory debugging under Windows with drmemory
- Memory forensic analysis of a programmable logic controller in industrial control systems
- Memory Forensics Analysis Of Cisco IOS XR 32 Bits Routers With 'Amnesic-Sherpa' - Solal Jacob
- Memory Forensics Baselines
- Memory Forensics Investigation using Volatility (Part 1)
- Memory Forensics Of Network Devices
- Memory Forensics with Jupyter Notebooks
- Memory forensics with SIFT 2.0, Volatility, and PTK
- Memory FORESHADOW: Memory FOREnSics of HArDware cryptOcurrency Wallets – A Tool and Visualization Framework
- Memory inspection with Medusa
- Memory Systems Course - Technion, Summer 2018
- Memoryshell-JavaALL:收集内存马打入方式
- MemoryShellLearn:java内存马的学习记录以及demo
- Memoryze
- MemProcFS - This Changes Everything
- MemProcFS-The Memory Process File System
- MemReader_BoF:search and extract specific strings from a target process memory and return what is found to the beacon output
- Mend Vulnerability Database
- mend-bolt-for-github
- menkar3
- MenoyGone:DOS 攻击 cobaltstrike 服务器
- Mentalist
- Mention
- Mentionmapp
- mephi42
- merces/pev
- Merchandising Online Shop
- Mercury
- Merenon
- Mergent Intellect
- Mergent Online
- Merklemap
- mesquidar
- Mess
- MessageBird - Autopsy of a MySQL Automation Disaster
- messari
- Messenger Hacking: Remotely Compromising an iPhone through iMessage
- Messenger 发音频安全吗?FB 承认曾转录用户音频
- Meta Shield
- Meta-Llama-3-70B-Instruct
- Meta-Llama-3-8B-Instruct
- Meta-Llama-3.1-405B-Instruct
- Meta-Llama-3.1-70B-Instruct
- Meta-Llama-3.1-8B-Instruct
- meta-secret Tool
- MetaAI.py
- MetaAware: Identifying metamorphic malware
- Metabear
- Metacafe
- Metadata recovery from obfuscated programs using machine learning
- MetaDefender
- MetaDefender Cloud
- MetaDock
- MetaFinder
- Metager
- Metagoofil
- Metapicz
- Metarget-一个脆弱基础设施自动化构建框架,主要用于快速、自动化搭建从简单到复杂的脆弱云原生靶机环境
- metasleuth.io
- Metasploit
- Metasploit adduser Analysis via GDB (SLAE Exam Assignment #5.2)
- Metasploit Cheat Sheet
- Metasploit integration
- Metasploit JavaScript Obfuscator
- Metasploit Local Exploit Suggester: Do Less, Get More!
- Metasploit Modules
- Metasploit Unleashed
- Metasploit Updated: Forensics, SCADA, SSH Public Keys, and More
- Metasploit_termux
- metasploit-framework
- Metasploit-Framework modules
- Metasploitable2
- Metasploitable3
- Metasploit驰骋内网直取域管首级
- Metatube
- Metaviewer
- metehan-arslan
- Meterpreter_Paranoid_Mode-SSL
- MeterSSH
- Methodology of integration of a clinical data warehouse with a clinical information system: the HEGP case
- METR 4202/7202 -- Robotics & Automation - University of Queensland
- metrica.co
- MetricsDB: TimeSeries Database for storing metrics at Twitter
- metrika.co
- metropolis.space
- Mettle your iOS with FRIDA
- METU EE 531 Probability and Stochastic Processes, by Elif Uysal
- meuzgebre
- MEV Toolkit
- MEV: Maximal Extractable Value
- mevatron
- mewmew/dissection
- MewtR
- mFaou
- mfcuk
- MFFA
- mfoc
- MFT-Parsers
- mft2bodyfile
- mfterm
- MFTExtractor
- mgunyho
- mhaggis/sysmon-dfir
- mhammond/pywin32
- mhgholamrezaei
- mhils
- mhmdiaa
- mhofstetter
- mhz_cxf:c1f
- mi-malloc
- Miaoou
- miaoski
- Miasm on GitHub
- Miasm: Framework de reverse engineering
- Mic92
- micabot
- micduffy
- michael-kirchner-at
- michaelcoyote
- michaelfyc
- michalkleiner
- michalmalik/osx-re-101
- michelroegl-brunner
- michenriksen
- MickLesk
- Micro8-渗透沉思录
- MicroBackdoor-适用于Windows目标的小型便捷C2工具
- MicroBurst
- Microcorruption
- Micrometer and the Modern Observability Stack
- Micropoor
- micropyramid/forex-python
- Microsoft Academic
- Microsoft CVRF
- Microsoft Defender Antivirus
- Microsoft Edge
- Microsoft Edge 被指悄悄导入了 Firefox 数据
- Microsoft Exchange 任意用户伪造漏洞(CVE-2018-8581)分析
- Microsoft Exchange漏洞分析 CVE-2018-8581
- Microsoft Exchange漏洞记录(撸向域控) - CVE-2018-8581
- Microsoft Malware Classification Challenge
- Microsoft portable executable and common object file format specification
- Microsoft Research - Machine Learning Course
- Microsoft Security Response Center
- Microsoft security update
- Microsoft SharePoint - Deserialization Remote Code Execution
- Microsoft SRE Page
- Microsoft Translator
- Microsoft Visual C++ 9.0
- Microsoft Visual Studio
- Microsoft Windows Security Auditing
- Microsoft Windows Security Auditing by Randy Franklin Smith
- microsoft/aaronlocker
- microsoft/binskim
- microsoft/dbgshell
- microsoft/detours
- microsoft/ethr
- microsoft/krabsetw
- microsoft/linux-vm-tools
- microsoft/miengine
- microsoft/procdump-for-linux
- microsoft/windbg-samples
- microsoft/windows-driver-frameworks
- microsoft/windows-driver-samples
- microsoft/windowsdefenderatp-hunting-queries
- Microsoft365_devicePhish
- microsoftdocs/windows-driver-docs
- MicrosoftWontFixList-微软的设计缺陷导致的提权漏洞列表
- microtar
- Midas Capital attack
- Middleware and Distributed Systems (WS 2009/10) - Dr. Martin von Löwis - HPI
- MidgetPack
- MidnightSun CTF - Rubenscube
- MidnightSun CTF 2019 - bigspin
- midnit3Z0mbi3
- midomi
- mig
- MIG:一款功能强大的高速分布式实时数据取证工具
- Migrate Volatility Plugins 2 to 3
- Migrating a Monolith to the Cloud
- Migrating Code Signing Configurations to Xcode 8
- Migrating to BeyondCorp
- MiguelX413
- mihaimaruseac
- Mik317
- Mike Woudenberg @mikewoudenberg
- mike-hunhoff
- mike406
- mikea
- mikebrady/shairport-sync
- mikesiko
- MikhailKasimov
- Mile2's Certified Digital Forensics Examiner training course
- Miles Greenwark
- military
- Military Architecture
- Million Short
- millmanorama
- Milnet
- MIM
- Mimikatz
- Mimikatz Use
- mimikatz_trunk.7z
- mimikatz_trunk.7z
- Mimikatz: 用c#实现了个远程拉取Mimikatz.ps1
- Mimikittenz
- Mimikore: .NET 5 单文件应用程序. Mimikatz 或任何 Base64 PE 加载程序
- mimura1133
- minaminao
- minbeacon:为Cobalt Strike构建最小http(s)beacon
- Mind Map (v1)
- mind-ar
- mindedsecurity/jstillery
- Mindfucking: A Critique of Mental Manipulation - Colin McGinn
- Mindfulness in SRE: Monitoring and Alerting for One's Self
- MindshaRE:如何利用IDA Python浏览WINDOWS内核
- Mineral Resources Data System: US
- mingwandroid
- Minhook
- miniaudio
- Minicomputer Architectures for Effective Security Kernel Implementations
- MiniDump:C#实现的进程 dump 工具,支持 CS 内存加载(execute-assembly)
- MiniDump:用C# 实现的dump lsass 进程工具
- minigps
- MINILAB
- minimax.finance
- Miniprint
- minishift/minishift
- Minix Firewall Lab
- Minix IPSec Lab
- Minotaur
- Mint Raises Prices attack
- Minterest attack
- MinU:1
- MinU:v2
- mipslocalvars
- mipsrop
- MIPT CTF
- Mirai
- mireado
- mirefly
- MiroKaku
- Mirror of presentation
- Misadventures in AWS
- misaelitox
- misaka-mikoto-tech/monohooker
- misc0110
- Miscellaneous
- MisConfig_HTTP_Proxy_Scanner: 扫描错误的nginx反代和转发配置,已发现内网资产(类似hosts碰撞)
- misconfig-mapper
- MiscSecNotes
- Misdirection 1
- MISP
- MISP - Open Source Threat Intelligence Platform
- MISP documentation
- MISP Modules
- Misp-dashboard
- MISP-maltego
- Missing Persons Australia
- Missing Semester
- misson20000
- mistersandman
- MistTrack
- MistTrack Twitter
- misttrack.io
- MIT 18.065 Matrix Methods in Data Analysis, Signal Processing, and Machine Learning
- MIT 18.S096 Matrix Calculus For Machine Learning And Beyond
- MIT 6.006 Introduction to Algorithms, Spring 2020
- MIT 6.036 Introduction to Machine Learning spring 2019, by Leslie Kaelbling
- MIT 6.4210/6.4212 - Robotic Manipulation - MIT
- MIT 6.5210 / 6.854 / 18.415 Advanced Algorithms Fall 2013, 2020, 2021, 2022, by David Karger
- MIT 6.5940 EfficientML.ai Lecture, Fall 2023
- MIT 6.S098 Applied Convex Optimization IAP 2022, by Alexandre Amice, Benoit Legat
- MIT 6.S184 Flow Matching and Diffusion Models, 2025
- MIT 6.S955 Applied Numerical Algorithms fall 2023, by Justin Solomon
- MIT CMS.611J Creating Video Games, Fall 2014
- MIT RES.6-012 Introduction to Probability, Spring 2018 - MIT
- MIT RES.6.007 Signals and Systems, 1987 - MIT
- mit0za
- mitch354
- Miteru
- mitm.gif
- mitm.gif
- mitm6
- MITMf
- Mitmproxy
- mitmproxy documentation
- Mitmproxy2swagger
- mitmsocks4j
- mitprasoon
- MITRE
- MITRE | ATT&CK 中文站
- MITRE ATT&CK
- MITRE ATT&CK | T1027.002 | obfuscated files or information: Software packing
- MITRE ATT&CK® and Sigma Alerting SANS Webcast Recording
- MITRE CVE
- mitre/cti
- Mixi
- Mixi (Japan)
- Mixtral-8x7B
- mj138
- mjbroekman
- mkb2091
- mkellerman/invoke-commandas
- mkorman90/volatilitybot
- mksub
- ML-Ops.org
- mlangbehn
- MLCB24 - Machine Learning in Computational Biology Fall 2024
- mlflow/mlflow
- MLGaeming
- mlieberman85
- mlinton
- mloberg
- mlodic
- mlq
- MLxPack: Investigating the effects of packers on ML-based malware detection systems using static and dynamic traits
- MM0x00
- mmetc
- MMF1928H / STA 2503F –
- mmnt.net
- mnapoli
- Mnemosyne
- mnrkbys
- MNThomson
- Mob-Droid
- MOBEXLER - A Mobile Application Penetration Testing Platform
- Mobile App Pentest Cheat Sheet
- Mobile Application Penetration Testing Cheat Sheet
- Mobile Application Security and Penetration Testing
- Mobile Browsers Security: iOS
- Mobile CICD with EC2 macOS
- Mobile Computing - IIT Madras
- Mobile Forensics Investigation using Cellebrite UFED
- Mobile Forensics: Santoku
- Mobile Information Systems - Bauhaus-Uni Weimar
- Mobile Pentesting With Frida
- Mobile Push Notifications
- Mobile Reverse Engineering Unleashed
- Mobile Security Framework
- Mobile Security Testing Guide
- Mobile Security Wiki
- Mobile security, forensics & malware analysis with Santoku Linux
- Mobile Sensing and Robotics - Bonn University
- Mobile Verification Toolkit
- Mobile-Security-Framework-MobSF
- MOBISEC2018
- MobSF
- moby/hyperkit
- mock-server/mockserver
- moddable
- Model Checking - IIT Madras
- Modeling Inter-Signal Arrival Times for Accurate Detection of CAN Bus Signal Injection Attacks
- Modern Alchemy: Turning XSS into RCE
- Modern C++ (Lecture & Tutorials, 2020, Vizzo & Stachniss) - University of Bonn
- Modern C++ Course (2018) - Bonn University
- Modern C++ Course For CV (2020) - University of Bonn
- Modern Intrusion Practices
- Modern iOS Application Security
- Modern linux malware exposed
- Modern Robotics - Northwestern University
- Modern Windows Exploit Development
- moderncsv.com
- Modernizing IDA Pro: how to make processor module glitches go away
- Modest Maps
- modifyCertTemplate
- Modlishka
- Modmobjam - Jam tomorrow, jam yesterday, but also jam today
- modoru
- ModSecurity
- ModSecurity / OWASP ModSecurity Core Rule Set
- modular architecture
- Module Config Options
- Module Logging
- Modules
- modules.png
- Moesang
- mohaidoss
- mohandattatreya/4n6k_volatility_installer
- mohanpierce99
- Moivre
- Mojeek
- MojoKDP.kext.S
- mojtabatajik/robber
- mokrunka
- Moldova's borders webcams
- Moloch
- moloch--
- moltenbit
- Molter73
- moluuser
- momo-code-sec-inspector-java-IDEA静态代码安全审计及漏洞一键修复插件
- Mona.py
- mondul
- Monero overlay
- Monero Wallet Hunter
- Monero: All About the Top Privacy Coin
- moneromooo-monero
- mongodb
- MongoDB-HoneyProxy
- MongoDB: Blockchain Database
- Monit
- monitor mode
- Monitoring and Observability at Picnic
- Monitoring and Tracing @Netflix Streaming Data Infrastructure
- Monitoring Cloud Environments at Scale with Prometheus and Thanos
- Monitoring server applications with Vortex
- Monitoring Systems as a Service – Walking the Line between Giving Your Devs Good M&O and Setting All Your Money on Fire
- Monitoring the SRE Golden Signals
- Monitors
- monnappa22/hollowfind
- monnappa22/linux_mem_diff_tool
- monnappa22/psinfo
- monobase.xyz
- monoidic
- Monolith to Microservices: Sustaining Productivity While Detangling the System
- monomagentaeggroll
- monorepo
- monoxgas/srdi
- monrocoury/forensic-tools
- monsoon-一个用Go语言编写的目录扫描工具,类似于dirsearch
- Monster
- monstersb
- montage.storyful.com
- Monteverde
- Month of Volatility Plugins (MoVP)
- Monyer
- MOOC - Advanced Android App Development - Udacity
- MOOC - Algorithms for DNA Sequencing, Coursera
- MOOC - Artificial Intelligence for Robotics - Udacity
- MOOC - Automata - Jeffrey Ullman - Coursera
- MOOC - Beginning Game Programming with C# - Coursera
- MOOC - Bioinformatics Algorithms: An Active Learning Approach - UC San Diego/Coursera
- MOOC - Cloud Computing Concepts - UIUC
- MOOC - Compilers - Stanford University
- MOOC - Computer Architecture, David Wentzlaff - Princeton University/Coursera
- MOOC - Cryptography - Coursera
- MOOC - Data Mining with Weka
- MOOC - Database Stanford Dbclass
- MOOC - Developing Android Apps - Udacity
- MOOC - From NAND to Tetris - Building a Modern Computer From First Principles
- MOOC - Functional Programming Principles in Scala by Martin Odersky
- MOOC - Heterogeneous Parallel Programming - Coursera
- MOOC - Intro to Artificial Intelligence - Udacity
- MOOC - Intro to Information Security - Udacity
- MOOC - Introduction to Computer Vision - Udacity
- MOOC - Machine Learning Part 1a - Udacity/Georgia Tech
- MOOC - Mathematical Methods for Quantitative Finance, University of Washington/Coursera)
- MOOC - Matlab - Coursera
- MOOC - Natural Language Processing - Coursera, University of Michigan
- MOOC - Neural Networks for Machine Learning, Geoffrey Hinton 2016 - Coursera
- MOOC - Principles of Reactive Programming, Scala - Coursera
- MOOC - Software Architecture & Design - Udacity
- MOOC - Statistical Inference - Coursera
- MOOC - Statistical Learning, Stanford University
- MOOC - Statistics One - Coursera
- MOOC - Statistics: Making Sense of Data, Coursera
- MOOC - Text Mining and Analytics by ChengXiang Zhai
- MOOC - Web Development - Udacity
- MOOC Programming Mobile Applications for Android Handheld Systems - University of Maryland
- MOOC: Coding the Matrix: Linear Algebra through Computer Science Applications - Coursera
- Moodle
- Mooey28
- moonD4rk
- Moonranker:1
- MoonSearch
- mootool
- morambro
- more
- More details about the October 4 outage
- More Dune Dashboards
- More new volatility plugins
- More principles
- More python injection
- More Supported LLMs
- More!
- MoreFind:一款用于快速导出URL、Domain和IP的命令行小工具
- morelli690
- morenocl
- Moria 1.1
- Moriarty Project Tool
- morkt
- Morningstar Research
- morpheus
- Morphine
- Morris Worm
- morsik
- mortar:可有效规避安全产品的检测 shellcode 加载器
- mosheDO
- moshloop
- MoshZuk
- Most usable tools for iOS penetration testing
- mostafa901
- mostafahussein
- MostInterestingBotInTheWorld
- Mostly Harmless
- MotherFucking-CTF
- MotherSearch (Telegram Search Engine Bot)
- mothran
- Motivation
- motypi
- Mounting forensic images using losetup cli [FREE COURSE CONTENT]
- Movies For Hackers
- Moving Velo to Multiple Container Sites: The Why, The How and The Lessons Learned
- MoVP 2.5: Investigating In-Memory Network Data with Volatility
- MoVP 3.5: Analyzing the 2008 DFRWS Challenge with Volatility
- MoVP for Volatility 2.2 and OMFW 2012 Wrap-Up
- MoVP II - 1.1 - Mach-O Address Space
- MOVP II - 1.5 - ARM Address Space (Volatility and Android / Mobile)
- MoVP II - 2.3 - Creating Timelines with Volatility
- MOVP II - 4.5 - Mac Volatility vs the Rubilyn Kernel Rootkit
- mowtschan
- moxilo
- MOZ Link Explorer
- Mozilla Observatory
- Mozilla SSL Configuration Generator
- Mozilla SSL Configuration Generator v5
- Mozilla 向用户展示 Firefox 收集的遥测数据
- mozilla/masche
- mozilla/mig
- mozilla/rr
- mozillazg
- mPack
- mpchadwick
- mpgn
- mplattner
- MPRESS
- mqtt_connect
- mqtt_ping
- mqtt_recv
- mqtt_subscribe
- Mquery
- Mr-Bajs
- mr-nv
- mr-tz
- Mr-xn
- Mr. Robot
- MRC
- mrcbax
- MrCloudSec
- mrexodia
- mrfearless
- mritunjaysharma394
- mrizzi
- mrled
- mrmacete
- mrmugiwara/ftk-imager-osx
- mrnfrancesco
- mrphrazer
- mrpnkt
- MrSnix
- mrtc0
- MrTchuss
- mrThe
- mrtnrdl
- Mrxx99
- MS Edge
- MS Windows OLE 远程代码执行漏洞(CVE-2020-1281)
- MS13-009 Use-After-Free IE8 (DEP)
- ms14-068域提权系列总结
- MS17-010
- MS17-010-微软永恒之蓝漏洞
- MS17-010:纯 golang 实现ms17-010利用工具
- MS17010_AllInOne:MS7010 利用工具,功能包括自动探测主机系统类型 -> 选择合适的EXP并利用 -> 植入后门 -> 创建后门自启服务 -> 创建系统账号 -> 开放后门监听端口
- mscan:一款域渗透扫描工具,方便一键自动化、全方位的信息收集及扫描域提权漏洞
- mschwager
- MSDAT
- MSDN Annotations
- MSF-Pg
- msfidelis
- msftrecon
- MSFvenom Payload Creator
- msm-code
- msmap:内存webshell 生成工具
- msodde
- mspreitz/adel
- MSR2 - Sensors and State Estimation Course (2020) - Bonn University
- MSSQL DBA权限获取WEBSHELL的过程
- MSSQL 注入攻击与防御
- MSSQL_BackDoor-摆脱MSSMS和 Navicat 调用执行 sp_cmdExec
- MSSQL-Fileless-Rootkit-WarSQLKit: 一个用于对MSSQL Server进行攻击的工具,它是一个文件型和文件型分离的MSSQL权限提升工具,可以在MSSQL Server中创建一个后门账户,或者将现有账户的权限提升到sysadmin权限
- MSSQL-Pentest-Cheatsheet:MSSQL渗透测试备忘录
- mssqli-duet-用于mssql的sql注入脚本,使用RID爆破,从Active Directory环境中提取域用户
- mssql攻防探究
- mstfknn/malware-sample-library
- mstsirkin
- MSU Machine Learning
- MSU Math for Computing
- MSU programming for AI
- MSYS2 installer
- mthcht
- MTPot
- mtr
- mtressler
- mtrp12
- mtsio
- MTTD and MTTR Are Key
- Mu
- mu00d8
- mubix
- MuckRack
- muellerberndt
- muesli
- muffins
- Mugshots
- MuirlandOracle
- mullet:梭鱼扫描器,Python 编写支持主动扫描和被动扫描
- Multi-Cluster K8S Plugin
- Multi-service image search
- Multics Security Evaluation: Vulnerability Analysis
- multiflexi
- MultiKeyDictionary
- multimon-ng
- multiple nodes
- Multiple View Geometry in Computer Vision
- Multiple Ways to Bypass UAC using Metasploit
- multiplexing_port_socks5:一款golang写的支持http与socks5的端口复用小工具,并且可以开启socks5代理
- Multitor
- Mumbai:1
- mundher
- muni106
- Muraena
- MuratiAI attack
- Museum Collections Security
- Museum Property Security and Fire Protection (from Interior Dept. Museum Property Handbook)
- Museum Security and Protection
- musl-gcc
- Must Watch! - Google SRE YouTube Playlist
- mustafacagataytulun
- MustBePresent
- MutableSecurity
- MutantX-S: Scalable malware clustering based on static features
- MuzzyBox:1
- mvexel.dev.openstreetmap.org/bing
- mvt-project/mvt
- mw3demo
- mwebber3
- mwleeds
- mwpcheung
- mwpcheung/AppleSEPFirmware
- MX Toolbox
- mxhdee
- mxrch
- mxrch/GHunt
- mxswd
- Mxtoolbox
- My 5 Top Ways to Escalate Privileges
- My articles, tutorials and research
- My Blog on Medium
- My Blog on Mirror
- My Digital Forensic Career Pathway | By Patrick Doody
- My Fake Information Generator and Validator
- My Fight for OSCP
- My File Server:1
- My Life People Search
- My Ship Tracking
- My Ship Tracking Free Realtime AIS Vessel Tracking Vessels Finder Map
- My Top Tweet
- My week shadowing a GitLab Site Reliability Engineer
- My YouTube BSCP Study Playlist
- my-re0-k8s-security:整理过去的分享,从零开始的Kubernetes攻防
- My-Shodan-Scripts:shodan搜索脚本集合
- Myallsearch
- MyEventlog.com
- MYExploit:一款扩展性高的渗透测试框架渗透测试框架
- MyFuzzAll:fuzz、爆破字典
- MyGeoPosition.com
- Mygod
- mylnikov.org
- Myriam iOS
- myscan-又一款被动扫描工具
- MyServer
- MySMS
- MySQL
- Mysql Client 任意文件读取攻击链拓展
- MySQL Error Based SQL Injection Using EXP
- MySQL High Availability at GitHub
- MYSQL_SQL_BYPASS_WIKI-mysql注入,bypass的一些心得
- MysqlClientAttack
- MysqlPot
- MySql安全总结
- Mysql数据库渗透及漏洞利用总结simeon
- MySql注入备忘录
- Mythic:一个协作、多平台、红队的框架
- Mythril
- MythX
- Mythx VSC
- MyTweetAlerts
- MyWebSearch
- MZ disk operating system (DOS)
- Mzack9999
- Mzfr
- mzpqnxow
- n-WN
- n00b-bot
- N00byKing
- n00dleSwap attack
- n0a
- n0fate/chainbreaker
- n0login
- n0ncetonic
- n0tr00t
- n0tr00t/Sreg
- N1CTF 2019 - sql_manage
- N1CTF 2021 - easyphp
- N1CTF 2021 - Funny_web
- N1CTF 2023 - laravel
- n3ko1's OSCP Guide
- n3ko1's OSCP Guide
- n3l5/irfartpull
- n4ch04
- n6
- N64 ROM Decompiling With Ghidra - N64LoaderWV
- N7WEra
- NAA Historic Copyright Records
- naabu
- naacbin
- Naategh
- nabla-c0d3
- nabla-c0d3/ssl-kill-switch2
- nacknime-official
- NacosRce: Nacos JRaft Hessian 反序列化 RCE 加载字节码 注入内存马 不出网利用
- nacs:事件驱动的渗透测试扫描器
- NadyaNayme
- naeluh
- nagyd/sdlpop
- Nahamsec on Twitch
- Nahamsec on YouTube
- NahamSec's Bug Bounty Course with 100+ Labs
- nahoragg
- naituw/ipapatch
- naiveproxy-一款用C语言编写类似于trojan的代理工具
- Najdsi
- Najdsi (Slovenia)
- NakeDB: Database Schema Visualization
- nakji.network
- nalauder
- nali
- naltun
- namazso
- Name Checkr
- Name Checkup
- Name Chk
- Name Combiner
- Namecheckr
- NameCheckup
- Namechk
- NameKetchup
- namhyung/uftrace
- Naminter
- nandahkrishna
- Nanne Baars @nbaars
- nannib/imm2virtual
- nannib/nbtempo
- nannib/nbtempow
- nano
- NanoCore sample with dumped plugins (.NET assemblies)
- nanodump: LSASS转储的瑞士军刀
- nanodump:A crappy LSASS dumper with no ASCII art
- nanoly.com
- Nanotechnology Perceptions, ISSN 1660-6795, 2024
- Nansen Research Portal
- nansen.ai
- naozibuhao/idcard
- Naps
- napz99
- NASA WorldWind
- nasa-jpl/open-source-rover
- nasbench
- Nasreddine Bencherchali (@nas_bench)
- NAT
- natebrune/silk-guardian
- nategraf
- natevw
- nathanhi
- nathannaveen
- nathants
- Nation Master
- National Archives of Australia
- National Cellular Directory
- National Company Registers
- National Computer Forensics Institute(NCFI) Training Courses
- National Film and Sound Archive of Australia
- National Insurance Crime Bureau(Vin Search)
- National Speakers Association
- nationalsecurityagency/ghidra
- native execution of GitLeaks
- Native function and Assembly Code Invocation
- Native Integrations
- native JSON config
- Native LLDB(v3.8) for iOS
- Native OKL4 Web Browser
- native-tls
- nativefiledialog-extended
- NativePayload_CBT:通过回调函数加载代码执行
- Natlas
- natmchugh
- natpass:支持web vnc和web shell的远程管理工具
- natpass:新一代NAT内网穿透+shell+vnc工具
- nats-io/nats-server
- Natural Language Processing - IIT Bombay
- Natural Language Processing - Michael Collins - Columbia University
- Natural Language Processing (CMSC 470)
- Natural Language Processing (IN2361) - TUM
- Natural Language Processing (Spring 2024) - University of Utah
- Natural Language Processing at UT Austin (Greg Durrett)
- naugtur
- Naukri
- Naukri (India)
- navanchauhan
- naveennamani
- naveensrinivasan
- Naver
- Naver (South Korea)
- navlys
- NaxnN
- NAXSI
- nayan2000
- Nazi Gold: The Sensational Story of the World's Greatest Robbery – and the Greatest Criminal Cover-Up
- nazywam
- nbaars
- nbehrnd
- nc
- NC:navicat激活+注册机等全流程分析
- ncat
- ncatlin/lockwatcher
- Nccfsas
- nccgroup/driverbuddy
- nccgroup/house
- ncDecode:用友nc数据库密码解密工具
- NCMedia Sound Editor Pro v7.5.1 SEH&DEP&ASLR
- NcN Wargame
- NCSC-NL advisory
- neargle
- Neat tricks to bypass CSRF-protection
- Neatly bypassing CSP
- Nebula Revelation attack
- Necromancer
- needle - The iOS Security Testing Framework
- NeffIsBack
- Negative_Entropy
- Neighbor Report
- neilj
- nelenkov/santoku-linux
- nemo_go:用来进行自动化信息收集的一个简单平台,通过集成常用的信息收集工具和技术,实现对内网及互联网资产信息的自动收集,提高隐患排查和渗透测试的工作效率
- nenadzaric
- nename0
- Neo23x0
- neo23x0/fnord
- neo4j
- neo4j/openCypher (unsupported,
- neolight1010
- Neolite
- neoneggplant/eggshell
- NeoZ16
- Nep-Timeline
- NerdyData
- Nessus (v6/v7/v8)
- Nessus integration
- Nessus Pro API
- NessusToReport-nessus扫描报告自动化生成工具
- Nested Kernel: An Operating System Architecture for Intra-Kernel Privilege Separation
- Nestor75
- Net-creds
- net2nimv2:nim快速免杀.net exe程序
- netattack
- netattack2
- Netblocks
- NetBootcamp OSINT Tools
- Netbox database schema diagram using schemaspy
- netcode
- Netcraft Site Report
- NetCrypt
- netdiscover
- NetDLLSpy-.NET后渗透下的权限维持,附下载DLL
- Netflix Chaos Monkey Upgraded
- Netflix SIRT releases Diffy: A Differencing Engine for Digital Forensics in the Cloud
- Netflix 解释他们追踪用户活动数据的原因
- netflix-skunkworks/diffy
- netflix-skunkworks/stethoscope
- Netflix: Multi-Regional Resiliency and Amazon Route 53
- Nethunter-In-Termux
- NETinVM
- netlas
- Netlas.io
- Netlify - Perks and Pitfalls of Building a Remote First Team
- netlify-plugin-js-obfuscator
- NetLoader:在内存中加载任何c#二进制文件且绕过AMSI 和ETW
- Netmaker + Traefik Proxy
- Netmaker K3S
- netmap
- NetNTLMtoSilverTicket
- NetoGraph
- NetRadar: Monitoring the Datacenter Network
- Netresec
- NETS 4120: Algorithmic Game Theory, Spring 2023 - UPenn
- netseclab/paper_for_digital_forensics
- netsniff-ng
- Netsparker
- netspy:一款快速探测内网可达网段工具
- Nette框架远程代码执行(CVE-2020-15227)
- NetTrace
- NetUser-使用windows api添加用户,可用于net无法使用时(支持Nim版本)
- Netvibes
- Network Address Translation (NAT) Concepts
- Network air locks, not air gaps, to preserve LAN security
- Network and process forensics toolset
- Network Detection and Response (NDR)
- Network Forensic Analysis Tool: Xplico
- Network Forensics Puzzle Contest
- Network Forensics Village | By Alexander Kot
- Network Forensics, Part 1
- Network Forensics, Part 2: Detecting and Analyzing a SCADA DoS Attack
- Network Forensics, Part 2: Packet-Level Analysis of the NSA's EternalBlue Exploit
- Network Forensics, Part 3: tcpdump for Network Analysis
- Network Forensics, Wireshark Basics, Part 1
- Network Forensics: Tracking Hackers through Cyberspace
- Network Hacking and Shadows Hacking Attacks
- Network Map (nmap)
- Network Monitor: A Tale of ACKnowledging an Observability Gap
- Network Packet Forensic using Wireshark
- Network Security Configuration
- Network Takeover Forensic Analysis: FS-NyarL
- network_device
- Network-segmentation-cheat-sheet
- Network-Tools
- Networking
- NetworkMiner
- Networks
- NetworksDB
- NetworkTools
- Netz
- Netzob
- Neural Networks and Applications - IIT Kharagpur
- Neural Networks and Biological Modeling - Lecturer: Prof. Wulfram Gerstner - EPFL
- Neural networks class - Université de Sherbrooke
- Neural Networks: Zero to Hero - Andrej Karpathy
- neurolag
- Neuroscience 299: Computing with High-Dimensional Vectors - Fall 2021 - UC Berkeley
- Neutron Code
- Neuvoo Australia
- Neuzz
- New dependencies advisor
- New feature in Chrome 80
- New Grads Becoming New SREs: Catalyzing a “Circle of Life” in Ireland
- New Honeynet Project Forensic Challenge
- New IDA Pro plugin provides TileGX support
- New Memory Forensics Techniques to Defeat Device Monitoring Malware
- New MFTParser plugin in the alpha version of Volatility
- New Presentation from MacDevOpsYVR 2019 - Launching APOLLO: Creating a Simple Tool for Advanced Forensic Analysis
- New Presentation from SANS DFIR Summit 2019 - They See Us Rollin', They Hatin' - Forensics of iOS CarPlay and Android Auto
- New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols
- New South Wales Corrective Services
- New South Wales Government Job Search
- New South Wales Police Force
- New Volatility 2.4 Cheet Sheet with Linux, Mac, and RTFM
- New Volatility Plugins
- New Vulnerabilities in 5G Networks
- New Weblogic RCE (CVE-2020-2546、CVE-2020-2551) CVE-2020-2546
- New YiSpecter malware attacks iOS devices without jailbreak
- New York Address Generator
- New(ish) Presentation: Poking the Bear - Teasing out Apple's Secrets through Dynamic Forensic Testing and Analysis
- newcodor
- NewNtdllBypassInlineHook_CSharp:通过文件映射加载 ntdll.dll 的新副本以绕过 API 内联hook
- News Channel: discord.gg/5E39JUWUFa
- News Conc
- News Map
- News Now
- News360
- Newsblur
- NewsBot
- Newseum - Today Front Pages
- Newsinshorts
- newsletter.blockthreat.io
- Newslink
- NewsLookup
- Newspaper Map
- Newspaperindex
- Newspapers List
- Newspapers.com
- NewsWhip
- Newswise
- NewUserHa
- newzealandpaul
- NexFil
- Nexpose
- NEXT 2016 Keynote: Security by Niels Provos
- Next Caller
- Next Door
- Next Threat Intel Book Club 4/5: Recapping The Cuckoo’s Egg
- Nextaris
- NextDNS
- Nextron's Aurora Agent
- Nextron's THOR Scanner
- nextvladislav
- Nezuko:1
- Nfdump
- NFS | PENETRATION TESTING ACADEMY
- NFS weak permissions
- NFS的攻击与防御
- nft analyst starter pack
- NFT Attack Vectors
- NFT Attacks
- NFT icy.tools
- NFT Mind Analysis Tool
- NFT Trader attack
- nftchecker.io
- nftscan.com
- NGA GEOINT
- NgeSEC
- Nginx
- NGINX Community Blog
- Nginx discovery journey
- NGINX Documentation
- NGINX GitHub Discussions
- Nginx Guts
- nginx log request before processing
- Nginx Optimization: understanding sendfile, tcp_nodelay and tcp_nopush
- Nginx Secure Web Server
- NGINX Tuning For Best Performance
- NGINX Ultimate Bad Blocker
- nginx.org
- nginxpwner-寻找常见Nginx错误配置和漏洞的简单工具
- ngkogkos
- NGLite-基于区块链网络的匿名跨平台远控程序
- ngrep
- ngrok.com
- NGSCB: A Trusted Open System
- ngudger2021
- NHA
- NHAS
- nhedger
- Nhoya
- ni5arga
- Niakr1s
- nicdoye
- NiceKatz:又一个不错的进程 dump 转存工具
- nichtsfrei
- Nick Aleks
- nickcano
- nickgzzjr
- Nickname OSINT
- NickTheSecurityDude
- nickvourd
- nicoandmee
- nicobonne
- NiCOFF:Nim编写的加载器,可在内存中解析和执行BOF/COFF 文件
- Nicolas Humblot @nhumblot
- nicolas17/mesu-archive
- nicpenning
- nidamanx
- Nidan
- nidhi8404
- Nidhogg:一款适用于红队的一体化简单易用的 rootkit
- nightah
- nightbringer21/fridump
- Nightmare
- NightShade
- niki864/volatilityanalysisbitcoin
- Niklas Higi
- niklashigi
- niklasmohrin
- nikneym
- NikolozCh
- nikoshell
- nikpivkin
- Nikto
- Nikto2
- nil0x42
- nilp0inter
- Nils Petzäll
- nim-loader:nim 编写的 shellcode 加载器
- Nimbus Screen Capture
- Nimcrypt2:用 nim编写shellcodeloader或者打包
- NimExec: 在Nim中执行横向移动的无文件命令
- NimicStack:NimicStack 是调用堆栈欺骗技术的纯 Nim 实现,用于模仿合法程序
- nimmicus
- NineBallo
- ninewires
- Ning
- Ninja
- Nipe
- nipunjaswal/wireless-forensics-framework
- nirgn975
- NirSoft
- nishang-ps
- nishanths
- nishikawaakira
- NIST
- NIST - Current FIPS
- NIST 800-171 Controlled Unclassified Information Course
- NIST Automotive Cybersecurity Community of Interest
- NIST Cyber Security Framework
- NIST NVD
- NIST Technical Guide to Information Security Testing and Assessment (PDF)
- nitescuc
- nixawk
- NixIntel
- Nixory
- NixOS
- nixos/patchelf
- nizq
- nk26
- nkbai
- nkh0472
- nl5887
- nlachfr
- nlahmi
- nlist-Mach-O文件重定向信息数据结构分析
- nlitsme/encrypteddmg
- NMAP
- NMAP - Closed vs Filtered
- NMAP - Port Scanning Basics
- Nmap - Techniques for Avoiding Firewalls
- NMAP Network Scanning : Official Discovery
- nmap谈谈端口探测的经验与原理
- nmilcoff
- nnesetto
- No More Google
- No more JuicyPotato? Old story, welcome RoguePotato!
- No Source Code For a 14-Year Old Vulnerable DLL? No Problem. (CVE-2018-20250)
- No Tech Hacking - Johnny Long, Kevin D. Mitnick
- NO_COLOR
- Noah blog
- Noah-golang版本的批量高速获取单IP 或 C段 title 工具『可指定端口和线程,支持文本批量的单IP或IP段』
- noahShinabarger
- noahwilliamsson
- NOC:Advanced IOT Applications - IISc Bangalore
- NOC:BioInformatics:Algorithms and Applications - IIT Madras
- NOC:Computational Systems Biology - IIT Madras
- NOC:Deep Learning For Visual Computing - IIT Kharagpur
- NOC:Design for internet of things - IISc Bangalore
- nocode
- Nod
- Node-appland
- Node-aptoide
- node-esapi
- Node-google-play
- node-ipc
- node-js
- node-release-lines
- Node.js Developer Roadmap
- Node.js Secure Coding: Defending Against Command Injection Vulnerabilities
- Node.js Secure Coding: Mitigate and Weaponize Code Injection Vulnerabilities
- Node.js Secure Coding: Prevention and Exploitation of Path Traversal Vulnerabilities
- Node.js Security newsletter
- Nodebox
- NodeFuzz
- NodeJS
- NodeJS extension to SocketCAN
- nodejs-cve-checker
- nodejs.org
- nodejs/llnode
- NodeJSScan
- NodeJsScan-一款转为Nodejs进行静态代码扫描开发的工具
- nodejs仓库钓鱼
- Nodepot
- NodeSecure
- NodeSecure CLI
- NodeSource
- nodexp
- NoFilter
- nofiv
- Nogotofail
- NoiseByNorthwest
- noisy
- Noisy Neighbors, through Networking
- nollium
- nologic/idaref
- Nomaleus
- nomerogram
- NoMoney: 一款集成了fofa,zoomeye(钟馗之眼),censys,奇安信的鹰图平台,360quake,且完全免费的信息收集工具
- NoMSBuild-MSBuild without MSbuild.exe
- NoNetCmdEcho-FileW.e:应对渗透中极限环境下命令回显 & 文件落地
- Nonlinear Control Design Jan 2024 - IIT Bombay
- Nonlinear Dynamics & Chaos - Virginia Tech
- Nonlinear Dynamics and Chaos - Steven Strogatz, Cornell University
- noobpk
- NoOverflow
- noPac
- noPac:CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter(Microsoft Windows Active Directory 权限许可和访问控制问题漏洞)
- NoPowerShell
- NopPP - No Prototype Pollution
- NoPurposeInLife
- noraj
- Norbert Wolniak @nwolniak
- Norco '80: The True Story of the Most Spectacular Bank Robbery in American History
- nordicsemiconductor/android-nrf-connect
- NordVPN
- Normmatt
- North Data Smarte Recherche
- Northern Territory Motor Vehicle Registry
- Northern Terrority Government Job Search
- Northern-Lights
- Norton SafeWeb
- NoScript
- NoScript Security Suite
- nosferatu:Windows NTLM验证后门
- Noslang
- NoSQL Injection (NoSQLi)
- NoSQLMap
- NoSQLPot
- NoSuck
- Not A Security Boundary: Breaking Forest Trusts
- Notable Event IDs
- Notablist
- notaila
- noterce: 一种另辟蹊径的免杀执行系统命令的木马
- notes
- Notes on high-assurance security methods by nickpsecurity
- Notes on Linux Memory Analysis – LiME, Volatility and LKM’s
- Notes on ZFS / Solaris forensics
- Notey
- Notifications
- notify
- NotoriousRebel
- NotoriousRebel1
- NotPacked++: Evading static packing detection
- notpeter/apple-installer-checksums
- NotQuite0day:D-Link 1960相关漏洞
- NoTracking
- Notselwyn
- novahot
- Novel feature extraction, selection and fusion for effective malware family classification
- November Threat Reports
- Novice-expert
- Novita AI
- novitae
- Novus
- NOWASP / Mutillidae 2
- noword
- nowsecure/r2frida
- nowsecure/secure-mobile-development
- NoXss-可配合burpsuite批量检测XSS
- Nozzlr
- np:解析、去重和查询多个端口扫描的工具
- NPack
- Npcap
- NPK
- nplanel
- npm installation
- npm zoo
- npm-audit
- npm-audit-resolver
- npm-scan
- NPPSpy:获取Windows明文密码的小工具
- npq
- nps-auth-bypass:nps认证绕过利用工具
- nps-deep/sectorscope
- npsmodify: ps的魔改,进行了流量特征的魔改,并且进行了漏洞的修复
- NRC Research Press
- NSA PLAYSET GSM
- NSA Windows Event Monitoring Guidance
- NSA-B-GONE
- NSA/DOD Rainbow Series
- nsacyber/event-forwarding-guidance
- nsacyber/windows-event-log-messages
- nsacyber/windows-secure-host-baseline
- nsadeveloper789
- NSE-scripts:nmap检测脚本(CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473)
- Nsec3map
- NsePocsuite-lua: 网络摄像头漏洞检测脚本.Nmap (Nse Nmap script engine)
- NSFOCUS
- nshadov/screensaver-mouse-jiggler
- nshalabi/sysmontools
- nshenfield
- NSLookup.io
- NSNGFW-RCE-POC_EXP:NSNGFW网康下一代防火墙RCE 漏洞批量检测&利用&批量getshell
- NSPack
- nsproxy: 功能类似tsocks / proxychains-ng / graftcp的命令行代理工具,但只适用于带有net_namespace的Linux系统
- NSQ
- NST
- nstarke
- NSW
- NSW - Freedom of Information Act 1989
- NT
- NT - Information Act 2002
- NtCreateSection
- NtCreateUserProcess:通过NtCreateUserProcess() APi 创建进程
- NTD News
- ntddk
- ntdsextract2
- nteseyes/pylane
- NTFS Journal Forensics
- NTFS journal parser
- NTFS USN Journal parser
- NTFSTool
- ntlm_challenger
- ntlm_theft
- NTLM-Relay
- ntlm.pw
- ntlmquic:POC tools for exploring SMB over QUIC protocol
- NTLM中继攻击的新方法
- ntopng
- NTOSpider Test Site
- NTPacker
- ntquery/scylla
- ntraiseharderror/kaiser
- nu11 security
- Nuc1eoN
- Nuclear Security Recommendations on Physical Protection of Nuclear Material and Nuclear Facilities
- Nuclear Security Series
- Nuclei
- NucleiTP:自动整合全网Nuclei的漏洞POC,实时同步更新最新POC
- nuclei引擎的exp库
- nudge4j
- NuGet
- Nukem
- NUL0x4C
- Null Byte
- null-cell
- NullArray
- Nullbyte
- Nullcon
- nullmap: 使用CVE-2023-21768来手动映射内核模式驱动程序
- nullstreak
- Numerical Linear Algebra fall 2018, by Jaegul Choo
- Numerics of Machine Learning (Winter 2022/23) - Tübingen Machine Learning
- NumLookup
- nurmukhametov
- NUS CS 6101 - Deep Reinforcement Learning
- nuvious
- Nuwber
- nuxt-security
- NVD
- nventuro
- NVISO ApkScan
- NVRAM unlock
- NW3C Chanllenges
- NXBoot
- nxczje
- NXLoader
- NxNandManager
- nygard/class-dump
- nynan | How to Actually Use Amass More Effectively — Bug Bounty
- Nyr4ki
- nytr0gen
- nytrorst/shellcodecompiler
- NYU Deep Learning Spring 2020
- NYU Deep Learning Spring 2021
- NYU Tandon's OSIRIS Lab's Hack Night
- nyuszika7h/sepfinder
- Nyx:1
- nyx0
- o0xmuhe
- O2OO
- OA.mg
- OALabs
- OARC Malware Dataset
- Oasis
- OAuth 2 in Action
- OAuth 2.0 and OpenID Connect 1.0
- OAuth 2.0 Dynamic Client Registration Management Protocol
- OAuth 2.0 Dynamic Client Registration Protocol
- OAuth 2.0 for Native Apps
- OAuth 2.0 Threat Model and Security Considerations
- OAuth 2.0 Token Introspection
- OAuth 2.0 Token Revocation
- OAuth Misconfiguration
- OBarronCS
- obelisk
- obfus.h
- Obfuscation-resilient executable payload extraction from packed malware
- Obfuscation: The hidden malware
- Obfuscation: Where are we in anti-DSE protections? (a first attempt)
- Obfuscator-LLVM: Software protection for the masses
- obfuscator-loader
- obilodeau
- OBITORASU
- objc2_analyzer
- Object Identifiers (OIDs)
- Object Oriented Systems Analysis and Design (Systems Analysis and Design in a Changing World)
- Object storage
- Object-Oriented Analysis and Design - IIT Kharagpur
- Object-oriented Program Design and Software Engineering - Aduni
- Objective-C Metadata
- Oblivion
- OBS
- Obscurity is a valid security layer
- Observability at GoCardless: a tale of API performance improvement
- Observability at Scale
- Observability Engineering
- Observable
- obsidianforensics/hindsight
- obsidianforensics/scripts
- Obsidium
- Obtain Twitter IDs
- Obtainium 101
- Obtainium Wiki
- OCaml Programming: Correct + Efficient + Beautiful
- OCCP
- OCCRP Aleph
- ocervell
- OCSF
- Octavio Gianatiempo
- octaviovg
- October 21 post-incident analysis
- October Threat Reports
- OCTOPUS database (v.2)
- OD
- OD2
- odb366
- odedshimon
- ODIN
- ODIN Certificates Search
- Odnogrupniki
- Odnoklassniki
- Odnoklassniki (Russia)
- Odyssey
- OdysseyTranslator
- OECD Aid Database
- OECD Data
- OECD Factbook
- Oedipus
- OEPdet
- OevreFlataeker
- OffcierCia
- Offensive AI
- Offensive Computer Security - Spring 2013
- Offensive Computer Security - Spring 2014
- Offensive Network Security
- Offensive Security
- Offensive Security and Reverse Engineering, Chaplain University by Ali Hadi
- Offensive Security Bookmarks
- Offensive Security’s PWB and OSCP - My Experience
- Offensive Security’s PWB and OSCP - My Experience
- Offensive, Defensive, and Forensic Techniques for Determining Web User Identity
- OffensiveCon会议
- OffensiveNim-简称Nim的跨平台shellcode加载执行器
- Office 365的Webmail在电子邮件中显示用户的IP地址
- Office of National Intelligence Australia
- Office365UserEnum
- Officer CIA’s Investigation tools list
- official BlackArch Linux
- Official Book
- official docs
- Official documentation
- official guide
- official Kali Linux
- Official Metasploit
- Official OSCP Certification Exam Guide
- official OWASP ZAP
- Official Rails Security Guide
- Official Training by Volatility - Reston/VA, June 2013
- official userguide (PDF)
- official WPScan
- Offliberty
- Offline Digital Forensics Tool for Binary Files: ByteForce
- Offline GnuPG Master Key and Subkeys on YubiKey NEO Smartcard (2014)
- OfflineRegistryView
- Offshore
- Offshore Leak Database
- OffShore.cat
- offshoreleaks.icij.org
- OFS
- oFx-漏洞批量扫描框架,0Day/1Day全网概念验证
- ogarrett
- ohjeongwook/darungrim
- ohJohanZ
- ohpe
- oisd | domain blocklist
- OKCupid
- oklink.com
- oko.palkeo.com
- OKWS paper
- olavim
- Old Apps
- Old Maps
- Old Version
- old-day
- oldmanpushcart/greys-anatomy
- OldPhoneBook
- olebrowse
- oledir
- oleid
- olemap
- olemeta
- oleobj
- oletimes
- olevba
- olie304
- oliverchang
- olivertzeng
- Ollama
- OllyDbg
- OllyDbg Plugin Converter v0.1b
- OllyDbg Scripts
- OllyDbg_tut32
- Oly-UK
- omache
- omair2084
- omarbenabdejlil
- Ombe-b
- OmeaReader
- Omegaplexx
- omer-cider
- omercnet
- omergunal
- omern1
- OMFW 2012: Analyzing Linux Kernel Rootkits with Volatility
- Omgili
- omgwtfssl
- Omni attack
- OmniSci Tweetmap
- Omnisint
- OmniUnpack
- OmniUnpack: Fast, generic, and safe unpacking of malware
- OMSmolina
- On approximate matching of programs for protecting libre software
- On Challenges in Verifying Trusted Executable Files in Memory Forensics
- On deceiving malware classification with section injection
- On evaluating adversarial robustness
- On Safes, Sandboxes, and Spies (CS 161 at UC Berkeley)
- On the (Im)possibility of obfuscating programs
- On the adoption of anomaly detection for packed executable filtering
- On the Insecurity of Vehicles Against Protocol-Level Bluetooth Threats
- On the Quality of Relational Database Schemas in Open-source Software
- On the Security of Digital Tachographs
- On the Security of the SOP-DOM Using HTML and JavaScript Code
- On the worst-case complexity of timsort
- On-Call
- On-chain analysis is a great skill to learn...
- On-chain Analytics Archives
- On-Chain Investigations with Nick
- On-chain journalism idea
- Onager
- onceupon.gg
- OnChain Transaction Debugging: 1. Tools
- ondyari/faceforensics
- One key to rule them all: Recovering the master key from RAM to break Android's file-based encryption
- One Look Reverse Dictionary
- One on One SRE
- One packer to rule them all: Empirical identification, comparison and circumvention of current antivirus detection techniques
- One Step Ahead of Cheaters -- Instrumenting Android Emulators
- one_gadget
- One-byte Modification for Breaking Memory Forensic Analysis
- one-scan-多合一网站指纹扫描器,轻松获取网站的 IP / DNS 服务商 / 子域名 / HTTPS 证书 / WHOIS / 开发框架 / WAF 等信息
- One-time or recurring donation via Cryptomator's website.
- One-Way Hash Function Lab
- OneFuzz
- OneListForAll:针对单一目标生成完整的 fuzz 字典
- OneMillionTweetMap
- ones:可用于多个网络资产测绘引擎 API 的命令行查询工具
- OneShift Australia
- Onet.pl
- Onet.pl (Poland)
- onethawt/idaplugins-list
- onioff
- Onion Search Engine
- onion-lookup
- onionengine.com
- OnionLand
- OnionLand Search
- OnionScan
- Online Barcode Reader
- Online iPhone Jailbreak Uses iOS Vulnerabilities
- OnlineNewspapers
- onlurking
- onSec-fr
- Ontology Triones Service Node security checklist
- Onur Mutlu @ TU Wien 2019 - Memory Systems
- onura
- OnWebChange
- Onyphe.io
- OOB
- Ookii.Dialogs.Wpf
- oopsmishap
- OOSE - Object-Oriented Software Engineering, Dr. Tim Lethbridge
- OOSE - Software Dev Using UML and Java
- opabravo
- Opcode sequences as representation of executables for data-mining-based unknown malware detection
- Opcodes as predictor for malware
- OPEM: A static-dynamic approach for machine-learning-based malware detection
- Open a new issue
- Open Access Scientific Journals
- Open Cnam
- Open Data Network
- Open DNS
- Open Flights
- Open Graph Protocol
- Open Grey
- open issue
- Open Issues
- Open Malware
- Open Malware Project
- Open of SlowMist
- Open PGP
- Open Pull Requests
- Open Railway Map
- Open Redirect
- Open Redirect Vulnerability
- Open redirect/SSRF payload generator
- Open Site Explorer
- Open Souce Peace
- open source 3d and vr blockchain visualizations
- Open Source at Apple Wesbite
- Open Source Car Control Project
- Open Source DFIR Slack community
- Open Source File System Digital Forensics: The Sleuth Kit
- Open Source Intelligence
- Open Source Intelligence and Forensics : Maltego
- Open Source Intelligence Browser Extension
- Open Source Security Foundation (OpenSSF) Best Practices for Open Source Developers
- Open Source Security Foundation (OpenSSF) Identifying Security Threats in Open Source Projects
- Open Source Security Foundation (OpenSSF) npm Best Practices Guide
- Open source update: School of SRE
- Open Sourced Elective: Database and Rails - Intro to Ruby on Rails, University of Texas
- Open Sourcing Coinbase’s Secure Deployment Pipeline
- Open Sourcing Iris and Oncall
- Open Street Map
- Open Vehicle Monitoring System
- Open VSX - gera2ld.markmap-vscode
- Open Web Application Security Project
- open-appsec
- open-power-workgroup/hospital
- Open-Source BinNavi ... and fREedom
- Open5GS
- OpenAI
- OpenAI SRE and scaling explained easy.
- openalpr
- OpenBackupExtractor
- OpenBSD
- OpenCanary
- openchain.xyz
- openchain.xyz EVM Trace
- openclarity
- opencollective.com/authelia-sponsors
- opencollective.com/docker-slim
- opencollective.com/edoardottt
- opencollective.com/energizedprotection
- opencollective.com/intelowl-project
- opencollective.com/keepassxc
- opencollective.com/keeweb
- opencollective.com/matomo-analytics
- opencollective.com/osmedeus
- opencollective.com/platypus
- opencollective.com/radareorg
- opencollective.com/ReVanced
- opencollective.com/trimstray
- OpenCorporates
- OpenCRE on secrets management
- OpenCTF
- opencve.io
- opendbc data
- OpenDNS Top Domains List
- OpenDXL Case Study: Sandbox Mania featuring Cuckoo and Wildfire
- OpenEDR
- OpenFPC
- OpenGarages
- OpenGazettes
- OpenGOALBot
- openGPS.cn
- OpenID Connect Back-Channel Logout 1.0
- OpenID Connect Core 1.0
- OpenID Connect Discovery 1.0
- OpenID Connect Dynamic Client Registration 1.0
- OpenID Connect Front-Channel Logout 1.0
- OpenJailbreak/greenpois0n
- OpenJailbreak/iBootRE
- OpenLayers
- OpenLearn
- OpenLeverage attack
- Openli
- OpenLinkProfiler
- OpenOwnership Register
- OpenPhish
- openpilot
- OpenRASP
- OpenRefine
- OpenRelik
- OpenSanctions
- OpenSearch - Being considered for next update
- opensky-network.org
- opensnitch
- OpenSOC
- openSquat Bot
- OpenSSF Scorecard
- OpenSSF Scorecard Monitor
- OpenSSH credential harvesting
- OpenSSL example configuration file
- openssl objects.txt
- openthread/openthread
- OpenToAll
- Opentopia
- OpenTSDB Meta Cache – trade-offs for performance
- openvas
- OpenVAS (v7/v8/v9)
- OpenVAS API integration
- OpenVAS NVT Feed
- OpenVEX
- OpenVPN
- openwifimap.net
- OpenWRT Netclient Packager
- OpenXC
- Opera
- Operating Elasticsearch with Ease at Scale
- Operating System Security (by Trent Jaegar)
- Operating System Structures to Support Security and Reliable Software
- Operational Details
- Operative-framework
- Operator Handbook: Red Team + OSINT + Blue Team Reference
- opexxx
- Ophcrack
- Opinionated Lessons in Statistics
- OpinionCrawl
- OpnSec
- OPNsense
- OPNSense Gateway Plugin
- opoplawski
- oppsec
- opsdisk
- OpSecFailure
- OPSWAT
- Opsweekly: Measuring on-call experience with alert classification
- Optical Document Security
- Optimal value for nginx worker_connections
- Optimisation for Machine Learning: Theory and Implementation (Hindi) - IIT
- Optimizing EKS networking for scale
- Optimizing Observability with Jaeger, M3, and XYS at Uber
- Optimizing Performance with Web Workers
- optimusleobear
- Optional Tools
- Options
- optizone
- Or3stis
- ORA
- oracle/graal
- Oracles No More: A Guide to Obtaining Onchain Historical Data for Smart Contracts on Ethereum
- Oralyzer
- Orange
- Orange (France)
- orangecms
- OrangeWatermelon
- Orbis directory
- Orbit
- Orbit(2)
- Orc
- orchechik/ropfind
- Orchestrating Chaos using Grab's Experimentation Platform
- Orcus
- ordex
- Ordinary users are able to read /etc/passwd, is this a security hole? (original)
- OrDuan
- oremj
- orhun
- ORIE 4741/5741: Learning with Big Messy Data - Cornell
- Origami
- Original Bell-LaPadula Paper
- Original entry point detection based on graph similarity
- Original issue
- Orion Protocol attack
- orion.ninja
- ORKL
- OrkWard
- orlangure
- orlikoski/cdqr
- orlikoski/skadi
- orlitzky
- orls
- ORM Injection
- ORM2Pwn: Exploiting injections in Hibernate ORM
- oroce
- Ortau:一个用于隐藏C2的、开箱即用的反向代理服务器
- Ory Blog
- ory-bot
- OS Security Concepts (from CS 161 from UC Berkeley)
- OS X Forensic Evidence Collection: OSXCollector
- os-surveillance.io
- OS.X/Boubou – Mach-O infector PoC source code
- Osama Magdy @osamamagdy
- osandamalith/chromefreak
- OscarAkaElvis
- Oscobo Search Engine
- OSCP Exam Report Template in Markdown
- OSCP Goldmine
- OSCP Lab and Exam Review
- OSCP Preparation Notes
- OSCP Windows PrivEsc - Part 1
- OSCP-Human-Guide:一位播主的OSCP指南
- OSCP-like Vulnhub VMs
- OSCP-Prep-Resources
- OSCP-Tips:备考 OSCP 的各种干货资料
- OSCPRepo
- oseasfr
- OSFMount
- Oshawk
- OSI Model and Networking Protocols Relationship
- OSIF
- OSINT Amateur Hour
- OSINT Ambition Publication
- OSINT Belarus
- OSINT cryptocurrency
- OSINT Dojo
- OSINT Framework
- OSINT on the Ocean: Maritime Intelligence Gathering Techniques
- OSINT Punk
- OSINT Recon Tool
- OSINT Team
- OSINT Techniques
- OSINT tool SpiderFoot — Scraping Bitcoin addresses and balances
- OSINT Toolkit
- OSINT Tools 2022
- OSINT Tools 2023
- OSINT Updates - a free weekly newsletter for OSINTers
- OSINT x UCCU Workshop on Open Source Intelligence
- OSINT-Steam
- OSINT-Tool
- OSINT, Part 3: Extracting Employee Names from Companies (Tesla and Breitbart) on LinkedIn
- osint.scamfari.com
- osint.sh
- OSINTCurious
- OSINTEye
- osintframework.com
- OsintStalker
- osintui
- Osprey Vision - The World's Most Bleeding Edge AI for Information Discovery
- Osprey Vision - The World's Most Bleeding Edge AI for Information Discovery
- osquery
- osquery.io
- osquery.io/downloads
- osquery.io/packs
- osquery.io/schema
- osqueryi
- osrframework
- OSS Review Toolkit
- OSS-Fuzz: Five months later, and rewarding projects
- OSSEC
- OSSIM
- OSSTMM (Open Source Security Testing Methodology Manual) PDF
- Ostor Lab
- oSumAtrIX
- OSV
- osv.dev
- OSX (Mac) Memory Acquisition and Analysis Using OSXpmem and Volatility
- OSX Collect
- OSX Command Line Cheat Sheet
- OSX Security Awesome
- OSX_Packer
- Osx-config-check
- OSXAuditor
- OSXCollector
- OSX内核加载mach-o流程分析
- osy/AMFIExemption
- osy/ThunderboltPatcher
- otanim
- other features
- Other Sources
- Others
- others...
- otkd
- otofoto
- otterscan.io
- OtterSec
- otx.alienvault
- Our Automation Solution, Exec, Now Features Forensics, Human Approvals, and More
- Our DevSecOps journey with Golang
- Our GitHub
- Our Journey to a Near Perfect Log Pipeline
- Our Journey to Continuous Delivery at Grab (Part 1)
- Our Journey to Continuous Delivery at Grab (Part 2)
- Our MS Office Magic Show presentation at Derbycon 2018
- Our SRE Journey at G-Research
- ourren
- Outguess
- outime
- Outlook Forensics Investigation using E-Mail Examiner
- Outlook Live
- Output
- Outwit
- OVAA (Oversecured Vulnerable Android App)
- OVAL
- ovari
- Over 600 Million Members and Hundreds of Micro Services: How We Scaled Our Monitoring System to Keep up
- Over The Air - Vol. 2, Pt. 1: Exploiting The Wi-Fi Stack on Apple Devices
- Over The Air - Vol. 2, Pt. 2: Exploiting The Wi-Fi Stack on Apple Devices
- Over The Air - Vol. 2, Pt. 3: Exploiting The Wi-Fi Stack on Apple Devices
- Over The Air Baseband Exploit: Gaining Remote Code Execution on 5G Smartphones
- Over The Air Baseband Exploit: Gaining Remote Code Execution on 5G Smartphones Deck
- Over The Air: Exploiting Broadcom’s Wi-Fi Stack (Part 1)
- Over The Air: Exploiting Broadcom’s Wi-Fi Stack (Part 2)
- overcast-security.com
- Overcoming iPhone Data Protection
- overcuriousity
- overdodactyl
- overpass turbo
- Overseas Company Registers
- Oversecured
- OverTheWire
- OverTheWire - Drifter
- OverTheWire - Krypton
- OverTheWire - Semtex
- OverTheWire - Vortex
- OverTheWire's Narnia Wargame
- OverTheWire's Narnia Wargame
- Overthrow the DNS of LAN range/IP address
- Overview
- Overview of common Android app vulnerabilities
- Overview of the tool
- overworks
- owa_info:获取Exchange信息的小工具
- OWASP
- OWASP - Enumerate Applications on Webserver
- OWASP - Reversing the Apple Sandbox
- OWASP - Web Application Firewalls
- OWASP Attack Surface Analysis Cheat Sheet
- OWASP Bricks
- OWASP Broken Web Applications Project
- OWASP BWA
- OWASP Cheat Sheet Series - Node.js Security Cheat Sheet
- OWASP CheatSheetSeries
- OWASP crAPI
- OWASP Dependency Check Integration
- OWASP Foundation Top 10
- OWASP Goatdroid
- OWASP Guide [WSTG-ATHN-02] - Testing_for_Default_Credentials
- OWASP Hackademic
- OWASP Hacking Tutorials and Web App Protection
- OWASP iGoat
- OWASP Internet of Things Project
- OWASP iOS Basic Security Testing
- OWASP Juice Shop
- OWASP Mantra
- OWASP Mobile Audit
- OWASP Mobile Security Testing Guide
- OWASP Mobile Top 10
- OWASP MSTG Crackmes
- OWASP MSTG Hacking Playground
- OWASP Mutillidae
- OWASP Mutillidae II Web Pen-Test Practice Application
- OWASP NodeGoat
- OWASP Presentation of Social Engineering
- OWASP Railsgoat
- OWASP SAMM on Secret Management
- OWASP Secretsmanagement Cheatsheet
- OWASP Secure Headers Project
- OWASP Security Shepherd
- OWASP SiteGenerator
- OWASP Testing Checklist v4
- OWASP Threat Model Cookbook
- OWASP TLS Cipher String Cheat Sheet
- OWASP Vulnerable Web Applications Directory
- OWASP Vulnerable Web Applications Directory Project (Offline)
- OWASP WebGoat
- OWASP WebGoat Project docker image
- OWASP WebGoat8
- OWASP WrongSecrets
- OWASP WrongSecrets Project docker image
- OWASP ZAP
- OWASP ZAP integration
- OWASP ZAP Node API
- OWASP-Honeypot
- OWASP-MASVS
- OWASP-MSTG
- OWASP-SKF
- OWASP-WebScarab
- OWASP: iOS Tampering and Reverse Engineering
- owasp/o-saft
- owasp/owasp-masvs
- owasp/owasp-mstg
- Owez
- Owler
- Own your Android! Yet Another Universal Root
- Ownly attack
- OWScan
- Oxford Journals
- OXID:通过windows的DCOM接口进行网卡进行信息枚举,无需认证,只要目标的135端口开放即可获得信息
- OXT Blog
- oxt.me
- OzBargin
- ozgurozbek
- Ɔhaos Ǝnginǝǝring @ Target - Part 1
- Ɔhaos Ǝnginǝǝring @ Target - Part 2
- p-gen/smenu
- p-h-c/phc-winner-argon2
- p-l-
- p-rintz
- P.A.S
- p.yusukekamiyamane
- p0dalirius
- p0f
- P0wnedShell
- P1
- p14y3r1337
- P1kachu
- p1ngul1n0
- P3run
- p4cx
- pa11y/pa11y
- Pa55w0rd
- paabloLC
- PabloLec
- paboldin
- PACER
- PACK
- Pack-Ice
- package
- package-scripts
- Packaging Spring Boot Applications for Deployment on Kubernetes
- Packed malware detection using entropy related analysis: A survey
- Packed malware variants detection using deep belief networks
- Packed PE file detection for malware forensics
- packer
- Packer analysis report debugging and unpacking the NsPack 3.4 and 3.7 packer
- Packer classification based on association rule mining
- Packer classifier based on PE header information
- Packer detection for multi-layer executables using entropy analysis
- Packer detection tool evaluation
- Packer identification based on metadata signature
- Packer identification method based on byte sequences
- Packer identification method for multi-layer executables with k-Nearest neighbor of entropies
- Packer identification using byte plot and Markov plot
- Packer identification using hidden Markov model
- Packer-complexity analysis in PANDA
- Packer-Fuzzer:一款针对Webpack等前端打包工具所构造的网站进行快速、高效安全检测的扫描工具
- PackerAttacker
- PackerBreaker
- PackerGrind
- PackerID
- Packers
- Packet Sniffing and Spoofing Lab
- Packet Storm Security
- PACKET_MMAP/TPACKET/AF_PACKET
- packetdisplay
- packetstormsecurity.com
- PacketWhisper
- PackGenome: Automatically generating robust YARA rules for accurate malware packer detection
- PackID
- Packing detection and classification relying on machine learning to stop malware propagation
- Packing-Box
- Packing-box: Breaking detectors & visualizing packing
- Packing-box: Improving detection of executable packing
- Packing-box: Playing with executable packing
- PackingData
- PacktPub - Learn Social Engineering From Scratch by Zaid Sabih
- packtpublishing/digital-forensics-with-kali-linux
- Packware
- Pacu
- pad0van
- PadBuster
- Padding Oracle
- padding-oracle-attacker
- PaddleGAN 人像生成、编辑、融合、动作迁移
- paddlepaddle/paddle-lite
- Padmapper
- pagabuc/atomicity_tops
- Page Cached
- PageGlimpse
- PagerDuty Incident Response Documentation
- Paging Storm Attacks against 4G/LTE Networks from Regional Android Botnets: Rationale, Practicality, and Implications
- Paimei
- Painless Cuckoo Sandbox Installation
- PaintBallz
- Pakkero
- Pakr
- palantir/windows-event-forwarding
- palera1n
- Palined
- Palladio
- PalmDevs
- palmerc
- Palo Alto Networks Cortex XSOAR
- PAN
- Panabee: 1
- PancakeViewer
- Panda
- PANDA SHARE
- PandaSniper-熊猫狙击手的Linux C2框架demo
- Pandede
- Pandora's Bochs
- Pandora's Bochs: Automatic unpacking of malware
- PandwaRF
- Panjiva (Cargo)
- Panopticlick
- panoramio.com
- Panoramix
- Pantaleao
- Panthr75
- Papaw
- Paper
- Paperboy
- Papers of SlowMist
- para0x0dise
- paragon-Red Team互动平台,旨在统一简单UI后的进攻工具
- paralax
- Parallel Algorithm - IIT Kanpur
- Parallel Architectures 2012/13- University of Edinburgh
- Parallel Computing - IIT Delhi
- Parallel Computing and Scientific Machine Learning
- Parallel Programming Concepts (WT 2012/13) - HPI University of Potsdam
- Parallel Programming Concepts (WT 2013/14) - HPI University of Potsdam
- paralta
- Paraluni attack
- Parameterized Complexity
- Paraphraser
- Pareto Security
- Paribus attack
- Parliament
- Paros
- parrasajad
- Parrot
- Parrot Security OS
- Parse and manipulate formats
- parsec.finance
- Parseek
- Parseek (Iran)
- Parsero
- parshantdhall
- Parsing mach-O files
- Parsing Sysmon Events for IR Indicators
- parsiq.net
- Part 1
- Part 1: Practical Deep Learning for Coders, v3 - fast.ai
- Part 2: Deep Learning from the Foundations - fast.ai
- Partitioning GitHub’s relational databases to handle scale
- Partners
- Parveshdhull
- paseaf
- passbolt
- Passcode vs. Biometrics: Forensic Implications of Touch ID and Face ID in iOS 12
- PassDecode-jar:帆软/致远密码解密工具
- Passive Subdomain Enumeration: Uncovering More Subdomains than Subfinder & Amass
- Passive Subdomain Enumeration: Uncovering More Subdomains than Subfinder & Amass
- Passivedns
- Passivedns-client
- passivedns.mnemonic.no
- PassiveTotal
- passphrase.html
- passpie
- PassTheChallenge
- Password list (1.4 Billion Clear Text Password)
- Password OSINT
- Password-Based Key Derivation Function 2 (PBKDF2)
- PasswordDecrypts:密码解密相关,目前支持 VNC 解密
- Passwords
- paste.centos
- paste.debian
- paste.ee
- paste.kde
- paste.ubuntu
- Pastebin
- Pastebin_scraper
- Pastekitoo
- Pastekitoo @Pastekitoo
- PasteLert
- Patator
- patch-package
- patchelf
- Patching a Keygenme with x64dbg [Learning Cracking]
- Patching the Mach-o Format the Simple and Easy Way
- PATDroid - Collection of tools and data structures for analyzing Android applications
- Patent Attorneys/Agent Search
- paterva.com/web7
- patois/dsync
- patois/idacyber
- patreon
- patreon.com/5ANK41
- patreon.com/algovpn
- patreon.com/boik
- patreon.com/botherder
- patreon.com/dedsec_inside_research
- patreon.com/dockerslim
- patreon.com/dragokas
- patreon.com/ds5678
- patreon.com/ds5678
- patreon.com/edoardottt
- patreon.com/evilsocket
- patreon.com/firefart
- patreon.com/HIllya51
- patreon.com/ismailtasdelen
- patreon.com/j3ssie
- patreon.com/JoshStroschein
- patreon.com/keepassxc
- patreon.com/kpcyrd
- patreon.com/matomo
- patreon.com/mitchellkrog
- patreon.com/mozillazg
- patreon.com/nwodtuhs
- patreon.com/orhunp
- patreon.com/Podalirius
- patreon.com/Sniffnet
- patreon.com/soxoj
- patreon.com/TH3xACE
- patreon.com/twintproject
- patreon.com/Tyrrrz
- patreon.com/werwolv
- patreon.com/xtekky
- Patrick Wardle's Objective-See blog
- patrickceg
- patrickfav
- patrickfav/uber-apk-signer
- patriksimek/vm2#533
- Patriot Minear
- Patrolaroid
- patryk4815
- Pattern Recognition - IISC Bangalore
- Pattern Recognition - IIT Madras
- Pattern Recognition and Application - IIT Kharagpur
- Pattern recognition and machine learning (Information science and statistics)
- Pattern Recognition Class (2012)- Universität Heidelberg
- Pattern recognition techniques for the classification of malware packers
- Paul Hensel’s General Informational Data Page
- Paul Taylor - @bao7uo
- paul-tew/lifer
- paul1278
- PaulCher
- paulcimino
- Pauline-sh
- paulkermann
- paulnoalhyt
- PauloGoncalvesBH
- Pavel, K. Vehicle On-Board Charging Security Scanner, 2024
- pavhl
- paxcut
- payloadbox/command-injection-payload-list
- payloadbox/open-redirect-payload-list
- payloadbox/xxe-injection-payload-list
- Payloads
- Payloads All The Things
- PayloadsAllTheThings
- PayloadsAllTheThings - Command Injection
- PayloadsAllTheThings - CSRF Injection
- PayloadsAllTheThings - CSV Injection
- PayloadsAllTheThings - Open Redirect
- PayloadsAllTheThings - SAML Injection
- PayloadsAllTheThings - Server-Side Request Forgery
- PayloadsAllTheThings - SQL Injection
- PayloadsAllTheThings - Upload Insecure Files
- PayloadsAllTheThings - Web Cache Deception
- PayloadsAllTheThings - Windows
- PayloadsAllTheThings - XSS Injection
- PayloadsAllTheThings - XXE Injection
- PayloadsAllTheThings (XSS)
- PayloadsAllTheThings AD
- PayPal
- paypal.me/noneprivacy
- pbalogh-sa
- PBCTF 2023 - Makima
- pbiernat/ripr
- pbsds
- PC Support Scams: a Forensic View
- Pcap Analysis & Network Hunting
- PCAP files
- pcapt
- PcapXray:一款功能强大的带有GUI的网络取证工具
- Pcapy
- pcaversaccio
- pchaigno
- PCI-DSS V3.2.1
- PCILeech
- PCjs
- pcm1k
- PCRT
- PCRT:一款自动化检测修复PNG损坏的取证工具
- PCShrink
- PC客户端(C-S架构)渗透测试
- pd0wm
- pdbpp/pdbpp
- pdelteil
- PDF Books for Download
- PDF Drive - Search and download PDF files for free.
- PDF Search
- PDF Search Engine
- PDF Search Engine - Free download PDF files
- PDF search engine - pdfyes.com
- PDF Search engine | Find public PDF documents
- PDF search engine for free scientific publications - FreeFullPDF
- PDF Search Engine, free search, PDF download
- PDF Streams Inflater
- pdfcrack
- PDFgive
- Pdfminer
- PDFSB
- PDFSR
- pditommaso/awesome-pipeline
- pdoc
- PE
- PE (Portable Executable) file parser
- PE Authenticode
- PE Compilation Timestamps vs. forensics
- PE Compression Test
- PE Detective
- PE Diminisher
- PE file features in detection of packed executables
- PE file header analysis-based packed PE file detection technique (PHAD)
- PE files and the DemoScene
- PE files and the Easy Programming Language (EPL)
- PE format - Win32 apps
- PE Hooking
- PE Resources
- PE Section names – re-visited, again
- pe_to_shellcode:将 PE 转换为 shellcode
- PE-bear
- PE-infector:将 shellcode 注入exe 文件,目前只支持32位程序
- PE-Miner: Mining structural information to detect malicious executables in realtime
- PE-Packer
- PE-Probe: Leveraging packer detection and structural information to detect malicious portable executables
- PE-Protector
- PE-sieve v0.2.1 release notes - import recovery & unpacking ASPack (part 2)
- PE-Toy
- peace-maker
- PEAL - Packed executable analysis
- Peapods Finance attack
- PEASS-ng:提权检测工具,支持 Windows 和 Linux
- PEBundle
- PeckShield Alert
- PECompact
- peda
- pedramamini
- pedrokiefer
- pedrooot
- pedroysb
- PEdump
- peekaboo:shellcode 注入和加载器的一些示例
- PeekYou
- peekyou.com
- peepdf
- Peeplo
- Peepmail
- Peerblock
- PeeringDB
- Pefeats
- PEFrame
- Pegasus_spyware
- PEiD
- PEiD (CLI)
- PEiD (yara)
- Peinject_dll-Cobalt Strike插件之另类持久化方法-PE感染
- PeLib
- pelijah
- PELock Software Protection & Reverse Engineering
- PEM
- pencilnav
- Penetration Testing and Ethical Hacking
- PENETRATION TESTING AWS STORAGE: KICKING THE S3 BUCKET
- Penetration Testing Execution Standard
- Penetration Testing Framework 0.59
- Penetration Testing in Linux
- PENETRATION TESTING PRACTICE LAB - VULNERABLE APPS / SYSTEMS
- Penetration Testing Study Notes
- Penetration Testing Tools Cheat Sheet
- Penetration Testing: A Hands-on Introduction to Hacking
- Penetration Testing: A Hands-on Introduction to Hacking
- Penetration-Testing-Grimoire/Privilege Escalation/linux.md
- penetrationt3ster
- pengjin2/derbit-volatility-visulization
- penguin-wwy
- PenguinSnail
- Penn World Table
- Penpie attack
- Pentest + Exploit dev Cheatsheet wallpaper
- Pentest Book - Privilege Escalation
- Pentest Cheat Sheets
- Pentest Compilation
- PenTest Magazine
- Pentest Tools Framework - 渗透测试工具集-适用于Linux系统
- Pentest_Interview
- pentest_lab:使用docker-compose搭建常见的几种靶机系统
- Pentest_Note-渗透Tips,总结了渗透测试常用的工具方法
- Pentest-and-Development-Tips-三好学生大佬出品的有关渗透测试和开发的小技巧
- pentest-book:渗透测试有关的脚本、信息和知识总结
- pentest-bookmarks
- pentest-note:渗透测试☞经验/思路/想法/总结/笔记
- pentest-tools.com
- pentest-wiki
- PentestDB:各种数据库的利用姿势
- Pentester Lab: SQL Injection to Shell 1
- Pentester Lab: SQL Injection to Shell 2
- PentesterLab
- Pentesting Android Apps Using Frida
- Pentesting checklists for various engagements
- Pentesting iOS Applications
- Pentesting vehicles with YACHT (Yet Another Car Hacking Tool)
- Pentesting-Active-Directory-CN:域渗透脑图中文翻译版
- PENTESTING-BIBLE
- Pentestit labs
- PentestMafia
- pentesttools-com
- Pentoo
- People Search
- People Search (Australia)
- PeopleFinders
- peoplefindThor
- peoplefindthor.dk
- PeopleSearch.net
- peopletracer.co.uk
- PEP8
- PEPack
- PePacker
- PEpper:一款针对可执行程序的开源恶意软件静态分析工具
- PeratX
- peret
- pereyra-m
- Perfare
- perfare/il2cppdumper
- Performance evaluation of Computer systems - IIT Madras
- Performance Left Right and Center
- Performing network forensics with Dshell. Part 1: Basic usage
- Performing network forensics with Dshell. Part 2: Decoder development process
- Periscope Map
- Perisearch
- Pernat1y
- PerplexityLabs.py
- Perry Castaneda Library
- Persian (Farsi)
- Persistent arbitrary code execution in Android's Google Play Core Library: details, explanation and the PoC - CVE-2020-8913
- personal-security-checklist
- Perspective
- Perth - Western Australia
- Peruggia
- pes-soft
- pesader
- PEscan
- PEShield
- PeskyPotato
- PESpin
- Pessimistic Spotter
- PetarKaleychev
- petegallagher
- PETEP
- peter279k
- PeterDaveHello
- peterpt
- PeterUpfold/dump-iphone-backup
- PEtite
- PetitPotam:强制 Windows 通过MS-EFSRPC EfsRpcOpenFileRaw同其他机器进行认证
- PETools
- PEview
- PeView:一款命令行版PE程序结构解析器
- Pew Research Center
- PExplorer
- PEzoNG
- PEzoNG: Advanced packer for automated evasion on Windows
- PEzor
- PF_RING
- PF_RING ZC (Zero Copy)
- pf2bodyfile
- pfalcon/scratchabit
- pfBlockerNG-devel
- pferreir
- pforensic
- PFQ
- pfSense
- PG-Practice
- PGBSean
- PGP and SSH keys on a Yubikey NEO (2015)
- PGP Public Key
- pgp_pubkey
- pgp_pubkey_armored
- pgrenaud
- pguizeline
- Ph/CS 219A Quantum Computation - Prof Preskill - Caltech
- Ph0tonic
- Ph33rr
- ph4ntonn
- phaeilo/vol-openvpn
- Phalanx 2 Revealed: Using Volatility to Analyze an Advanced Linux Rootkit
- Phalcon BlockSec
- Phalcon New Link
- phalcon.blocksec.com
- phanindra48
- phantinuss
- Phantom Community Playbooks
- Phantom-Evasion
- PHD CTF
- PhDuck
- Pheonix244001
- Phi-3
- Philip Wadler Haskell lecture recordings
- philipmeadows
- philippeckel
- PhilippTakacs
- Phillip Wylie | Securing APIs Through External Attack Surface Management (EASM)
- Phillipmartin
- philss
- philwhineray
- PhiRequiem
- PhishDetect
- Phishery
- Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails - Christopher Hadnagy, Michele Fincher, Robin Dreeke
- Phishing Database
- Phishing Websites Data Set
- Phishing with Unicode Domains
- Phishing-frenzy
- PhishingFrenzy
- PhishingLnk-windows钓鱼快捷方式link生成工具
- PhishStats
- PhishTank
- Phishy Domains
- phith0n
- Phlosioneer
- Phoenix Exploit Education
- phoerious
- Phone Validator
- Phone Validator (US)
- phone_dict:一个实用的特殊手机号字典
- PhoneBook
- PhoneInfoga
- Phonenumbers
- Phoneyc
- phosphore/burn
- PhotoBucket
- Photogrammetry 1 Course – 2020 - University of Bonn
- Photogrammetry Course - 2015/16 - University of Bonn, Germany
- Photogrammetry II Course 2020/21 - University of Bonn
- Photographer 1
- Photon
- photopea
- photorec
- PHP
- PHP htaccess Injection Cheat Sheet
- PHP Include And Post Exploitation
- PHP Jiami
- Php Obfuscator Encode
- php reverse shell
- PHP SSRF Techniques
- PHP Wrapper, expect & filter
- php_code_analysis:python编写的代码审计脚本(关键词匹配,类似于seay代码审计)
- php_filter_chains_oracle_exploit: A CLI to exploit parameters vulnerable to PHP filter chain error based oracle.
- Php-jpeg-injector
- PHP-Vuln:PHP漏洞靶场,涉及OWASP TOP10漏洞
- PHPAuditGuideBook:PHP代码审计入门指南
- phpencode
- PHPFuck-一款适用于php7以上版本的代码混淆
- PHPGGC:PHP 反序列化工具
- Phpmyadmin_honeypot
- phpmyadmin4.8.1后台getshell
- phpMyAdmin新姿势getshell
- PHPOK v5.3&v5.4getshell
- phpshell:php大马|php一句话
- PhpSploit
- phpstudy RCE 利用工具 windows GUI版本
- PHP代码审计分段讲解
- php文件包含漏洞
- PHP解密扩展
- phra
- Phrack Magazine
- phuck3
- Phuks
- Phylu
- Phys 1470 - Foundations of Quantum Computing and Quantum Information - U of Pittsburgh
- Physical security systems handbook
- Physical security: 150 things you should know
- Physics Informed Machine Learning by Steve Brunton
- Physics Informed Machine Learning Workshop
- Physics-informed machine learning meets engineering seminar series
- Pi-hole
- Pic2Map
- pic4xiu
- picatz
- PicCap
- Pico CTF
- PicoCTF
- picoCTF2018 Writeup之Forensics篇
- Picodash
- Picsearch
- PicTriev
- PiDense
- Pidgin
- PIE
- pielco11
- Piercing the Veil: Server Side Request Forgery to NIPRNet access
- Pierre-Gronau-ndaal
- Pierrick Brunet
- pierwill
- pig
- PikalaxALT
- pikpikcu
- Piktochart
- Piliponful
- pilotpirxie
- pilvar's challenge
- PimEyes
- Pimp
- Pin
- Pin Visual Coverage Tool for Binary Ninja
- PINCE
- PinCTF
- PINdemonium
- PinDemonium: A DBI-based generic unpacker for Windows executables
- Ping Port Number
- ping2A
- pingmeonsaturday
- Pingroupie
- PinkyPalace
- Pinterest
- pip
- pip-audit
- Pipe
- Pipeline Configuration as Code with Kotlin
- Pipl
- piquark6046
- Pitastic
- Pitch, speed, tune
- Pitch, speed, tune
- Pitfalls and Patterns in Microservice Dependency Management
- Pivoter
- PivotProject
- Pixabay
- Pixel Block
- pixel-stuck
- pixelcyber/thor
- PixelRick
- pixiewps
- Pixload
- pixrecovery
- Pixsy
- Pixxa
- piyush-security
- Pizza Bomber: The Untold Story of America's Most Shocking Bank Robbery
- pkalnai
- PkCrack
- pkgsign
- pkirkovsky
- PKlite
- Plaid CTF 2020 - Catalog
- Plane Finder
- Plane Flight Tracker
- Plane Spotter
- Planetwork-DDOS
- Planning and Integrating Deception into Computer Security Defenses
- plapczyn
- Plash: tools for least privilege
- Plasma
- plasma-disassembler/plasma
- Plaso
- Play Session Injection
- Play with ELF symbols
- Play with our Crackmes
- Play XML Entities
- Playing the blame-less game
- Playing with Cuckoo
- Playing with Delay-Loaded DLLs…
- Playing with Mach-O binaries and dyld
- Pleco
- plecost
- Plenty of Fish
- PlessioTihsrah
- Pliad CTF
- PLKplkPLK
- Plog:仅用于提取登录密码的 Mimikatz(免杀大多数 AV)
- Plot IP
- Plotly
- Pluck
- plugin
- Plugin Tutorials
- Plugins & Tools
- Plugins & Tools
- Plugins development
- Plugins Hall of Fame
- Plugins system
- PlugX: Memory Forensics Lifecycle with Volatility
- Plunkett Research
- PlusFeed
- Plyara
- pm215
- pmburu
- pmcmanaman
- PMD – An extensible multilanguage static code analyzer
- PMP - Project Management Professional
- pmusolino/wormholy
- pndyjack
- png-crc-fix
- Pngcheck
- Pngtools
- PNI
- pnpm
- POC Analysis by SungLin (Knownsec 404 Team)
- poc-collection:对 github 上公开的 PoC 进行收集的一个项目
- Poc-Exp:有关OA、中间件、框架、路由器等应用的漏洞搜集
- PoC-in-GitHub:收录 github 上公开的 POC 按照年份排列
- pocassistdb
- pocassistweb
- POChouse:POC&EXP仓库、hvv弹药库、Nday、1day
- Pocket Universe
- PocList-jar单文件版的各种poc利用工具
- PocOrExp All
- PocOrExp_in_Github:聚合Github上已有的Poc或者Exp
- pocscan:指纹识别后,进行漏洞精准扫描
- Poctra
- pocV:一个兼容xray V2 poc和nuclei的poc扫描框架
- pod.xyz
- poddav
- Poet
- poetry
- poetry installation
- PointerScanner-X
- pokeemerald.gba
- Poking Around With 2 lsass Protection Options
- pol_export
- PoLaKoSz
- polarathene
- Policy Management for Networked Systems and Applications
- Politifact
- Pollard's factorization method
- Pollard's factorization method
- Pollenisator: 具有高度可定制工具的协作渗透测试工具
- PolluxAvenger
- PolpOnline
- polybase.xyz
- PolyDEX attack
- Polygonscan
- Polymaps
- polymorf/findcrypt-yara
- Polymorphic Log4J exploit that is a valid JSON REST API request
- PolyPack: An automated online packing service for optimal antivirus evasion
- Polyswarm
- PolyUnpack
- PolyUnpack: Automating the hidden-code extraction of unpack-executing malware
- Pompa
- Pompem
- Ponce
- Ponce:一键即可实现符号执行(IDA插件)
- pongoOS
- poocoin.app
- poocoin’s rugcheck
- Poor RichFaces
- popcorn-official/popcorn-desktop
- popodog
- PoppySeedPlehzr
- Popular Android Exploits
- Popular Android Malware 2018
- Popular Android Malware 2019
- Popular Android Malware 2020
- Popular Computer Forensics Top 21 Tools [Updated for 2019]
- Popular SANS Institute & Security Videos
- Population Reference Bureau Data Finder
- porch-pirate
- Pornhub
- porolli
- Port Scanner - rang3r (Python 2.7)
- Port Scanner - Ranger Reloaded (Python 3+)
- Port scanning and banner grabbing
- Portable executable (PE)
- Portable WinDbg
- PortBender:TCP Port Redirection Utility
- porter-deployment-app
- PortEx
- Portfolio Analyzing Tools
- Portfolio Trackers List
- Portfolio Tracking Tools
- Portradar
- Ports
- Ports Scan
- Portswigger
- portswigger cheatsheet
- PortSwigger Lab: File path traversal, traversal sequences blocked with absolute path bypass
- PortSwigger Lab: File path traversal, traversal sequences stripped non-recursively
- PortSwigger Lab: File path traversal, traversal sequences stripped with superfluous URL-decode
- PortSwigger Lab: File path traversal, validation of file extension with null byte bypass
- PortSwigger Lab: File path traversal, validation of start of path
- PortSwigger Lab: Remote code execution via polyglot web shell upload
- PortSwigger Lab: Web shell upload via Content-Type restriction bypass
- PortSwigger Lab: Web shell upload via extension blacklist bypass
- PortSwigger Lab: Web shell upload via obfuscated file extension
- PortSwigger Lab: Web shell upload via path traversal
- Portswigger's lab
- PortSwigger/hackability
- Portuguese-BR
- PoshC2
- POSIX signals
- possessor-【过杀软行为检测】原理:在win10下创建一个第二桌面,模拟用户执行命令
- Possible first publication of lower/upper bypass
- Possible Hidden Shellcode
- post
- POST CATEGORY : Privilege Escalation
- Post Exploitation Hacking
- post-attack:内网渗透:远控、免杀、代理、横向,专注于打点后的内网渗透中涉及到的各类技术
- Post-Exploitation Basics
- post-hub:内网仓库:远控、提权、免杀、代理、横向、清理
- Post-mortem of October 22, 2012 AWS degradation
- PostConfluence:哥斯拉Confluence后渗透插件 MakeToken SearchPage ListAllUser AddAdminUser ListAllPage
- PostgreSQL at Scale: Database Schema Changes Without Downtime
- PostgreSQL, MongoDB, CockroachDB and MySQL databases
- Postman
- Postman Public Collections
- postmodern
- Postmortem of database outage of January 31
- Postmortem Templates
- Potato
- Potent and stealthy control flow obfuscation by stack based self-modifying code
- Potential command injection in resolv.rb
- Power-SQL
- Powercat
- PowerGrid:1.0.1
- Powermad
- PowerRemoteDesktop:通过PowerShell连接远程桌面
- PowerRunAsSystem:通过已有 system 权限进程来启动一个新的以 system 权限运行的 PowerShell 脚本
- Powershell
- PowerShell Cheat Sheet
- PowerShell Digital Forensics: PowerForensics
- Powershell Encoded Payload In Clear Text in Windows Event Log 4688
- PowerShell Logging for the Blue Team
- PowerShell loves the Blue Team
- powershell/win32-openssh
- Powershell攻击指南黑客后渗透之道系列——基础篇
- Powershell攻击指南黑客后渗透之道系列——实战篇
- Powershell攻击指南黑客后渗透之道系列——进阶利用
- PowerSploit
- PowerSploit Cheat Sheet
- PowerUp
- PowerUp Cheat Sheet
- PowerUpSQL:为攻击SQLServer而设计的具有攻击性的PowerShell脚本
- PowerView
- PowerView 2.0 Tricks
- PowerView 3.0 Tricks
- PowerView-3.0 tips and tricks
- PowerView-3.0 tips and tricks
- PowerZoom
- Pown Recon
- ppfeister
- PPLdump
- PPLDump_BOF:PPLdump项目的BOF 移植,dump 指定进程
- ppmap:go编写的XSS漏洞检测扫描工具
- ppoffice
- PPP simpleCMS writeup
- PPTHunter
- PR Newswire
- prabod
- Practical Android Phone Forensics
- Practical attacks against GSM networks: Impersonation
- Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems
- Practical attacks on machine learning: A case study on adversarial windows malware
- Practical Deanonymization Attack in Ethereum
- Practical Guide to exploiting the unquoted service path vulnerability in Windows
- Practical guide to NTLM Relaying in 2017
- Practical Instrumentation for Observability
- Practical introduction to SSL/TLS
- Practical malware analysis: The hands-on guide to dissecting malicious software
- Practical Memory Checking With Dr. Memory
- Practical Memory Forensics
- Practical Pentesting - How to do Memory Forensics with Volatility - AttackDefense Labs
- Practical Reverse Engineering
- Practical Reverse Engineering: X86, X64, Arm, Windows Kernel, Reversing Tools, and Obfuscation
- Practical Site Reliability Engineering
- Practical Web Cache Poisoning
- Practical Windows Forensics - Cheat Sheet
- practicalswift
- Pragmatic Automation
- Pragmatic Automation’ with Max Luebbe of GCP
- PraneshASP
- Prashles
- pratikpc
- Pratyaksh06
- prbhtkumr
- Pre-ATT&CK
- Pre-authentication XXE vulnerability in the Services Drupal module
- pre-commit
- pre-commit-ci
- pre-commit-ci-lite
- pre-released iblessing binary
- Preceden
- Precision Widgets of North Dakota Intrusion
- Predator OS
- PredatorCZ
- Predicta Search
- Predicting Hospital Readmission by Analyzing Patient EHR Records
- Prediction of actor collaborations using IMDB data
- Predy Finance attack
- preetkaran20
- Preflight
- Preliminary Notes on the Design of Secure Military Computer Systems
- Prelude
- Preparation
- Prepare for Meetings - Selling Intel Search Engine
- prepended credentials
- preprocessing example
- Preprocessing of binary executable files towards retargetable decompilation
- prerequisites
- presentation
- Presentation - #DFIRFIT or BUST: A Forensic Exploration of iOS Health Data (SANS DFIR Summit)
- Presentation on GCSIS 2021
- Presentation on KCon 2019
- Presentation slides
- Presentation: I Watched You Roll the Die: Unparalleled RDP Monitoring Reveal Attackers' Tradecraft
- Presentations
- Presenting at iThome’s SRE Conference: Our DBS SRE Transformation Journey Thus Far
- Presenting Volatility Foundation Volatility Framework 2.4
- Presets
- Presidential:1
- Press Reader
- PRET
- pret/pokered
- pret/pokeyellow
- Prettier
- Prevalence and impact of low-entropy packing schemes in the malware ecosystem
- Prevalent Threats Targeting Cuckoo Sandbox Detection and Our Mitigation
- Preventing DNS Rebinding Attacks
- previous
- Pri3st
- pricing
- Prime:1
- Primer
- princechaddha
- Princeton ELE539/COS512 Optimization for Machine Learning spring 2021, by Chi Jin
- Principled and Practical Web Application Security
- Principled Assuredly Trustworthy Composable Architectures
- Principles for building secure systems
- Principles of Compiler Design - IISC Bangalore
- Principles of Compiler Design - Swarthmore College
- Principles of Database Management, Bart Baesens
- Principles of Programming Languages - IIT Delhi
- print
- Print Friendly
- Print1n
- printed version via lulu.com
- printer bug
- Printer Server Bug to Domain Administrator
- PrintNightmare:CVE-2021-1675 / CVE-2021-34527 exploit
- PrintSpoofer:PrintSpoofer的反射dll实现,结合Cobalt Strike使用
- Prioritizing Trust While Creating Applications
- Prism
- Privacy
- Privacy and Security in Online Social Networks - IIT Madras
- Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information
- Privacy Badger
- Privacy policy for the extension
- Privacy Toolkit: NextDNS
- Private Certificate Authority
- Private Eye
- Private Internet Access VPN
- Private Key Project
- Privatelee
- Privazer
- PrivEsc
- PrivEsc: DLL Hijacking
- PrivEsc: Unquoted Service Path
- PrivilageEsc Linux
- Privilege bracketing
- Privilege Escalation
- Privilege Escalation & Post-Exploitation
- Privilege Escalation FTW
- Privilege Escalation Windows
- Privilege escalation: Linux
- Privilege escalation: Windows
- Privilege separation in HTML5 applications
- Privilege-Escalation
- Privilege-Escalation:提权相关知识
- PrivilegedDockerEscape
- PrivilegeHelper:cs维权插件
- Privtrans: Automatically Partitioning Programs for Privilege Separation
- PRNewswire
- Pro-Pack
- Probabilistic Graphical Models, Daphne Koller, Stanford University
- Probabilistic Graphical Models, Spring 2018 - Notre Dame
- Probabilistic Machine Learning 2020 - University of Tübingen
- Probabilistic Methods - University of Waterloo
- Probabilistic relational model benchmark generation: Principle and application
- Probability and Random Processes - IIT Kharagpur
- ProbeDroid
- ProbiusOfficial
- probonopd
- procbins
- Process
- Process Hacker Native API Headers
- Process Monitor
- Process PE Injection Basics
- process_ghosting:Windows上通过篡改内存中的可执行文件映射达到绕过杀软的行为查杀
- Process-Injection:汇总了目前可以找到的所有的进程注入的方式,完成了x86/x64下的测试
- Processes, Motivations, and Issues for Migrating to Microservices Architectures: An Empirical Investigation
- processhacker/processhacker
- ProcessHider
- Processus-Thief
- ProcMon-for-Linux
- ProcursusTeam/ldid
- ProcursusTeam/Procursus
- Procyon
- ProdigySim
- prodipta/bsoption
- Production grade PostgreSQL documentation in minutes
- Production Secret Management at Airbnb
- Production testing with dark canaries
- profihost
- Profil3r
- Profile Engine
- ProfileImageIntel
- profiles
- Profiling Ethereum users
- Profiling Network Activity with Volatility 3 - GeoIP from Memory
- PROFILING: MEASUREMENT AND ANALYSIS
- PROFILING: OPTIMISATION
- PROFILING: REAL WORLD PERFORMANCE IN LEAGUE
- PROFILING: THE CASE OF THE MISSING MILLISECONDS
- Program log4j-detector - Detects Log4J versions on your file-system within any application that are vulnerable to CVE-2021-44228 and CVE-2021-45046
- programerr01
- Programming and Data Structure - IIT Kharagpur
- Programming and Data structures (PDS) - IIT Madras
- Programming and Data Structures with Python, 2021-2022, Sem I - by Prof. Madhavan Mukund, CMI
- Programming for Designers - COMP1400-T2 (2010) - UNSW
- Programming for Robotics (ROS) - ETH Zurich
- Programming in C++ - IIT Kharagpur
- Programming Parallel Computers - Jukka Suomela
- Programming, Data structures and Algorithms - IIT Madras
- Programming, Data Structures and Algorithms in Python - IIT Madras
- Project homepage
- Project Honey Pot
- Project Page
- Project Resonance
- Project Sonar
- Project STAR*: Streamlining Our On-Call Process
- project webpage
- ProjectChampollion
- projectretroscope/retroscope
- Prometheus
- Prometheus at Prezi: replacing 10 years of anti-patterns
- Prometheus has come of age – a reflection on the development of an open-source project
- Prometheus High Availability and Fault Tolerance strategy, long term storage with VictoriaMetrics
- Prometheus: Monitoring at SoundCloud
- prompt(1) to win
- PROMT-Online
- Proof
- Proof Key for Code Exchange by OAuth Public Clients
- Proof of concept
- proofofwork.py
- Proper way of interpreting system load on a 4 core 8 thread processor
- Proposed Technical Evaluation Criteria for Trusted Computer Systems
- Proteas/apple-cve
- Protected: Malware Analysis is for the (Cuckoo) Birds
- Protected: Malware Analysis is for the (Cuckoo) Birds – Cuckoo Installation Notes for Debian
- Protecting robot endpoints against cyber-threats
- Protecting the 4G and 5G Cellular PagingProtocols against Security and Privacy Attacks
- Protection (by Lampson)
- Protection Analysis: Final Report
- Protection and the Control of Information Sharing in Multics
- PROTECTiON iD
- Protection in an information processing utility
- Protection in Operating Systems
- ProtectMyTooling
- ProtectMyTooling - Don't detect tools, detect techniques
- Protobuf inspector
- Proton Mail
- ProtonMail
- ProtonVPN
- ProTools
- Prototype pollution attack in NodeJS application
- Providing 99.9% Availability and Sub-Second Response Times with Sybase IQ Multiplexes by Using HAProxy
- prowler
- prowler-bot
- Proxmox Helper Scripts Discord server
- Proxy-Attackchain: proxylogon & proxyshell & proxyoracle & proxytoken & all exchange server vulns summarization
- ProxyAgent:在有 root 权限的手机上安装代理以方便使用 burpsuite 代理流量
- proxylogon
- Proxyman
- proxymanapp/proxyman
- ProxyNotShell-PoC:PoC for CVE-2022-41040 and CVE-2022-41082 Microsoft Exchange Server RCE
- ProxyPoolxSocks: Socks代理池服务端自动化搭建工具
- Proxyshell-auto
- Proxyshell-Exchange
- Proxyshell-poc
- proxystrike
- ProxyVulns:ProxyLogon CVE-2021-26855 & CVE-2021-27065 利用工具
- PRS Risk Indicators
- przydatek
- PS Narayanan
- PS Protector: Convert your PowerShell module into a .NET assembly DLL
- ps1337
- PS4 release: GhidraPS4Loader and Playstation 4 Flash tool
- PScout
- psenough
- psexec_start.png
- pshem
- psifertex
- psiinon
- PSKernel-Primitives
- psl_domain_from_dns_name
- PSSW100AVB:bypass AV 的 PowerShell 脚本
- pstirparo/mac4n6
- psychonic
- PsypherPunk
- psyray
- ptalmeida
- PTF
- ptgott
- ptoomey3/keychain-dumper
- ptrarchive.com
- Public APIs
- Public Email Records
- Public pentesting reports
- Public Security Log Sharing Site
- Public topic of SlowMist HackingTime
- Public-Key Cryptography and PKI Lab
- publicarray
- publicrecords.searchsystems.net
- PublicWWW
- Publish your module
- Publish your repo
- PubMed
- puchy22
- puckel
- pudo
- pudsec
- pug-plugin-trusted-types
- Pull Request
- pull request checklist
- Pullpush
- Pulse Connect Secure – RCE via Template Injection (CVE-2020-8243)
- Pulse Connect Secure RCE CVE-2020-8218
- pulse-gosecure-rce-Tool to test for existence of CVE-2020-8218
- Pulse-secure-read-passwd-to-rce
- PulseDive
- pulsedive.com
- PumpkinFestival
- PumpkinGarden
- PumpkinRaising
- PUNCIA — The Panthera(P.)uncia of Cybersecurity
- PUNCIA — The Panthera(P.)uncia of Cybersecurity
- Puneeth Y @puneeth072003
- puneeth072003
- PunGrumpy
- puppeteer/examples
- Purdue ECE302 Introduction to Probability for Data Science
- Purdue ME 597 Distributed Energy Resources Spring 2024, by Kevin J. Kircher
- Purdue University CHE 597 Computational Optimization spring 2025, by Can Li
- pure-python-adb
- puredns-子域爆破工具
- purefi.io
- Purple Fox Exploit Kit Activity - Landing Page and Other Artifacts
- purple-WL
- PurpleAir
- PurplePanda
- PurpleTeam
- Purposefully Insecure and Vulnerable Android Application (PIIVA)
- purrpurrn
- push0ebp/sig-database
- Pushing through Friction
- PUSHING WEBKIT'S BUTTONS WITH A MOBILE PWN2OWN EXPLOIT
- PushkraJ99
- Pushover
- pushplus
- Pushshift API
- pussycat0x
- Putting Sysmon v9.0 AND/OR Grouping Logic to the Test
- puzhuoliu
- PuzzleMall
- pvdl
- PWA Builder
- pwcrack-framework:是一个用Ruby编写的密码自动破解框架,目前提供了 25 个在线破解和 25 个离线破解接口,支持 48 种算法破解
- pwd query
- PwdBUD:一款SRC密码生成工具,尝试top字典无果后,可以根据域名、公司名等因素来生成特定的字典
- PWF intro videos on YouTube
- pWhois server
- PWK Syllabus
- PWN Challenge
- pwn dojo
- pwn notes
- pwn.college
- pwn.college
- pwn20wndstuff/undecimus
- Pwn2Own: content: scheme allows cross-origin info leaks
- pwnable.kr
- Pwnable.kr
- pwnable.tw
- Pwnable.tw
- pwnable.xyz
- Pwnable.xyz
- PwnAdventure
- pwnagentsmith/ir_tool
- pwnat
- Pwnbin
- pwncat:功能强大的反向Shell&BindShell处理工具
- pwndb
- pwndbg
- PwnDoc
- Pwned-1
- PwnedOrNot
- Pwnfest 2016 meta bug
- PwnFunction
- pwngitmanager
- PWNJUTSU - Academic Paper
- PWNJUTSU - Website
- PwnLab
- pwnllc
- pwnmeow
- pWnOS -1.0
- pWnOS -2.0
- PwnSTAR
- pwntester
- pwntools
- pwntools writeups
- Pwntools之DynELF原理探究
- PwnWiki
- PwnWiki-免费、自由、人人可编辑的漏洞库
- pxbn
- pxp928
- pxplan:lv sec收集归纳的POC
- pyasyncore
- Pybeacon
- Pybelt
- PyBFD
- pybluez
- PyBozoCrack
- PyC2:通过python实现的简易版c2
- PyChallFactory
- PyCryptodome
- pydictor
- PyEMU
- Pyethapp
- Pyew
- Pyfiscan
- PyFunceble
- pygreynoise
- pyhttpx:基于socket开发的一个网络测试库,供研究https/tls参考
- pyinotify >= 0.8.3
- pyinstxtractor-ng
- pyinstxtractor-web
- pyintelowl
- pyllyukko
- Pynids
- PyPackerDetect
- PyPackerDetect (refactored)
- Pypcap
- PyPDF2
- PyPeid
- PyPI package author of atomicwrites deletes his own code
- Pyprotect
- pypykatz-通过python3实现完整的Mimikatz功能(python3.6+)
- pyrdp-RDP中间人攻击工具
- Pyrebox
- Pyrit
- Pyshell
- pySigma
- pysim
- Pysis868
- Pytbull
- pytest
- Pythia attack
- Python
- Python >= 3.5
- Python 3
- Python and machine learning - Stanford Crowd Course Initiative
- Python API
- Python Boot Camp Fall 2016 - Berkeley Institute for Data Science (BIDS)
- Python Cheat Sheet
- Python Cheat Sheet #1
- Python Cheat Sheet #2
- Python Data Science with the TCLab
- Python Digital Forensics Cookbook
- Python Examples
- Python for Reverse Engineering #1: ELF Binaries
- Python for Security Professionals
- Python package 钓鱼
- Python SDK
- Python Security
- Python utility
- Python-100-Days
- Python-AFL
- Python-CAN
- python-codext:Python 编码/解码库, 扩展了原生的 codecs 库, 提供 120 多个新编解码器
- python-evt
- python-msgpack
- python-ntfs
- Python-OBD
- Python-ptrace
- python-shellcode-loader:python免杀shellcode加载器 加密混淆
- python-systemd package
- Python2 support was
- Python2-Reverse-Shell-Backdoor:使用 Python2的 socket 制作的反向后门
- Python2编写的struts2漏洞全版本检测和利用工具-来自奇安信大佬Lucifer1993
- Python3
- python3-source-code-analysis
- PythonCoderAS
- PythonHacker24
- Python工具分析风险数据
- pytorch/glow
- pyup-bot
- PyWinSandbox
- pyxswf
- QARK
- qax-a-team/eventcleaner
- qazbnm456/awesome-cve-poc
- qb-auto
- QBDI – QuarkslaB Dynamic binary Instrumentation
- QBDI 0.7.0
- qbdi/qbdi
- QBot Open directory w/ Access to Proxy Scripts, .HTACCESS File
- qcma
- QCSniper - A tool For capture 2g-4g air traffic using qualcomm phones
- QEMU
- QEMU Apple Branch
- Qemu-vm-escape
- QGIS
- Qi Wireless Charging
- qiangxuhui
- qidanrui
- qiew
- qihoo360/phptrace
- qihoo360/replugin
- Qiling
- QingScan:一个批量漏洞挖掘工具,黏合各种好用的扫描器
- Qira
- QLD
- QLD - Right to Information Act 2009
- QLD Traffic Cameras
- QlikView
- qlue.io
- qPublic
- QQ 正在尝试读取你的浏览记录
- qq-tim-elevation: 腾讯 QQ/TIM本地提权漏洞
- qqux
- QR Code Jacking
- QResear.ch
- QRLJacking
- Qrobe
- qrt tweets
- QScripts – IDA Scripting productivity tool
- qsocks:基于 quic 的 socks5代理工具
- QSynthesis
- Qt C++ radare2 GUI: Cutter
- Qt5漏洞导致Cisco WebEx和Malwarebytes反病毒产品可远程加载任意DLL
- qtc-de
- qtox/qtox
- quack1
- quad
- Quadrigram
- quake
- Qualitative and quantitative evaluation of software packers
- Qualys Vulnerability Management
- Qualys Web Applications
- quantaxis/quantaxis
- Quantcast
- quantika14/guasap-whatsapp-foresincs-tool
- Quantitative Big Imaging 2019 ETH Zurich
- Quantitative Finance - IIT Kanpur
- quantopian/qdb
- Quantum Computation and Information at CMU
- Quantum Computer Systems – UChicago
- Quantum Computing
- Quantum Computing by Prof. Debabrata Goswami
- Quantum Computing for Everyone -- Part 1
- Quantum computing for the determined - Michael Nielsen
- Quantum Computing Hardware and Architecture (EE274 SJSU)
- Quantum Cryptography - TU Delft
- Quantum Information and Computing by Prof. D.K. Ghosh
- Quantum Machine Learning | 2021 Qiskit Global Summer School
- Quantum Mechanics and Quantum Computation - Umesh Vazirani
- Quantum Physics for Non-Physicists 2021 - ETH Zurich
- Quaoar
- QuarkslaB Dynamic binary Instrumentation: QBDI
- Quasar version 1.3.0
- Quasar: 经典Windows远控软件
- QuasarRAT
- Quazz
- Qubes
- Qubes OS
- Queensland Corrective Services
- Queensland Government Job Search
- Queensland Police Force
- Queensland Roads
- QueenSono: 使用 ICMP 协议进行数据渗透
- quentinhardy
- Query multiple Windows event logs with PowerShell
- Query parameter reordering causes redirect page to render unsafe URL
- Queryfeed
- Querying events
- Question marks showing in ls of directory. IO errors too.
- Quetzal Search
- Quick Forensic Challenge
- Quick linux kernel with gdb setup with little help from Linux distros
- Quick Sprout
- Quick Start
- Quick Tipp: Eine Datenbank Struktur verstehen mit Hilfe von schemaspy
- Quick Unpack
- Quick Volatility overview and R.E. analysis of Win32.Chebri
- QuickCode
- Quickly Create Visual Stunning Blockchain Data Graphs and Charts in JavaScript
- QuickMaps
- Quickstart
- QuickSwap Lend attack
- QuillCheck
- Quiltflower
- quiltflower:强调反编译后的代码质量和准确的现代 JAVA 反编译器
- Quim Montal (@qmontal)
- quininer
- quinnr
- QuipQuip
- Quixxi
- QuJing(曲境)-曲境是一个xposed模块,可实现在PC浏览器上动态监控(hook)函数调用和查看堆栈信息,及反射调用(invoke)等功能
- Quora
- Quser-BOF:Cobalt Strike BOF for quser.exe implementation using Windows API
- qux-bbb
- Qwant
- qwant.com
- qwb_2019_crypto_copperstudy
- qwb_2019_smarthacker
- qwb_2019_supersqli
- qwb_2019_upload
- Qwen-72B-Chat
- Qwen1.5-110B-Chat
- Qwen1.5-32B-Chat
- Qwen1.5-MoE-A2.7B-Chat
- Qwen2-0.5B-Instruct
- Qwen2-1.5B-Instruct
- Qwen2-57B-A14B-Instruct
- Qwen2-72B-Instruct
- Qwen2-7B-Instruct
- Qwen2.5-0.5B-Instruct
- Qwen2.5-1.5B-Instruct
- Qwen2.5-14B-Instruct
- Qwen2.5-32B-Instruct
- Qwen2.5-3B-Instruct
- Qwen2.5-72B-Instruct
- Qwen2.5-7B-Instruct
- Qwen2.5-Coder-1.5B-Instruct
- Qwen2.5-Coder-14B-Instruct
- Qwen2.5-Coder-32B-Instruct
- Qwen2.5-Coder-7B-Instruct
- qwerty472123
- Qwertyoruiopz Attacking XNU: Part 1
- Qwertyoruiopz Attacking XNU: Part 2
- Qzone
- Qzone (China)
- r-jenish
- r-tx
- r/TelegramChannels
- r/TelegramGroups
- R0 Virtual Vegas: Malware Unpacking
- r00t7131
- r00tdaemon
- R00tS3c
- r0capture-安卓应用层抓包通杀脚本
- r0ck3rt
- r0tracer-安卓Java层多功能追踪脚本
- r12f
- r2-dirtycow
- r2con2018 - Cutter by @xarkes
- r2dec
- r2diaphora
- r2ghidra
- R2M2
- R2MSDN
- r2papi
- r2pipe
- r2poke
- r2sarif
- r2yara
- R3CTF 2024: Organized by r3kapig
- r3k2
- R3nzTheCodeGOD
- r4v3zn
- rabbithole: 一个完全使用Rust编写的代理池工具,从网络搜索socks5代理,检测可用性之后开启socks5代理服务
- rabbitstack/fibratus
- RABCDAsm
- RabR:Redis-Attack By Replication (通过主从复制攻击Redis)
- Raccoon
- Raccoon stealer drops crypto-currency miner
- Raccoon stealer w/ CnC check-in
- Race-Condition Vulnerability Lab
- Rack Cookies and Commands injection
- rad4day
- rad9800
- Radamsa-android
- Radar Box
- radare
- radare2
- Radare2 — Keep It Or Leave It?
- Radare2 Community Survey Results
- Radare2 for RE CTF
- Radare2 Summer of Code 2019 Selection Results
- Radare2-bindings
- Radare2, IDA Pro, and Binary ninja, a metaphoric comparison
- Radare2:一款类Unix命令行逆向安全框架
- radareorg/cutter
- radareorg/r2dec-js
- radareorg/radare2book
- radareorg/radeco
- Radaris
- Radaris Phone Lookup
- RADb
- raddle.me
- Radio Reference
- radius2
- radoen
- Rafał Kasa
- rafaveira3
- RahoolKumar
- rahul2393
- RahulK4102
- RAID
- raildar.fr/#lat=46.810&lng=6.880&zoom=6
- Rails Security - First part
- Rails SQL Injection
- Rails Web Console
- RainbowDashy
- raindrop213
- rainers/cv2pdb
- rainwayapp/warden
- Rajkosto
- rakshasa: 基于go编写的跨平台、稳定、隐秘的多级代理内网穿透工具
- ralphje/imagemounter
- Ram Capturer
- RamadhanAmizudin/malware
- RamanaReddy0M
- RAMBO: Run-Time packer analysis with multiple branch observation
- Ramen EVM
- ramimac
- raminfp
- ramizpolic
- rammanokar
- Rana Khalil
- Randark-JMT
- Random Address Generator
- Random Davis
- Random User Generator
- random-robbie
- randomaccess3
- randomaccess3/4n6_stuff
- RandomRobbieBF
- randomsctf/ctf-scripts
- ranemirusG
- Rangi42
- RANK VASA
- ranlo
- Ransomware analysis with Volatility
- Ransomware Tracker
- Raoul1996
- Raphael
- Raphael Mudge
- raphaelbarbosaqwerty
- raphaelsc
- Rapid Attack Infrastructure
- Rapid7
- RapidAPI
- RapidEXE
- RapidGators Search
- rareguy
- Rari Capital attack
- Rarvmtools
- rasp-vuln:rasp靶场
- RastaLabs
- rate limit
- rate-limiter-flexible
- rated.network
- ratelimit_throttle
- rathole:一个用 rust 编写,功能类似 FRP 和 NGROK的内网代理穿透工具
- RatinCN
- Ratproxy
- Raven
- Raven:2
- ravicious
- raviksharma
- RAW
- raw hosts file Unified hosts file with base extensions
- RawCopy
- Rawmi-21
- Rawsec's CyberSecurity Inventory
- Ray Tracing for Global Illumination, UCDavis
- raykle
- RayofLightz
- raz0r black
- Raztor0
- Razzer
- rb-x
- rbacr: 针对kubernetes中的RBAC可能被攻击检测工具
- rbadguy
- rbairwell
- rbcrwd
- rbenv
- rbiasini
- rbs-afflitto
- rbs-jacob
- rbsec
- rc0r
- RC4-Python
- RCE
- RCE Lab
- rcordovano
- RCTF 2019 - nextphp
- rcutmore
- rdbo
- rdesktop
- RDG Packer Detector
- RDMC
- RDP Event Log Forensics
- RDP Logon / Logoff events 1
- RDP Logon / Logoff events 2
- RDP 登录日志取证与清除
- RDP_Backdoor
- RDPHijack-BOF:适用于 CS使用的通过WinStationConnect API 来劫持 RDP会话
- RdpThief-从远程桌面客户端提取明文凭据辅助工具
- rdpy
- RDS数据库攻防
- rdxbubble
- RDxR10
- rdzhaafar
- re7gog
- reach out to us through our website
- Reach the root! How to gain privileges in Linux?
- Reacher
- Reacher.email
- ReactiveOps - Zero to SRE
- reactor.chainalysis.com
- Read a file line by line assigning the value to a variable
- Read how CrowdSec curates the Community Blocklist
- Read more.
- Read more...
- Read this article about being an on-chain sleuth
- Read what threat intelligence is shared with CrowdSec
- ReaderGRAM
- Readfile_BoF:read file contents to beacon output
- Reading data from stdin
- README translations
- ReadTheDocs
- readthedocs/sphinx_rtd_theme
- ReagentX
- Real ORNL Automotive Dynamometer (ROAD) CAN Intrusion Dataset
- Real Time systems - IIT Karaghpur
- Real Time Systems - IIT Kharagpur
- Real user performance monitoring at Netflix scale ‐ Martin Spier
- Real World CTF 4th - Hack into Skynet
- Real World CTF 4th - RWDN
- real-time flight tracking | Flightadsb | VariFlight
- Real-world JS - 1
- Real-World SRE
- Realease
- Realestate Australia
- realgam3
- Realising the Potential for ML from Electronic Health Records
- Realizing Windows Memory Forensics with Volatility and Gimp
- realor-sql-Injection-exp: 瑞友天翼应用虚拟化-远程代码执行/sql注入
- Realtime Fastly logs with Grafana Loki for under $1 a day
- RealWorld CTF 3rd - MoP2021
- ream88
- reapoc:开源POC的收集和漏洞验证环境
- Reaver
- reaver-wps-fork-t6x
- rebane2001
- rebelice
- rebeyond-Mode:修改版冰蝎
- rebuild.gif
- rebuild.gif
- Recaf: Java字节码编辑器
- RECAP
- Receiving notifications
- Recent updates by the author
- RecieveSMS
- Recipe for Root
- Recon
- Recon with Me !!!
- recon-ng
- ReconCobra
- ReconDog
- reconftw:reconFTW 是一种工具,旨在通过运行最好的工具集来执行扫描和查找漏洞,对目标域执行自动侦察
- ReconSpider Banner
- ReconSpider(For All Scanning)
- records
- RecordTypes
- recovering-passwords-from-pixelized-screenshots-sipke-mellema
- Recpe riScope
- Recreating An iOS 0-Day Jailbreak Out Of Apple's Security Updates
- RecruitEm
- Recruitin
- RecuperaBit
- RecurseBuster
- RecursiveForest
- recvfrom
- Red Baron
- Red Hat Enterprise Linux 4: Security Guide - Common Ports
- Red Hat Enterprise Linux 7 Security Technical Implementation Guide (STIG)
- Red Hat Security Advisories
- RED HAWK (All In One Scanning)
- Red Pitaya
- Red Team Infrastructure Wiki
- Red Team Tales 0x01: From MSSQL to RCE
- Red Team 视角的信息收集技术
- Red Teaming for Cloud
- Red Team从0到1的实践与思考
- red-team-and-the-next
- Red-Teaming-TTPs:红蓝队技巧
- redaelli/imago-forensics
- REDARCS
- redasmorg/redasm
- Redcloud
- Reddit
- Reddit Archive
- Reddit Comment Lookup
- Reddit Comment Search
- Reddit Investigator
- Reddit Metrics
- Reddit Search
- Reddit Security CTF
- Reddit Suite
- Reddit User Analyser
- reddit.com
- Reddit/AskNetsec
- Reddit/hacking
- Reddit/HowToHack
- Reddit/r/translator
- Redditlist
- RedditMetis
- Redective
- Redexer
- redfast00
- RedGhost
- RedGuard:一款C2设施前置流量控制技术的衍生作品
- RedHunt Labs
- RedHunt Labs Attack Surface Recon API
- redirect
- Redirect all possible DNS queries to host
- Redirect Explorer
- RedirectDetective
- Redirection on Apache (Maintain POST params)
- Redis 4.x/5.x RCE(主从复制导致RCE)
- Redis diskless replication: What, how, why and the caveats
- Redis on Windows 出网利用探索
- Redis Security
- redis-rce:redis主从复制rce的go版本,可独立编译使用【支持执行命令+上传文件】
- redis-rogue-server-Redis 4.x/5.x RCE
- RedisEXP: Redis 漏洞利用工具
- RedisEXP:Redis 漏洞利用工具
- RedisWriteFile-通过 Redis 主从写出无损文件,可用于 Windows 平台下写出无损的 EXE、DLL、 LNK 和 Linux 下的 OS 等二进制文件
- Redis主从利用ppt
- redleavesscan
- Redline
- rednaga/apkid
- redoctober
- RedPacket Security
- RedPwn CTF 2019 - Blueprint
- redr0n19
- RedRabbit - Red Team PowerShell脚本
- redsand
- redteam_vul-红队作战中比较常遇到的一些重点系统漏洞整理
- RedTeamNotes:红对笔记,记录日常红对项目遇到的问题以及解决方案
- Reducing flaky builds by 18x
- Reducing Incident Escalations at Basecamp
- Reducing TCB Complexity for Security-Sensitive Applications: Three Case Studies
- reduckted
- RedWarden:灵活的配置C2反向代理来隐藏自己的CS
- RedworkDE
- Reed
- Reed (UK)
- Reeder
- reedloden
- reetasingh
- ref
- ref_fuzz
- refdesk
- Reference
- References
- referrers API endpoint
- refirmlabs/binwalk
- Reflect.tech
- Reflected File Download (RFD)
- Reflections on Trusting Trust
- Reflective Dll Injection - Any Way to check If a process is already injected?
- Reflective DLL Injection - AV detects at runtime
- ReflectiveSOInjection:反射 SO 注入是一种库注入技术,其中采用反射编程的概念将库从内存加载到主机进程中
- reFlutter:辅助逆向Flutter生成的APP
- REFORM: A framework for malware packer analysis using information theory and statistical methods
- RefractionSplash
- regdump
- regex_find
- regex_find_all
- Regexp Security Cheat Sheet
- register vulnerability
- registergoofy
- Registry Dumper
- Registry Viewer®
- Registry-Recon:绕过 EDR/AV等防护设备进行信息搜集的 CS 插件
- Registryfinder
- RegRipper and Volatility Prototype
- RegRipper2.8
- RegRipper3.0
- regular backups
- Regularization Methods for Machine Learning 2016
- regview
- Rehold
- Reinforcement Learning - Fall 2021 chandar-lab
- Reinforcement Learning - IIT Madras
- Reinforcement Learning - UCL
- REINFORCEMENT LEARNING AND OPTIMAL CONTROL - Dimitri P. Bertsekas, ASU
- Reinforcement Learning Course at ASU, Spring 2022
- Reinforcement Learning Course at KTH (FDD3359 - 2022)
- Reinforcement Learning Course by Frédéric Godin - Concordia University
- Reisyukaku
- Rejah Rehim
- rek7/fireelf
- Rekall
- Rekall Agent Alpha launch
- Rekall Memory Forensic Framework
- Rekall Memory Forensics
- Rekall The Memory Forensic Framework
- Rekt.News
- rekter0
- related-domains
- RelatedTitle
- Relational database access controls
- Relations
- Relative-url-extractor
- relaxedricky
- relaxnow
- release
- release file
- Release History
- Release of Glibc Heap Analysis Plugins for Rekall
- Released V0.7.0 | A set of significant upgrades
- Releases
- releases page
- Releasing the World's Largest Python Site Every 7 Minutes
- Relevant: 1
- Reliability engineering for some of top 10 sites in Scandinavia
- Reliable Data for Large ML Models: Principles and Practices
- Reliable load testing with regards to unexpected nuances
- relud
- RemakingEden
- REMATH Reverse Engineering
- RemCom
- Remcos
- REMINDer
- Remix VSC
- REMnux
- remonsec
- Remot3d
- Remote Attack Surface
- Remote Code Execution on a Facebook server
- Remote Compromise of an Unaltered Passenger Vehicle (aka The Jeep Hack), 2015
- Remote Desktop Gateway RCE bugs CVE-2020-0609 & CVE-2020-0610
- Remote DNS Attack Lab
- Remote DNS Lookup
- Remote Exploitation of an Unaltered Passenger Vehicle
- Remote Exploitation of Honda Cars
- Remote File Inclusion (RFI)
- Remote Potato
- Remote_ShellcodeLoader:远程shellcode加载&权限维持+小功能
- remote-method-guesser
- Remotely Compromising Android and iOS via a Bug in Broadcom's Wi-Fi Chipsets
- Remotely Compromising iOS via Wi-Fi and Escaping the Sandbox
- RemotePotato0:Windows 提权工具,从普通用户提前至域管理员
- RemoteRecon
- Remove Background
- RemTeam攻击技巧和安全防御
- remyabel
- remz1337
- RenanSouza2
- Rendering / Ray Tracing Course, SS 2015 - TU Wien
- renehamburger
- rengine.wiki
- Renovate
- renovate-bot
- Renovo
- Renovo: A hidden code extractor for packed executables
- Rentry
- renxin-bling
- renzhexigua
- reox
- Rep Digger
- RePEconstruct: Reconstructing binaries with self-modifying code and import address table destruction
- RePEF — A system for restoring packed executable file for malware analysis
- Repl
- Replacing Intel or x86 chips for security reasons
- Replay:1
- repo-supervisor
- repo.or.cz
- Report bugs & add issues
- Report on Statistical Disclosure Limitation Methodology
- Report Tree
- Report_Public-DVPNET 公开漏洞知识库
- Reporting bugs/ideas
- reporting-api
- Reportivo
- RepoSearch
- reproducible builds
- Request Bin
- requests
- Requirements
- Requirements for Internet Hosts -- Communication Layers ( rfc1122 )
- requires
- RERP
- Resavr
- Rescure
- REScure Threat Intel Feed
- ReseacherID
- Research and implementation of compression shell unpacking technology for PE file
- Research and implementation of packing technology for PE files
- Research Case Study: Supply Chain Security at Scale – Insights into NPM Account Takeovers
- Research Data Australia
- Research Gate
- Research of software information hiding algorithm based on packing technology
- Research Tools
- Researchers tackle autonomous vehicle security
- reservoir.tools
- reset password attack
- Reset.org
- ReSharper
- Resilience Engineering at LinkedIn with Project Waterbear
- Resilience Engineering Mythbusting
- Resiliency and Disaster Recovery with Kafka
- Resiliency Planning for High-Traffic Events
- Resolute
- resolve an issue
- Resolver
- resource
- resource collection of python security and code review
- RESOURCE-BASED CONSTRAINED DELEGATION ABUSE
- ResourceHacker
- resourcepolicy.fyi
- Resources
- Resources-for-Application-Security
- ResourcesExtract
- Responder
- Response
- REST API
- RestCountries
- restic
- Restricted Linux Shell Escaping Techniques
- restricted to the developer's certificate
- Results are in for the 1st Annual Volatility Framework Plugin Contest!
- Results from the (5th Annual) 2017 Volatility Plugin Contest are in!
- Results from the 2015 Volatility Plugin Contest are in!
- Results from the 2016 Volatility Plugin Contest are in!
- Results from the 2018 Volatility Contests are in!
- Results from the 2019 Volatility Contests are in!
- Resurrect Pages
- ret2got/disasm.pro
- ret2libc
- RetDec
- Rethinking site capacity projections with Capacity Analyzer
- retire.js
- retroplasma/earth-reverse-engineering
- retroplasma/flyover-reverse-engineering
- Retrowrite
- return
- Return-to-libc Attack Lab
- return42
- ReturnGate:绕过 EDR 获取 sysid 来达到免杀
- Reunion
- Reuters
- revanced-bot
- Reveal My Name
- Revealed: Microsoft Contractors Are Listening to Some Skype Calls
- Revealing packed malware
- Revelo
- Reverse
- Reverse Engineered Bard CHAT API by Google
- Reverse Engineered Bing CHAT API by Microsoft
- Reverse Engineered ChatGPT API by OpenAI
- Reverse Engineered HUGGING CHAT API by HuggingFace
- Reverse Engineering
- Reverse Engineering a new Actuation Message
- Reverse Engineering C++ Malware With IDA Pro
- Reverse Engineering C++ Malware With IDA Pro: Classes, Constructors, and Structs
- Reverse Engineering for Beginners
- Reverse Engineering Hacking and Cracking
- Reverse Engineering iOS Applications
- Reverse Engineering iOS Mobile Apps
- Reverse Engineering macOS blog
- Reverse Engineering Malware
- Reverse Engineering Malware, Part 3: IDA Pro Introduction
- Reverse Engineering Malware, Part 5: OllyDbg Basics
- Reverse engineering malware: Binary obfuscation and protection
- Reverse engineering of the Nitro OBD2
- Reverse Engineering Resources
- Reverse engineering self-modifying code: Unpacker extraction
- Reverse Engineering Swift Apps
- Reverse Engineering the iOS Simulator’s SpringBoard
- Reverse engineering with #Ghidra: Breaking an embedded firmware encryption scheme
- Reverse Genie (License Plate Search)
- Reverse Image
- Reverse Image Search
- Reverse Phone Check
- Reverse Phone Lookup
- Reverse Phone Lookup | Phone Number Search - Spokeo
- Reverse Shell Cheat Sheet
- Reverse Shell Cheat Sheet #1
- Reverse Shell Cheat Sheet #2
- Reverse Shell Generator
- Reverse Taint Analysis Using Binary Ninja
- Reverse-engineer and Clone a Remote Control
- Reverse-engineering a 433MHz Remote-controlled Power Socket for use with Arduino
- Reverse-engineering Weather Station RF Signals
- Reverse-engineering Wireless Blinds
- reverse-interview
- reverse-shell
- reverse-shell-generator:各种反弹 shell 格式在线生成
- ReverseAPK
- ReverseEngineering Challenges
- ReverseRDP_RCE:反向 RCE 连接 RDP 的客户端
- reverseShellList:快速生成反弹shell payload
- Reversing C code with IDA part I
- Reversing C code with IDA part II
- Reversing C code with IDA part III
- Reversing C code with IDA part IV
- Reversing C code with IDA part V
- Reversing Objective-C Binaries With the REobjc Module for IDA Pro
- Reversing small crackme w/ GDB-Peda
- Reversing WannaCry Part 1 - Finding the killswitch and unpacking the malware in #Ghidra
- REVERSING WITH IDA FROM SCRATCH (P10)
- REVERSING WITH IDA FROM SCRATCH (P11)
- REVERSING WITH IDA FROM SCRATCH (P12)
- REVERSING WITH IDA FROM SCRATCH (P13)
- REVERSING WITH IDA FROM SCRATCH (P14)
- REVERSING WITH IDA FROM SCRATCH (P15)
- REVERSING WITH IDA FROM SCRATCH (P16)
- REVERSING WITH IDA FROM SCRATCH (P17)
- REVERSING WITH IDA FROM SCRATCH (P18)
- REVERSING WITH IDA FROM SCRATCH (P19)
- REVERSING WITH IDA FROM SCRATCH (P20)
- REVERSING WITH IDA FROM SCRATCH (P21)
- REVERSING WITH IDA FROM SCRATCH (P23)
- REVERSING WITH IDA FROM SCRATCH (P24)
- REVERSING WITH IDA FROM SCRATCH (P25)
- REVERSING WITH IDA FROM SCRATCH (P26)
- REVERSING WITH IDA FROM SCRATCH (P27)
- REVERSING WITH IDA FROM SCRATCH (P5)
- REVERSING WITH IDA FROM SCRATCH (P6)
- REVERSING WITH IDA FROM SCRATCH (P7)
- REVERSING WITH IDA FROM SCRATCH (P8)
- REVERSING WITH IDA FROM SCRATCH (P9)
- reversing.kr
- Reversing.kr
- Reverso
- Revest Finance attack
- RevEye
- Revimg
- Revocation certificates
- Revoke.cash
- RevoSucks
- revp:反向HTTP代理,支持Linux,Windows和macOS
- rexdf/commandtrayhost
- rezadtech
- rezasp
- ReZeroBypassAV:从零开始学免杀
- RF Exploitation: IoT/OT Hacking with SDR
- rfas:让FRP以Windows服务运行
- RFC 5280
- RFC 7230
- RFC-1035 - DNS
- RFC-1464 - TXT Records
- RFC-6265 - Coolies
- RFC-6376 - DKIM
- RFC-7208 - SPF
- RFC-7231 Section 7 - Headers
- RFC-7489 - DMARC
- RFC-791 Internet Protocol
- RFC-8446 - TLS
- RFC-9116 History
- RFC-9116 Proposal
- RFC-9309 - Robots Exclusion Protocol
- RFC1928
- RFC6979
- RFI 绕过 URL 包含限制 getshell
- RFSec-ToolKit
- rgayon
- rgerman
- rgmz
- rgxgr
- Rhadamanthys | OALabs Research
- rhaidiz
- RHEL7
- rhelmot
- rhiaro
- rhtenhove
- ricardojba
- RiccardoBonafede
- ricekot
- richard-julien
- richardnpaul
- RichardWessels
- richardwesthaver
- richwrightnyc
- Rick M @kingthorin
- Rick Mitchell
- rick-slin
- RickdeJager
- RickdiculouslyEasy
- rickmark/apple_net_recovery
- rickmark/apple_utdm
- rickmark/awdd_decode
- rickmark/isafety
- rickmark/libibackup
- rickmark/macvdmtool
- rickmark/yolo_dsc
- rickyzhang82/tethering
- Riddler
- ridenum
- Rifiuti2
- Rig EK, unalbe to obtain payload(s)
- Riggs333
- Right To Know
- RIME
- ring04h#s5.go
- Ringzer0Team
- Rio
- Riot Games 热门新作《Valorant》安装了 rootkit 去防止作弊
- Riot Games: Evolution of Observability at the Gaming Company
- RIPE IPmap
- RIPEstat
- RIPEStat RPKI validation API
- ripgen:根据子域名生成新的相关子域名
- riposte
- RIPS Technologies
- Rising from the Ashes
- Risk and Error Budgets’ with Seth Vargo and Liz Fong-Jones of Google
- Risk Management Framework
- riskscanner:开源的多云安全合规扫描平台,基于 Cloud Custodian 和 Nuclei 引擎,实现对主流公(私)有云资源的安全合规扫描和漏洞扫描
- rissson
- RistBS
- riswandans
- RitamDey
- RiteTag
- ritikchaddha
- Rival IQ
- riza
- Rizin
- rizzo
- RJCrush
- rjsu26
- rl1987
- RLPack
- rly0nheart
- rm on a directory with millions of files
- RMI-Memory:rmi打内存马工具,适用于目标用不了ldap的情况
- RMIScout: Java RMI爆破工具
- rmishra-ror
- rng70
- rnr3007
- roaree
- RoARene317
- ROB 101: Computational Linear Algebra - University of Michigan
- ROB 102: Introduction to AI and Programming - University of Michigan
- ROB 311: How to Build Robots and Make Them Move - University of Michigan
- ROB 320: Robot Operating Systems - University of Michigan
- ROB 501: Mathematics for Robotics - University of Michigan
- ROB 530 MOBILE ROBOTICS at U of Michigan - WINTER 2022 -- Instructor: Maani Ghaffari
- Rob2n
- Robert Anderson - US Interrogation Techniques and Social Engineering
- Robert Scheck
- robert-cronin
- robinson
- robiot
- roblabla
- robly78746
- robocoder
- Robot hacks
- Robot Mapping - WS 2018/19 - Universität Freiburg
- Robot Mechanics and Control, SNU
- Robotics - IIT Bombay
- Robotics 1, Prof. De Luca, Università di Roma
- Robotics 2, Prof. De Luca, Università di Roma
- Robotics and Control: Theory and Practice IIT Roorkee
- Robotics by Prof. D K Pratihar - IIT Kharagpur
- Robotics Fall 2020 - UIC
- Robotics: Basics and Selected Advanced - IISC Bangalore
- Robots and Privacy
- Robots That Learn - UC Berkeley CS 294-277
- Robots.txt - wiki
- Robtex
- Robtex DNS Lookup
- Robust static analysis of portable executable malware
- RocB:Java代码审计IDEA插件 SAST
- Rochester DSCC 435 Optimization for Machine Learning fall 2023, by Jiaming Liang
- Rock appround the clock: Tracking malware developers by Android
- Rocket Chat
- RocketReach
- Rocking Your Windows EventID with ELK Stack
- rocky/python-uncompyle6
- roddas
- roDigitalForensics
- rodnt
- Rodolfo Neves @roddas
- rodrigondec
- roeegolan
- RogerHardiman
- rogierm
- Rogue-MySql-Server-搭建mysql虚假服务端来读取链接的客户端的文件
- RoguePotato
- rohan37kumar
- rohitkumarankam
- Role-Based Access Control (RBAC) Lab
- role-based permissioning
- rolfrolles/ghidrapal
- rolfrolles/hexraysdeob
- rolinh
- rollup-plugin-javascript-obfuscator
- rolod0x.io
- RolodETH Ethereum tag system
- Romain Thomas
- RomainMaillot
- romainthomas
- romantgj
- romanvm/python-web-pdb
- RomRaider
- romualdszkudlarek
- RoninNakomoto
- ronlut
- RonnieSalomonsen
- rookieBC
- Rookit Arsenal
- roopeshvs
- Root Detection Bypass By Manual Code Manipulation.
- Root Me
- Root-me.org
- RootAVD
- RootBeer Sample
- Rooting SIM-cards
- rootkiter#Termite
- Rootkits
- Rootkits: What they are, and how to find them
- rootlessJB writeup
- rootm0s/winpwnage
- Rootsweb
- RootTheBox
- RootThis:1
- RootUp
- ROP Gadget
- ROP Primer:1.0.1
- ROP Wargames
- ropasaurusrex:ROP入门教程——DEP(上)
- ropasaurusrex:ROP入门教程——DEP(下)
- ROPEmporium
- RopeyTasks
- ropnop
- Ropper
- Roppers Computing Fundamentals
- Roppers CTF Fundamentals Course
- Roppers Practical Networking
- Roppers Security Fundamentals
- ropr
- rosehgal
- rosstimothy
- Rot127
- Rot13
- rotateproxy:利用fofa搜索socks5开放代理进行代理池轮切的工具
- rotemplay
- rotemreiss
- rotenkatz/ecos_romfs_unpacker
- Rotki
- Rotten Potato – Privilege Escalation from Service Accounts to SYSTEM
- RottenPotato
- RottenPotatoNG
- rotthh
- router-router: 白盒代码审计-Java web路由内存分析工具
- Routersploit
- rover12421
- roxysploit
- roycewilliams
- rozmansi
- RPC-Backdoor:模拟 RPC 后门
- Rpc2socks
- RPCDump:通过RP来 dump 信息
- rpcfirewall:RPC 防火墙
- RPCForge
- RPCSCAN:RPC未授权远程主机信息获取工具
- RpcsDemo: 利用RPC协议在内网中的一些攻击面{DumpLsass,AddUser,ChangeNtlm,TSCH_DESK,OXIDINterka_network_card,CreateService等}
- RPI CS Department
- RPISEC
- RPISEC MBE
- rpisec/llvm-deobfuscator
- rpmalloc
- rproxy:自动化的代理服务器
- rs_shellcode:rust 语言编写的 shellcode 加载器
- RSA Keynotes, Lectures, and Sessions
- RSACTFTool
- RSATool
- RSCC
- rshipp
- RSMangler
- rspamd
- RSS Feed Reader
- RSS Micro
- RSS Search Engine
- RSS Search Hub
- RSSOwl
- rsstdd
- rst10124492
- rstenvi
- rstoikos
- rstular
- RSVP
- Rsync triggered Linux OOM killer on a single 50 GB file
- rsync_weakpass.py-rsync弱口令爆破脚本
- rsyncvd: 对rsync服务进行弱口令爆破,包括匿名登录检测和登录验证检测
- rt-bast
- Rt2jira
- RTBAsia ODX
- rtcms
- RTD
- RTFM: Red Team Field Manual
- RTFM: Red Team Field Manual
- RTFM: Red Team Field Manual v2
- RTFM: Red Team Field Manual v2
- rtfobj
- rth7680
- RTL-SDR
- RTL-SDR.com Article
- RTLSDR-Scanner
- ruanyf
- Rubby2001
- RubenAtBinx @RubenAtBinx
- Rubeus
- Ruby
- RUCC
- RuCTFe
- Rudder
- Rug Pull Finder
- rugdoc honeypot checker
- rugdoc.io
- Rugged Art attack
- rugpulldetector
- rugscreen
- RuijieRCE:锐捷Ruijie Networks RCE漏洞检测工具,可批量检测上菜刀、冰蝎、哥斯拉
- Rule Creation Guide
- RuleHound
- ruler
- rumpelsepp
- Run a LightHouse Node
- Run Netmaker + Netclient with Podman
- run the command
- RunasCs
- RunDll32 — API calling
- Running a module
- RUNNING AN AUTOMATED TEST PIPELINE FOR THE LEAGUE CLIENT UPDATE
- Running ELF executables from memory
- Running Erigon After the Merge
- Running followup modules on the results
- RUNNING ONLINE SERVICES AT RIOT: PART I
- RUNNING ONLINE SERVICES AT RIOT: PART II
- RUNNING ONLINE SERVICES AT RIOT: PART III
- RUNNING ONLINE SERVICES AT RIOT: PART III: PART DEUX
- RUNNING ONLINE SERVICES AT RIOT: PART IV
- RUNNING ONLINE SERVICES AT RIOT: PART V
- Running sn0int automatically
- Running tests
- Running your first investigation
- Running your first scan
- RunPE:使用 c#反射加载二进制文件
- Runtime Mobile Security (RMS)
- Runtime packers testing experiences
- Runtime Packers Testset
- Runtime packers: The hidden problem?
- Ruoyi-All:若依后台定时任务一键利用
- Rupan
- RUPP
- ruppde
- Rupture
- Russ McRee
- Russian
- russjones
- Rust
- Rust for Cybersecurity and Red Teaming
- rust-addUser:windows 添加管理员--Rust版本
- rust-windows-shellcode
- rustbuster
- rustcat:netcat的代替品
- rustensic/prefetchkit
- rustfuzz:rust 编写的基本 web fuzz 工具
- rustls
- RuStore
- RustScan
- rusty-snake
- RustyBlue
- ruthbell66
- rvesse
- RVuln
- Ryan Kitchens on Learning from Incidents at Netflix, the Role of SRE, and Sociotechnical Systems
- Ryan O'Donnell Theoretical Computer Science Talks
- Ryan S. Lin: Cyber Stalking, VPN’s and Digital Forensics
- Ryan Welton
- ryanmkurtz
- rykkard
- s-kali
- S-trace
- s0lray
- S0md3v
- s0uthwest/futurerestore
- S1ckB0y1337
- S20/IE613 - Online (Machine) Learning/ Bandit Algorithms
- S3/Azure/Digitalocean bucket enumeration/scraping
- S3cur3Th1sSh1t
- s3cur3th1ssh1t/creds
- S3Scanner
- S3v3ru5
- S4E
- SA
- SA - Freedom of Information Act 1991
- saagarjha
- SababaSec
- sabban
- Sabyasachi Paul
- SAC
- Sacha Roussakis-Notter
- Sadcloud
- Safari
- Safe
- Safe Red Team Infrastructure
- Safe-development:全国dns解析识别cdn,图形化ip反查域名,自动化输入验证码
- safe-regex
- safe1ine
- Safeguarding the evidential value of forensic cryptocurrency investigations
- safesql
- Safety analysis for the extended schematic protection model
- SafetyKatz
- SafetyNet Fix
- SafeZone
- sagan
- SAGE Journals
- SageMath
- Sahu
- saif-deepsource
- Sailing the Database Seas: Applying SRE Principles at Scale
- sAINT
- Sajid576
- sakhnik/nvim-gdb
- sakura-umi
- Sal3h
- Sales Spider
- Salesforce - Incident Response in Unfamiliar Sociotechnical Systems: One Incident Commander's Challenges Supporting Inter-organizational Anomaly Response in the Age of COVID-19
- salihmarangoz
- salls/angrop
- Salman2301
- Salon Staff Australia
- saltstack
- Sam Bowne
- sAMAccountname Spoofing
- samba-team/samba
- SamboyCoding
- samdark
- samdus
- samduy/volatility-uclinux
- Same Energy
- Same-Origin Policy: Evaluation in Modern Browsers
- SameID
- samiraguiar
- SamJoan
- SAML
- SamL98
- sammbertram
- Samples
- samratashok
- samsheff
- SamuelHassine
- Samy Kamkar on Hacking Vehicles with OnStar
- SamyGhannad
- samyk
- San Diego CTF 2024: Organized by University of California, San Diego
- Sancus 2.0: A Low-Cost Security Architecture for IoT Devices
- Sandbox
- Sandboxcn
- Sandcat
- sanderu
- sandy
- sanex3339
- SangramChavan
- sanjaymsh
- Sanqui
- SANS 2010 Digital Forensics Summit - APT Based Forensic Challenge
- Sans DFIR Memory Forensics cheat sheet
- SANS DFIR Webcast - Memory Forensics for Incident Response
- SANS Digital Forensics
- SANS Digital Forensics Posters
- SANS FOR500: Windows Forensic Analysis Course
- SANS FOR518: Mac and iOS Forensic Analysis and Incident Response Course
- SANS FOR585 Q&A: Smartphone Forensics - Questions answered
- SANS Forensics Blog
- SANS Forensics Challenges
- SANS Forensics CheatSheets
- SANS HHC
- SANS Institute
- SANS Internet Storm Center
- SANS Investigative Forensics Toolkit (sift)
- SANS ISC - Blog Post
- SANS ISC | Offensive Tools Are For Blue Teams Too
- SANS OSINT Summit 2021 (Playlist)
- SANS Webcast: Pen Testing with PowerShell - Local Privilege Escalation Techniques
- SANS WhitePapers
- sans-blue-team/deepbluecli
- Sansec
- Sansec eComscan
- Sanshu Inu attack
- Santa's ELFs: Running Linux Executables Without execve
- santet-online
- santiment.net
- Santoku Linux
- SANTOKU Linux- Overview of Mobile Forensics Operating System
- santoku/santoku-linux
- santosomar
- SAPO
- SAPO (Portugal)
- Sar
- sara-rn
- SarahBocognano
- SARIF
- sarojaba/awesome-devblog
- sarvesh4396
- SAS Planet
- sashs
- sAsPeCt488
- SassGuard Bot
- SatanSword-红队综合渗透框架,支持web指纹识别、漏洞PoC检测、批量web信息和端口信息查询、路径扫描、批量JS查找子域名、使用google headless、协程支持、完整的日志回溯
- SatelittesPro
- SatIntel
- SatoMew
- SATURN - Software deobfuscation framework based on LLVM
- SaturnsVoid
- SauceNAO Image Search
- Save Telegram Chat History
- save196
- sawadashota
- sawzeeyy
- sayboras
- SayCheese (Grab target's Webcam Shots)
- sayoojsamuel
- sb-seanblackford
- sbilly
- sbingner/ldid
- sbingner/substitute
- SBL / XBL / PBL / DBL / DROP / ROKSO
- SBOM Input JSON File Format
- sbousseaden/evtx-attack-samples
- sbs2001
- Sc0pe Templates
- sc1341
- sc1341/InstagramOSINT
- sc1341/TikTok-OSINT
- SCALABILITY AND LOAD TESTING FOR VALORANT
- Scaling a Kubernetes Platform across the Enterprise
- Scaling AI Infrastructure at OpenAI
- Scaling AWS Infrastructure to Support Multiple Regions
- Scaling Chef Emotionally
- Scaling Club Leaderboard Infrastructure for Millions of Users
- Scaling GraphQL at PayPal
- Scaling Kubernetes to 2,500 nodes
- Scaling Kubernetes to 7,500 nodes
- Scaling Kubernetes with Assurance at Pinterest
- Scaling Our Geo-Search Service For 10x Load
- Scaling Production Globally - Solving observability problems for developers (Part-2)
- Scaling Production Globally — The service mesh facelift (Part-1)
- Scaling SRE Organizations: The Journey from 1 to Many Teams
- Scaling your on-duty team
- Scalpel
- scamdb.net
- Scamdex
- ScamDigger
- Scammer-List
- scamsearch.io
- scan
- Scan for All objc_msgSend XREFs
- Scan for AppInfos
- Scan for Class XREFs
- Scan for Simple Symbol Wrappers
- Scan WordPress
- Scan Your APK
- scan.builder0x69.io: otterscan instance without running your own node
- scan4all:基于优化后的vscan,继续走更多集成、自动化功能,开源、轻量、快速、跨平台 的网站漏洞扫描工具
- ScanFactory
- Scanmycode CE (Community Edition)
- Scanner
- SCANNER-INURLBR
- Scanning Overview
- scanpatch
- scanPort:golang版高性能端口扫描工具
- Scans.io
- scapy
- Scapy in 20 minutes
- Scar26
- ScareCrow:一款为bypass EDR的框架
- ScarletTeam
- Scary Code in the Heart of Android
- ScatteredSecrets
- Scavenger
- SCCM
- Scenario, DD/Encase images
- scese250
- SCFProxy:一个利用腾讯云函数服务做 HTTP 代理、SOCKS5 代理、反弹 shell、C2 域名隐藏的工具
- Schedule Warble
- Scheduled Scans
- scheduled tasks that may be configured to run with privileges
- scheduler
- Scheduling at Scale: eBPF Schedulers with Sched_ext
- SchemaSpy - fácil de usar e já salvou meu emprego!
- Schemaspy – create documentation for your database
- SchemaSpy-HOWTO
- SchemaSpyでER図を生成する
- SchemaSpyでデータベースのドキュメントを生成してみた
- schemeflood:基于Schemeflood技术实现对已安装的软件进行探测
- scherma
- ScholarUniverse
- schoobydrew
- School of SRE from LinkedIn
- schosterbarak
- SchTask_0x727:创建隐藏计划任务,权限维持,Bypass AV
- SchtaskCreator:远程创建任务计划工具
- schultzika
- schwabe
- sciamano
- Science Publications
- ScienceDirect
- ScienceDomain
- Scinapse | Academic search engine for paper
- SciresM
- Scirius
- SCIRP
- scLoader:CS shellcode 加载器
- scnorton
- sco4x0
- Scoot
- scop
- Scope Based Recon
- SCORE: Source code optimization & reconstruction
- Scorebot
- scorechain.com
- scorelab/androphsy
- Scoring dependencies to detect “weak links” in your open-source software supply chain
- Scorpion
- ScorpionesLabs
- scott-ray-wilson
- scottmcgowan
- scottpedia
- Scout2
- scove
- Scrap Theft
- ScrapedIn
- ScratchABit
- scrcpy
- Screenshots
- screetsec
- Scribble Maps
- scribblemaniac
- Scribd
- script
- Script Block Logging
- script kiddie
- Script Safe
- Scriptable Remote Debugging with Windbg and IDA Pro
- ScriptMafia
- ScriptTiger
- Scrutiny
- Scryer: Netflix’s Predictive Auto Scaling Engine
- scrying: A tool for collecting RDP, web and VNC screenshots all in one place
- SCShell
- Sculas
- Scumware
- scw007
- scwuaptx/pwngdb
- Scylla
- sdc-check
- sdcampbell
- sdushantha
- Sdussault
- se-bastiaan
- SE-PAC: A self-evolving packer classifier against rapid packers evolution
- seadog007
- SeaGlass: Enabling City-Wide IMSI-Catcher Detection
- sealmove
- Seance: Divination of Tool-Breaking Changes in Forensically Important Binaries
- seanog8
- SeanOverton
- Seanstoppable
- seanthegeek
- seanwolter
- search
- Search All Junk
- Search Bug
- Search FCC ID Database
- Search Shared
- Search Systems
- Search Tempest
- Search.ch
- Search.ch (Switzerland)
- Search.com
- Search4faces
- SearchBug
- SearchCode
- searchface.ru
- SearchFiles.de
- SearchFTPs
- SearchIRC
- SearchIsBack
- SearchPeopleFREE
- Searpy:URL采集、Favicon哈希值查找真实IP、子域名查找
- searx.me
- SearXNG
- Seatbelt
- seatgeek/fuzzywuzzy
- Seattle
- sebastianwis
- sebastienbr/volatility
- sebdraven
- sebinbash
- sebres
- sebrink
- Sebsebzen
- sec-books-part1: 网安类绝版图书
- sec-hbaer
- sec-note:记录各语言、框架中危险的sink
- sec-note:记录安全方面的笔记/工具/漏洞合集
- Sec-Tools:一款基于Python-Django的多功能Web安全渗透测试工具,包含漏洞扫描,端口扫描,指纹识别,目录扫描,旁站扫描,域名扫描等功能
- SEC.gov | Company Search Page
- SecApps Recon
- seccomp-tools
- seccomp/libseccomp
- SECCON CTF 2018 - GhostKingdom
- Seccon CTF quals 2016 cheer_msg
- Seccon CTF quals 2016 jmper
- SECCON2016取证题WriteUP
- SecDb Observability Journey
- secf00tprint
- SecGen
- secguide:面向开发人员梳理的代码安全指南
- secHub
- secinject:Section Mapping Process Injection (secinject): Cobalt Strike BOF
- SecLists
- SecML Malware
- SecMobi Wiki
- Second demo
- Second nameserver in /etc/resolv.conf not picked up by wget
- SecOS: 1
- secrary/andromeda
- SecRepo
- secret club
- Secret Key Encryption Lab
- Secret Management Architectures: Finding the balance between security and complexity
- Secret Rotation
- Secret Scanning and Leak Prevention
- Secret versioning
- SecretFinder (like API & etc)
- secretnodes.com
- Secrets of Super and Professional Hackers
- Secretz
- SecTools
- sector-f
- Sector035
- SECUINSIDE CTF
- SecuPack
- Secure an Android Device
- Secure and advanced unpacking using computer emulation
- Secure Anti Forensic Anonymous Operating System: kodachi
- Secure Browser Architecture Based on Hardware Virtualization
- Secure by default – the case of TLS
- Secure by Design
- Secure Code Review
- Secure Coding
- Secure Computer System: Unified Exposition And Multics Interpretation
- Secure Docker Containers Require Secure Applications
- Secure Minicomputer Operating System
- Secure Your Node.js Web Application: Keep Attackers Out and Users Happy
- secure-json-parse
- secure411dotorg
- SecureDrop
- Secureheaders
- Secureito
- secureli
- SecureROM Binaries
- Securesha
- Secureum Blogs
- SecuriBench
- securify2
- Securing a community cloud
- Securing DevOps
- Securing Node JS Apps
- Securing ROS over the wire, in the graph, and through the kernel
- Securing The Software Supply Chain: Recommended Practices Guide for Developers | CISA, NSA, and ODNI (PDF)
- Securing Web Applications
- securing/iossecuritysuite
- securitum-mb
- Security
- Security @ Distrowatch
- Security Acronyms
- Security Analysis And Enhancements Of Computer Operating Systems
- Security and Cryptography, Steven Gordon - Thammasat University, Thailand
- Security architecture of the Chromium browser
- Security Chaos Engineering: Sustaining Resilience in Software and Systems
- Security Cheat Sheets
- Security Checklist
- Security Checklist by OWASP
- Security Consideration while using ssh-agent
- Security Controls
- Security Controls for Computer Systems: Report of Defense Science Board Task Force on Computer Security
- Security controls in the ADEPT-50 time-sharing system
- Security Economics
- Security Engineer - Interview Questions
- Security Engineering, Second Edition
- Security from First Principles
- Security Harden CentOS 7
- Security in ROS & ROS 2 robot setups
- Security issues and vulnerabilities in connected car systems
- Security Keys
- Security Ledger
- Security Monkey
- Security Ninjas
- Security of Google Chromebook
- Security Onion
- Security Operations 24x7
- Security Operations in an AWS Environment
- Security options in Windows Server 2016: Accounts and UAC
- Security Pitfalls of setgid Programs
- Security Policies and Security Models
- Security Policy
- Security related Operating Systems @ Rawsec
- Security Summer School
- Security tab
- Security Testing for Android Cross Platform Application
- Security tips
- Security Tools and Frameworks
- Security Treasure Hunt
- Security Tube
- Security Weekly
- Security wrappers and Bernstein chaining
- Security_Engineer_Interview_Questions
- Security_Product:开源安全产品源码
- security_w1k1
- security-list
- Security: UaF in MidiHost round 2 (JS -> Browser code execution)
- security.snyk.io
- Security.txt (Wikipedia)
- SecurityAffairs
- SecurityFest CTF 2022 - tunnelvision
- SecurityIdiots
- SecurityList: 有关代码审计和web安全的仓库
- SecurityShepherd
- SecurityTrails
- SecurityTrails | OWASP Amass: A Solid Information Gathering Tool
- SecurityTube Metasploit Framework Expert (SMFE)
- securitytxt.org
- securitywithoutborders/hardentools
- Securizing your GitHub org
- Sedar Company Search
- Sedena
- see documentation
- See how easily freaks can take over your life
- See this link
- Seeding strategies in search-based unit test generation
- Seek
- Seek (Australia)
- Seek Australia
- seekamoon
- seeker
- Seeking SRE
- Seekr
- seemoo-lab/frankenstein
- seemoo-lab/internalblue
- seemoo-lab/openwifipass
- SEETF 2023 - readonlt
- seeyonExp:致远命令执行漏洞系列的GUI利用工具
- Segmentation fault when calling a recursive bash function
- SEI CERT Android Secure Coding Standard
- sei-vsarvepalli
- Seikai CTF 2023 - Frog WAF
- SeikaiCTF 2023 - Golf Jail
- seishun
- SeiV-K
- seized.fyi
- SekaiCTF 2023 - Scanner Service
- sekkr1
- Sekoia.io XDR
- sekoialab/fastir_artifacts
- sekoialab/fastir_server
- sel4 website
- sel4 whitepaper
- Selefra
- Selenium
- Self-Driving and Connected Cars: Fooling Sensors and Tracking Drivers
- Self-Driving Cars - Cyrill Stachniss - Winter 2020/21 - University of Bonn)
- Self-Driving Cars — Andreas Geiger
- Self-Driving Cars — Andreas Geiger, 2021/22
- Self-hosting
- Self-Sovereign Identity
- Selfie2Anime
- Selfoss
- selfteaching/the-craft-of-selfteaching
- SELinux Game
- SELinux introduction
- SELinux, Seccomp, Sysdig Falco, and you: A technical discussion
- Selora
- selsta
- Selutario
- selvanair
- Semantic Scholar
- Semantic Web Technologies by Dr. Harald Sack - HPI
- semantic-release-bot
- semgrep
- semgrep-bot
- Semi-supervised learning for packed executable detection
- Semi-supervised learning for unknown malware detection
- sempf
- SEMrush
- semver_match
- Send us Pull Requests
- Sending arbitrary IPC messages via overriding Function.prototype.apply
- sengkyaut
- sensepost/objection
- sensitive data flow
- Sensitive system calls based packed malware variants detection using principal component initialized multilayers neural networks
- sentenza/gimp-ela
- Sentiment attack
- Sentiment140
- Sentinel HASP Envelope
- Sentinel Hub
- Sentinel Visualizer
- SentinelTestbed
- Sentio
- Sentio Explorer
- sentio.xyz
- SEO Chat Tools
- SEO Checker
- SEO Plagiarism
- SEOTools for Excel
- sePACKER
- Separation Virtual Machine Monitors
- SEPOS: A Guided Tour
- Seppuku:1
- SEPROM
- September Threat Reports
- seputil
- SeqBox GitHub repository
- SeqBox home page
- Sequential opcode embedding-based malware detection method
- Serein:一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具
- sergiomarotco
- Serial: 1
- SerializationDumper:一种以更易读的形式转储 Java 序列化流的工具
- serializingme
- Serizao
- SerpApi
- serpilliere
- SerpScan
- Serpstat
- Server
- Server Side Include Injection (SSI Injection)
- Server Side Request Forgery
- Server 酱
- Server-Side Template Injection: RCE For The Modern Web App
- serverless functions攻防初探
- ServerScan一款使用Golang开发的高并发网络扫描、服务探测工具。
- ServerUntrustAccount:Active Directory 域持久性技术
- Service Discovery Challenges at Scale
- Service Level Objectives
- Service Level Objectives for On-call Peace of Mind
- Service New South Wales
- ServiceMove-BOF:New lateral movement technique by abusing Windows Perception Simulation Service to achieve DLL hijacking code execution
- Servletpot
- ses
- sesam
- SESRIC Basic Social and Economic Indicators
- SESRIC Databases
- Session
- session_enum:通过NetSessionEnum获取域内机器对应用户
- SessionGopher-一款采用powershell来解密Windows机器上保存的session文件,例如: WinSCP, PuTTY, SuperPuTTY, FileZilla, and Microsoft Remote Desktop,支持远程加载和本地加载使用
- set
- set_err
- Set-UID Program Vulnerability Lab
- SethFalco
- Setoolkit
- Sets, Counting and Probability - Harvard
- Setting arbitrary request headers in Chromium via CRLF injection
- Setting Up a Dev Environment
- Setting up fREedom and BinNavi
- Setting up Frida Without Jailbreak on the Latest iOS 12.1.4 Device
- Setting up notification rules
- Setting up the environment
- settings
- Setuid Demystified
- Setup
- Setup and Installation
- sevagas
- sevagas/swap_digger
- Seven Seas Security
- Seznam(Czech Republic)
- SFU CMPT 727 Statistical Machine Learning spring 2022, 2023, by Maxwell Libbrecht
- sFuzz
- sg3-141-592
- sgan81/apfs-fuse
- sgiehl
- sgloutnikov
- sgn-html:MSF 的Shikata Ga Nai编码器web 端使用
- Sguil
- sh-template-tag
- Sh11td0wn
- SH33LL
- sh4hin/androl4b
- Sh4rK
- sha1
- sha2_256
- sha2_512
- sha3_256
- sha3_512
- Shack2ToolsWithoutBackdoor:去掉获取系统信息回传到www.shack2.org的工具
- Shad0w
- Shad0wC0ntr0ller
- shadabansari
- Shadow Daemon
- Shadow Timelines And Other VolumeShadowCopy Digital Forensics Techniques with the Sleuthkit on Windows
- ShadowServer
- shadowsocks/kcptun-android
- shadowsocks/shadowsocks-org#44
- shadowsocks/simple-obfs-android
- shadowsocksr-live/ishadowsocksr
- Shadowsocks基于二次混淆加密传输的数据保密性原理分析
- ShadowSpray:在这个域中喷洒影子凭证的工具,希望在域中的其他对象上滥用早已被遗忘的GenericWrite/GenericAll DACL
- shafe123
- shahrilnet
- shaialon
- shaked6540
- shamay-dev
- shanek2/invtero.net
- Shanti Interactive
- Shape Up
- shard.ru
- shards-7
- shareef12
- shariqmalik
- Shark
- sharkteam.org
- SharpADUserIP:提取DC日志,快速获取域用户对应IP地址
- SharpBeacon:CobaltStrike Beacon written in .Net 4 用.net重写了stager及Beacon,其中包括正常上线、文件管理、进程管理、令牌管理、结合SysCall进行注入、原生端口转发、关ETW等一系列功能
- SharpBlock-A method of bypassing EDR's active projection DLL's by preventing entry point exection
- SharpBypassUAC
- SharpClipboard:用c#写的获取剪贴板内容的工具,也可用于cobalt strike中使用
- SharpDBeaver: DBeaver数据库密码解密工具
- SharpDecryptPwd:解密工具,支持Navicat、Xmanager、TeamViewer、FileZilla、Foxmail、TortoiseSVN、WinSCP、Chrome、RDCMan、SunLogin
- SharpDomainSpray
- SharpEventLog:c# 读取登录过本机的登录失败或登录成功(4624,4625)的所有计算机信息,在内网渗透中快速定位运维管理人员
- SharpEventPersist:通过从事件日志中读写shellcode达到持久化
- SharpExchangeKing: Exchange 服务器安全性的辅助测试工具
- SharpFrp:FRP 修改版,配置文件不落地
- SharpGhosting:C#写的创建幽灵进程的工具
- SharpHostInfo:一款快速探测内网主机信息工具
- SharpMapExec:CrackMapExec的C#实现版本
- SharpMemshell:.NET写的内存shell
- SharpNBTScan:C#编写的NetBIOS扫描工具
- SharpNTLMSSPExtract:利用 NTLMSSP 探测 Windows 信息
- SharpOXID-Find:OXID_Find by Csharp(多线程) 通过OXID解析器获取Windows远程主机上网卡地址
- SharpRDPBatch:批量检查远程桌面密码或ntlm是否正确
- SharpShooter
- SharpSniper:通过用户名和登录 IP地址在AD 中查找特定用户
- SharpSpray:一个简单用LDAP对域的所有用户执行密码喷射攻击,并与Cobalt Strike兼容。
- SharpSpray:域内密码喷射工具
- SharpSQLTools:有了 sqlserver 权限后,可用来上传下载文件,xp_cmdshell与sp_oacreate执行命令回显和clr加载程序集执行相应操作
- SharpToken:.NET版本的incognito,具有以下功能:枚举Token、从指定进程枚举Token、获得交互式shell、获取命令执行结果(webshell下执行)
- SharpToolsAggressor-内网渗透中常用的c#程序整合成cs脚本,直接内存加载
- SharpUserIP:在域控或远程提取登录日志,快速获取域用户对应的IP地址
- SharpWebServer:搭建HTTP和WebDAV服务器来捕获Net-NTLM哈希
- sharpwmi:一个基于rpc的横向移动工具,具有上传文件和执行命令功能
- SharpWSUS:通过 Windows 升级服务来进行横向移动的CSharp工具
- SharpXDecrypt:Xshell全版本密码恢复工具(截至目前最新7.1版本)
- SharPyShell:适用于 c# web 应用的经过asp.net混淆的webshell
- SharpZeroLogon
- SharpZip:C#写的 zip 打包工具
- sharvilshah
- shashitechno
- shaswat-satyam
- shaula
- Shaun Dang
- Shaunwei
- Shawar Khan
- ShawnDEvans
- shawndwells
- shc_bypass:内存加载shellcode绕过waf
- she11sh0cked
- Shecodject工具使用python注入shellcode bypass 火絨,360,windows defender
- Shed
- sheensantoscapadngan
- Sheksa
- Shell Storm
- shell-scan
- shell-storm
- shell-storm.org/shellcode
- Shellbags
- shellcheck
- shellclear
- shellcode
- Shellcode Compiler:用于生成Windows 和 Linux平台的shellcode工具
- Shellcode Hashes
- ShellCode_Loader:Msf&CobaltStrike免杀ShellCode加载器
- shellcode-factory:shellcode 生成框架
- Shellcode-Loader:动态加载 shellcode
- shellcode:免杀 shellcode
- ShellCodeFramework-【免杀框架】
- shellcodeloader-Windows平台的shellcode免杀加载器
- ShellcodeLoader-将shellcode用rsa加密并动态编译exe,自带几种反沙箱技术
- ShellcodeLoader:绕过防病毒软件的Shellocde加载器【2022.10.20被发现release文件投毒】
- Shellcoding-shellcode生成+shellcode混淆
- shelld3v
- ShellDredd #1 Hannah
- Shellen
- shellfirm
- shellnoob
- ShellPhish
- Shells
- Shellshock Attack Lab
- Shellsploit
- shellstack
- shellster
- Shellter
- shelt
- Sheng-Feng Lu
- shenghuo2
- SHERLOCK
- SherlockEye
- sherloq
- SheSource
- Shhgit
- Shhmon — Silencing Sysmon via Driver Unload
- shhnjk
- shields.io
- shifoc
- ShiftLefter
- SHILL: A Secure Shell Scripting Language
- shimit
- Ship Spotting
- shipcod3
- ShipTracker
- shirishupadhyay
- Shiro 721 Padding Oracle攻击漏洞分析
- Shiro RCE (Padding Oracle Attack)
- shiro rce 反序列 命令执行 一键工具
- Shiro RememberMe 1.2.4 反序列化导致的命令执行漏洞
- shiro rememberMe 在线加解密工具
- Shiro RememberMe 漏洞检测的探索之路
- Shiro 历史漏洞分析
- shiro_key:shiro key 收集 目前 1k+
- shiro_killer:shiro 漏洞批量检测工具
- shiro-550-with-NoCC: Shiro-550 不依赖CC链利用工具
- shiro-exploit-Shiro反序列化利用工具,支持新版本(AES-GCM)Shiro的key爆破,配合ysoserial,生成回显Payload
- shiro-framework:shiro 漏洞检测利用工具
- ShiroExploit-Deprecated-Shiro系列漏洞检测GUI版本-ShiroExploit GUI版本
- ShiroKeyCheck:gol编写的Shiro key检测爆破工具
- shiroMemshell:利用shiro反序列化注入冰蝎内存马
- ShiroScan-Shiro<=1.2.4反序列化,一键检测工具
- Shiro权限绕过漏洞分析
- ShittyAdvice
- Shiva
- shivam-Purohit
- shivankar-madaan
- Shlomo Zalman Heigh
- Shlomo Zalman Heigh @szh
- shmilylty
- shmink
- ShobhitMishra-bot
- SHODAN
- Shodan + Crypto example
- Shodan API integration
- Shodan Computer Search
- Shodan Dorks
- Shodan-seeker
- Shodan.io
- Shodan.io-mobile-app for Android
- shodanwave
- Shodan在渗透测试及漏洞挖掘中的一些用法
- Shodan手册
- Shodan的http.favicon.hash语法详解与使用技巧
- Shodan自动化利用
- Short Course on Casual Inference, by Sanjay Shakkottai
- Short Tutorial on URH with LimeSDR Mini
- shorteners.grayhatwarfare.com
- Shoutouts
- shovel-kun
- shovel:Docker容器逃逸工具
- show
- Showbiz Pro
- ShowStopper
- shoxxdj
- shramos
- Shrinker
- shrisukhani
- shroudedcode/apk-mitm
- shrugs
- shu-tom
- Shubham Patel @Shubham-Patel07
- Shubham-Patel07
- ShubhamJagtap2000
- ShubhamPalriwala
- ShubhamRasal
- shuheiktgw
- ShuiZe_0x727:水泽-信息收集自动化工具
- shujianyang/btrforensics
- shunkakinoki
- Shupeng-All-The-4G-Modules-Could-Be-Hacked
- ShutdownRepo
- shuxxing
- Shylock via volatility
- siam-felis
- sibears/idagolanghelper
- sibrcode
- Sibyl
- SickOS 1.1
- SickOS 1.2
- sicp.ueba.su
- Side Channel Analysis in 4G and 5G Cellular Networks
- Side Of Burritos - You should use this instead of F-Droid | How to use app RSS feed
- sidevesh
- sidneyp
- sidxparab
- SIEM
- SIEM integration
- Sienna-locomotive
- Sierraffinity
- Sieve app
- SIFT-OWNER
- SIFT: Design and Analysis of a Fault-Tolerant Computer for Aircraft Control
- sigalor
- sigalor/whatsapp-web-reveng
- SigFlip:修改已经签名的PE文件且不破坏签名的工具
- Sigma
- Sigma - Generic Signatures for SIEM Systems by Florian Roth
- Sigma CLI
- Sigma to Hayabusa Converter
- sigma2stix
- Sign up
- sign-ins logs
- sign-逆向app的sign等参数的思路和体验, 安卓逆向, 安卓破解, 逆向app,爬虫解密
- Signal
- Signal Processing: An Introduction by Nathan Kutz
- signalapp/signal-android
- signalapp/signal-ios
- signed
- Signed SSH Certificates
- SignorMercurio
- SIGTERM vs. SIGKILL
- Siguza's ARM Bootcamp
- Siguza's Research on KTRR
- siguza/ios-resources
- Silberschleier
- Silent circle
- Silent-Packer
- SilentPush Review, 2022
- silenttrinity
- Sileo
- siliconblade/volatility
- SilkETW:一款针对Windows事件追踪的自定义C#封装工具
- Silky-CTF: 0x01
- Silky-CTF:0x02
- SillyRAT:跨平台、多功能远控
- Silobreaker
- silverf0x/rpcview
- silverhack/voyeur
- simar7
- simeonovski
- Similar Web
- SimilarPages
- SimilarSites
- SimilarSiteSearch
- similarweb.com
- simon-hoegl
- Simone Berni
- simonkagstrom/kcov
- simonsigre
- Simple
- Simple Ads Manager
- Simple database documentation with SchemaSpy
- Simple-Fuzzer
- Simple-PE32-Packer
- Simpleator
- SimpleDPack
- SimpleRemoter:基于gh0st的远程控制器:实现了终端管理、进程管理、窗口管理、桌面管理、文件管理、语音管理、视频管理、服务管理、注册表管理等功能
- simples.kr
- SimpleShellcodeInjector-shellcode加载器
- Simplify
- SimplifyGraph
- Simplifying web deploys
- SimplyHired
- simsong
- simsong/dfxml
- Simulating Customized Chaos in Golang using Toxiproxy
- SinaKarvandi
- sindresorhus/fkill-cli
- sindresorhus/speed-test
- Sinfonietta/hostfiles
- Single User Mode Definition
- Singularity
- Singularity of Origin
- Sintelix
- sinwindie/OSINT
- Siofra, a free tool built by Cybereason researcher, exposes DLL hijacking vulnerabilities in Windows programs
- SIP002
- SIP003
- SIP003u
- SIP004
- SIP008
- SIP022
- siphyshu
- sipvicious
- sir
- sirdarckcat
- Siren Protocol attack
- Siri 人工评估计划的员工说,自己每天要听 1000 条录音
- Siri被曝偷偷给用户隐私录音,还上传给苹果
- sirusdv
- Site Isolation Design Document
- Site Liner
- Site Reliability at DAZN
- Site Reliability Engineering
- Site Reliability Engineering at DBS Bank
- Site Reliability Engineering for Native mobile apps
- Site Reliability Engineering: Philosophies, habits, and tools for SRE success
- SiteDossier
- Sitemap tutorial
- Sitemap XML spec
- sitereport.netcraft.com
- SitesLike
- SiteSucker
- Six Sick Systems, One Hour: Investigate with Host Forensics
- six2dez
- sixdegreesofwikipedia
- SIΣGMA
- sjas
- sjossi
- SK-CERT
- sk4la
- SkeletalDemise
- sketchymoose/totalrecall
- Skimagram
- Skip Ease
- Skipfish
- Skopenow
- skr0x1c0/binja_kc
- Skrapp
- skraxberger
- Skydog
- Skydog Con
- SkylarWatson
- Skylinewebcams
- skylot
- skymem.info
- skynet.certik.com
- Skype Hash
- skyscraper Page
- Skytower
- SkyTrace
- Slack
- Slack announcements channel
- Slack API integration
- Slack at the Edge
- Slack’s Incident on 2-22-22
- Slack’s Outage on January 4th 2021
- Slackadays
- slackish
- SlackPirate
- SLAM Course (2013) - Bonn University
- SLAM Lectures
- Slangit
- Slawter666
- Slaying Dragons with QBDI
- sleep
- Sleeping Time
- Sleipnir
- Sleuth For The Truth
- Sleuthkit on Windows
- sleuthkit/autopsy
- sleuthkit/sleuthkit
- SLI & Reliability Deep-Dive’ with David N. Blank-Edelman of Microsoft
- slicingmelon
- SLICK: Adopting SLOs for improved reliability
- slides
- SlideSearchEngine
- Slideshare
- Slideworld
- Sliicy
- Slim Official Image
- Slimjet
- slimwang
- Slither
- Slither VSC
- Slitherin: Slither Detectors by Pessimistic.io
- sliver:一个通用的跨平台的支持多种连接形式的远控框架
- slmagus
- SLO Adoption and Usage in Site Reliability Engineering
- SLOConf
- SLOConf 2021 Playlist
- slopShell:一款功能强大的PHP Webshell
- SLOs for Data-Intensive Services
- Sloth, a Tool for Inducing Network Failures’ with Preetha Appan of Indeed.com
- slowhttptest
- SlowLogicBoy
- slowloris
- SLSA
- slunak
- slurp
- Sm4rty-1
- Smali
- Smali-CFGs – Smali Control Flow Graph’s
- SmaliSCA
- Smalise
- Small and medium teams
- Small Tweaks do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards
- SmallProxyPool:一个免费高质量的小代理池(从fofa搜索开放socks5代理)
- SmallSEOTools
- smarek
- smarGate-内网穿透,c++实现,无需公网IP,小巧,易用,快速,安全,最好的多链路聚合(p2p+proxy)模式
- Smart alerts in ThirdEye, LinkedIn’s real-time monitoring platform
- Smart Cards
- Smart Contract Analysis Tools
- Smart Contract Auditor Tools and Techniques
- Smart Contract Hash Matcher
- Smart Contract Library
- Smart Contract Obfuscation
- Smart Contract Search
- Smart Contract Storage Slot Reader
- Smart Contract Visualization
- Smart Contract Wrapper
- Smart Packer
- Smart-honeypot
- smart-questions
- smart-reader-vidvidvid.vercel.app
- Smartcard Handbook
- smartcheck
- SmartDataCenter
- SmartDeblur
- smartdone/dexdump
- smartdone/frida-scripts
- SmartManoj
- SmartOS
- Smash The Stack
- SmashTheStack
- SmashTheStack IO
- SMB-Session-Spoofing:SMB会话欺骗蜜罐
- SMBeagle:一款功能强大的SMB文件共享安全审计工具
- SMBGhost CVE-2020-0796
- SMBGhost_AutomateExploitation-SMBGhost (CVE-2020-0796) Automate Exploitation and Detection
- SMBrute
- smicallef
- smile-jpg
- Smjert
- smlx/piv-agent
- SMMF
- Smoke Leet Everyday
- Smoss
- SMTP over XXE − how to send emails using Java's XML parser
- SMTP用户枚举原理简介及相关工具
- smuggler-一款用python3编写的http请求走私验证测试工具
- SmylerMC
- sn0int
- sn0int_time
- sn0int_time_from
- sn0int_version
- Sn1per
- Sn1per Configuration Options
- Sn1per Configuration Templates
- Sn1per Enterprise Released!
- Sn1per Enterprise Released!
- Sn1per Enterprise v20231025 Released!
- Sn1per Enterprise v20231025 Released!
- Sn1per Enterprise v20240608 Released!
- Sn1per Enterprise v20240608 Released!
- Sn1per Professional v10.0 Released!
- Sn1per Professional v10.0 Released!
- Sn1per Scan Engine v10.6 Released!
- Sn1per Scan Engine v10.6 Released!
- Sn1per Scan Engine v10.7 Released!
- Sn1per Scan Engine v10.7 Released!
- Sn1per Scan Engine v10.8 Released!
- Sn1per Scan Engine v10.8 Released!
- sn1per:综合漏扫平台
- snake-poison
- snakeyaml-memshell:springboot跨线程注入内存马
- snallygaster
- SnapBird
- SnapChat
- Snapchat取证
- snapp.wtf
- Snappa
- Snapshot releases
- Snare
- snare/voltron
- SndR @SndR85
- Sneakers
- SneakyEXE:一款嵌入式UAC绕过工具
- sniff
- sniffglue
- sniffjoke
- Sniffle
- Snipa22
- Snipplr
- snitch
- snitch.name
- snmalloc
- snmpwalk
- Snoop
- Snoopdigg
- Snoopdroid
- snooppr
- SnoopSnoo
- SnoopStation
- Snopes
- Snort
- Snov Email Finder
- snovvcrash
- snovvcrash/usbrip
- Snow
- snowflake.com
- snowman
- snowpack-javascript-obfuscator
- SnowShadow:集成了IP查询,端口扫描,系统命令,Webshell,C段存活扫描,后台目录扫描,远程控制等功能
- SnowzNZ
- Snusbase
- Snyk
- snyk-bot
- snync
- So Simple:1
- So you want to start investigating on-chain?
- so-import-evtx
- Soar
- SOC Multi-tool
- SOC Prime
- sochain.com
- SociaBlade
- Social Analyzer
- Social Bearing
- Social DownORNot
- Social Engineering
- Social Engineering : The Art of Human Hacking
- Social Engineering and Manipulation
- Social Engineering in IT Security: Tools, Tactics, and Techniques, Sharon Conheady
- Social Engineering: Compromising Users with an Office Document
- Social Engineering: The Art of Human Hacking - Chris Hadnagy
- Social Engineering: The Science of Human Hacking
- Social Links
- Social Mapper
- Social media account enumeration
- Social Mention
- Social Network, Blog Directory, Blog Search Engine, Free Blog Hosting
- Social Rank First Follower
- Social Searcher
- Social Security Death Index
- Social Stats
- Social-Engineer.com - DEFCON SECTF
- socialab
- SocialBakers
- SocialBlade
- socialbox
- Socialcatfish
- socialface.com.ua
- SocialFish
- socialscan
- SocialScan | Username or Email
- SocialSharePreview.com
- socilab.com
- sock_connect
- sock_newline
- sock_options
- sock_recv
- sock_recvall
- sock_recvline
- sock_recvline_contains
- sock_recvline_regex
- sock_recvn
- sock_recvuntil
- sock_send
- sock_sendafter
- sock_sendline
- sock_upgrade_tls
- SocketCAN
- SocketCAN Utils
- Socketscan
- socketscan.io
- SocketToMe
- socketz
- SOCKS Protocol Version 5 ( rfc1928 )
- socks5lb:socks5代理负载均衡工具
- SocksOverRDP:通过RDP连接开一个socks代理
- Sockstress
- socprime/muddywater-apt
- socradar.io
- sodium_secretbox_open
- SOF-ELK
- SofianeHamlaoui
- Software Debugging - Udacity, course-cs259 | 2015
- Software Engineering - Bauhaus-Uni Weimar
- Software Engineering - IIT Bombay
- Software Engineering for Embedded Systems (WS 2011/12) - HPI University of Potsdam
- Software Engineering for Self Adaptive Systems - iTunes - HPI University of Potsdam
- Software Engineering with Objects and Components 2015/16- University of Edinburgh
- Software Testing - IIT Kharagpur
- Software Testing - Udacity, course-cs258 | 2015
- Software-Security-Learning
- Sogou
- sohrb
- Sojobo
- SoK: (state of) the art of war: Offensive techniques in binary analysis
- SoK: Automatic deobfuscation of virtualization-protected applications
- SoK: Deep packer inspection: A longitudinal study of the complexity of run-time packers
- sokaRepo
- sol function profiler
- sol2uml
- Solana FM
- Solana Security
- Solana Smart Contract Security Best Practices
- SOLAR-10.7B
- solarkennedy
- Solarwinds分析
- Sold Price
- Solgraph
- Solhint
- Solidity Attack Vectors
- Solidity components
- Solidity for Beginners - Dapp University
- Solidity Metrics
- Solidity Pro
- Solidity Visual Developer
- solidity-coverage
- Solidity, Blockchain, and Smart Contract Course – Beginner to Expert Python Tutorial - FreeCodingCamp
- solidityscan.com
- solidlint.com
- SolitudePy
- sollie
- solmap.zeppelin.solutions
- solo-io/gloo
- solo-io/squash
- Solodit.xyz
- Solomon Sonya - Advanced Memory Forensics NextGen Actionable Threat Intelligence - SecurityFest 2018
- solr-injection
- Solving kao's toy project with symbolic execution and angr
- Solving MalwareTech Shellcode challenges with some radare2 magic!
- Solving MalwareTech String Challenges With Some Radare2 Magic!
- Solving OWASP UnCrackable Android App Level 1 with Runtime Mobile Security (RMS)
- Solving OWASP UnCrackable Android App Level 2 with Runtime Mobile Security (RMS)
- Solving the GrrCon Network Forensics Challenge with Volatility
- Some Memory Forensic with Forensic Suite (Volatility plugins)
- Some Problems Of URLs
- Some thoughts on threat modeling
- Some Tricks From My Secret Group
- Some useful volatility plugins
- SomeoneWeird
- someonewhocares.org
- sonar-java_java代码质量检查和安全性测试
- Song Kick
- song-xiao-lin
- songzy12
- Sonicvisualizer
- SooPAT 专利搜索
- soorajsomans
- Soot – A Java Optimization Framework
- Soovle
- SOP bypass / UXSS – Stealing Credentials Pretty Fast (Edge)
- soPDF.com
- sophron
- Sops
- SOREL
- sorokin
- Sorted By Name
- sosreport/sos
- SOTL-2.2. Search For Accounts On Other Platforms
- SOTL-6.1. Check Logins Reuse To Find Another Account
- SOTL-6.2. Check Nicknames Reuse To Find Another Account
- Sou1gh0st
- SouadHadjiat
- Soulghost
- SoulIess
- Sound empirical evidence in software testing
- source
- Source (Bitbucket)
- Source code
- Source Code Disclosure in ASP.NET apps
- Source-and-Fuzzing:一些阅读源码和Fuzzing 的经验,涵盖黑盒与白盒测试
- Sourcebot
- SourceDetector:用于发现源码文件(*.map)的chrome插件
- Sourceforge
- SourceGraph
- Sourcehut
- sourcemapper
- Sources
- Sources for Plugin Writing
- sourcify.com
- South Australia EzyReg
- South Australia Government Job Search
- South Australia Police Force
- South Bay SRE Meetup - Netflix Cloud Performance Team
- sowdust/tafferugli: Tafferugli is a Twitter Analysis Framework
- soxoj
- soyasoya5
- SP eric
- SP ike
- SP:Jerome
- sp35
- Space Science with Python - Astroniz
- Space_view:一款Hunter(鹰图平台)或者FOFA平台 资产展示的浏览器油猴插件
- spacehamster
- spacelatte
- Spaces-finder
- SPack
- SPADE Project Page
- SPADE: Signature based packer detection
- SPAM list
- Spam Scanner
- SpamAssassin
- spamchat
- Spamhaus
- Spammer-Grab
- SpamScope
- SpankChain attack
- SPARC Workshop on Machine Learning in Solar Physics and Space Weather - CESSI IISER Kolkata
- sparcflow
- SparkFun CAN-BUS Shield
- SparkyTD
- SPARTA
- SPARTA – Static Program Analysis for Reliable Trusted Apps
- SPartan
- Sparty
- Spatial Data Science, Autumn 2017, University of Chicago
- Spatial Regression Analysis, Spring 2017, University of Chicago
- SpazSMS
- spdawson
- SPDX
- speakeasy
- Speakezee
- Special Webcast: SOF-ELK(R): A Free, Scalable Analysis Platform for Forensic, incident Response, and Security Operations – March 5, 2019 1:00pm US/Eastern
- Specification of a trusted computing base
- SpecterOps/BloodHound-Legacy#267
- Speed up grep searches with LC_ALL=C
- Speed-SQL
- spekulatius
- spencerdodd/kernelpop
- SpencerIsGiddy
- Speurders
- SPF Record Checker
- SPF Syntax
- SPF 记录:原理、语法及配置方法简介
- Sphinx
- Spicing up your own access with capabilities
- SpiderFoot
- spiderfoot.net
- Spideroak
- SpiderSuite
- spiffcs
- spimpaov
- Spin up your own Ethereum node
- spinningbluebird
- spinningbot
- SpinObf
- SpinXO Username Generator
- spl0i7
- splitline
- Sploit.io
- Sploitify
- sploutchy/Certipy
- sploutchy/impacket
- Splunk
- Splunk advanced input configuration for Windows
- Splunk4DFIR
- spmedia
- SPOF
- Spokeo
- spoNge369
- sponsorship
- Spoodle
- spoofcheck
- SpoofWeb:一键部署HTTPS钓鱼站
- SpoolSample
- SpotJobs Australia
- Spotlight
- spotlightc
- spp:简单强大的多协议双向代理工具 A simple and powerful proxy
- spq
- sprabowo
- Spraten
- Sprax - From Nothing to SRE: Practical Guidance on Implementing SRE in Smaller Organisations
- Spray
- SprayWMI
- Spreadshirt.com
- Spring 2019 - Probabilistically Checkable and Interactive Proof Systems (Alessandro Chiesa)
- Spring Boot Actuator未授权访问【XXE、RCE】单/多目标检测
- Spring Boot in Practice
- Spring Cloud
- Spring Cloud Config Server 路径穿越与任意文件读取漏洞分 CVE-2019-3799
- Spring Data Redis <=2.1.0反序列化漏洞
- Spring Security in Action, Second Edition
- spring-boot-upload-file-lead-to-rce-tricks:spring boot Fat Jar 任意写文件漏洞到稳定 RCE 利用技巧
- spring-boot-webshell:但文件版 spring-boot webshell环境
- spring-cloud-function-SpEL-RCE:Spring Cloud Function SpEL RCE
- spring4shell-scan:Spring4Shell and Spring Cloud RCE 漏洞检测脚本
- SpringBoot 持久化 WebShell
- SpringBoot 相关漏洞学习资料,利用方法和技巧合集,黑盒安全评估 checklist
- SpringBoot_Actuator_RCE
- Springer
- SpringExploit:spring 系列漏洞检测工具
- SpringInspector:Java自动代码审计工具
- SpringMemShell:Spring内存马检测和隐形马研究
- SpringWebflux-MemShell:SpringWebflux通用内存马
- SPRR & GXF
- Sputnik
- Sputnik 1
- Sputtr
- Spy Dialer
- spybrowse:窃取指定浏览器的配置文件
- Spycam
- Spyder Sec
- SpyderLab AML
- SpyDialer
- SpYDyishai
- SpyFu
- SpyOnWeb
- spyophobia/shadowsocks-gtk-rs
- Spyros @northdpole
- Spyse
- Spyse.py
- Sql injection
- SQL Injection (SQLi)
- SQL INJECTION AND POSTGRES - AN ADVENTURE TO EVENTUAL RCE
- SQL Injection Attack Lab
- SQL Injection Cheat Sheet
- SQL injection in an UPDATE query - a bug bounty story!
- SQL Injection Lab
- SQL Injection Pocket Reference
- SQL Injection Wiki
- SQL Review
- SQL Review GitHub Action
- sql_firewall
- sqlchop
- SQLEXP-SQL 注入利用工具,存在waf的情况下自定义编写tamper脚本 dump数据
- SQLi-LABS Videos
- SQLiDetector:Python 编写的用于检查 SQL 回显注入漏洞的工具
- Sqlilabs
- SQLInjectionWiki:一个专注于聚合和记录各种 SQL 注入方法的 wiki
- SQLite 可视化SQLite数据库Schemaspy
- SQLite3 Injection Cheat Sheet
- SQLiteFlow
- SQLite手工注入Getshell技巧
- sqliv
- SQLJam:一个探索数据库查询新方法的 jam 项目
- SqlKnife_0x727:适合在命令行中使用的轻巧的SQL Server数据库安全检测工具
- sqlmap
- sqlmap bypass云锁tamper(利用云锁的注释不拦截缺陷,来自t00ls师傅)
- SQLmap Tamper Scripts
- sqlmap-gtk-sqlmap的GUI界面实现
- sqlmap源码分析
- sqlmap源码分析一
- sqlmap源码分析三
- sqlmap源码分析二
- sqlmap源码分析四
- sqlmate
- SQLNinja
- SQLRecon:一个 C# MS SQL 工具包,专为进攻性侦察和后期利用而设计
- SQLScan
- SQLZoo
- sql二次注入和截断联合使用
- sql二次注入和截断补充说明
- SQL注入ByPass的一些小技巧
- Sqreen
- sqshq/sampler
- square/ponydebugger
- Squatm3gator
- Squid
- SquirrelMail
- Squish Level Objectives: How SRE can Help Align Technical Work to User Benefit
- Squishy
- src link
- SRC资产信息聚合网站
- SRC资产在线管理系统 - Shots
- sRDI – Shellcode Reflective DLL Injection
- srdi-rs:Rusty Shellcode 反射 DLL 注入
- sRDI:一款通过Shellcode实现反射型DLL注入的强大工具
- sRDI:反射 DLL 注入的 Shellcode 实现,将 DLL 转换为与位置无关的 shellcode
- SRE & Product Management: How to Level up Your Team (and Career!) by Thinking like a Product Manager
- SRE Case Study: Mysterious Traffic Imbalance
- SRE Case Study: Triaging a Non-Heap JVM Out of Memory Issue
- SRE Classroom - How to Design a Distributed System in 3 Hours
- SRE Classroom, Or, How to Design a Reliable Distributed System in 3 Hours
- SRE Classroom: Distributed PubSub
- SRE for [cyber]security
- SRE Playbook - Practical Guide
- SRE Practices & Processes
- SRE Teams #8: Loggi
- SRE Then vs SRE Now: A Balancing Act between Reflexes and Intuitive Instincts at PayPal
- SRE Weekly Newsletter
- SREcon 2016 - Netflix: 190 Countries and 5 CORE SREs
- SREcon Conversations Asia/Pacific with Karthikeyan Selvaraj and Rajesh Ramachandran, PayPal
- SREcon Conversations Asia/Pacific with Koon Seng Lim, DBS
- SRECon Past Events
- SREcon21 - Experiments for SRE
- sreekarmad
- srfraser
- srguiwiz
- sriegler
- srigsby
- Srinivas11789
- srinivas11789/pcapxray
- srodriguez1357
- sroettger
- SROS: Current Progress and Developments
- srsENB
- SRWare Iron
- ss18
- SSD
- SSD Advisory – Chrome Turbofan Remote Code Execution
- SSD Advisory – Dashlane DLL Hijacking
- SSH Agent Forwarding considered harmful
- SSH Brute-Force attack
- SSH daemon (from Niels Provos)
- SSH nodes
- SSH password vs. key authentication
- SSH-Harvester: 从OpenSSH服务器上自动获取密码
- ssh-mitm
- sshane
- sshdHooker:注入SSHD进程并记录ssh登录的密码
- SSHGuard
- sshpam:记录ssh或sudo明文密码
- Sshuttle
- sshwatch
- ssi02014
- sskaje
- SSL
- SSL & TLS Penetration Testing
- SSL certificate for a public IP address?
- SSL Checker
- SSL root certificate optional?
- SSL Test (via SSL Labs)
- ssl-enum-ciphers (NPMAP script)
- sslbl.abuse.ch
- sslcaudit
- SSLMap
- sslscan2 CLI
- SSLScrape
- sslstrip
- Sslstrip2
- sslyze
- SSM终结dll注入
- ssrebelious
- SSRF bible. Cheatsheet
- SSRF in Exchange leads to ROOT access in all instances
- SSRF in https://imgur.com/vidgif/url
- SSRF in Java
- SSRF testing - cujanovic
- SSRF Tips
- SSRF&redis
- SSRFmap: 自动化SSRF漏洞探测
- ssrf内网漫游
- SSRF漏洞的挖掘经验
- st3rv04ka
- st4nn
- STA 4273H - Large Scale Machine Learning, Winter 2015 - University of Toronto
- STA 4505H – High Frequency & Algorithmic trading - University of Toronto
- staaldraad
- Stable release
- StableCoins
- stablecoins.wtf
- STACK
- Stack Overflow
- Stack Overflow Frees Up Engineering Time with Netlify
- Stack Overflow questions
- StackExchange
- Stackoverflow - Is it secure to store passwords as environment variables (rather than as plain text) in config files?
- stacksmashing
- stacksparrow4
- StackStrings
- StaCoAn
- Stader Labs NearX attack
- stag019
- Stalkscan
- stalkscan.com
- Standards and policies on packer use
- Stanford AA228V/CS238V Validation of Safety Critical Systems Winter 2025, by Sydney Michelle Katz
- Stanford CME 200 Linear Algebra with Application to Engineering Computations autumn 2004, by Margot Gerritsen
- Stanford CME 206 Introduction to Numerical Methods for Engineering spring 2005, by Charbel Farhat
- Stanford CME 213 Introduction to Parallel Computing using MPI, openMP, and CUDA winter 2020, by Eric Darve
- Stanford CME 302 Numerical Linear Algebra autumn 2007, by Gene Golub
- Stanford CS109 Introduction to Probability for Computer Scientists I 2022 I Chris Piech
- Stanford CS229: Machine Learning Course | Summer 2019 (Anand Avati)
- Stanford CS229M: Machine Learning Theory - Fall 2021
- Stanford CS236: Deep Generative Models I 2023 I Stefano Ermon
- Stanford CS25 - Transformers United 2023
- Stanford CS330: Deep Multi-Task and Meta Learning I Autumn 2022
- Stanford EE 102 spring 1999, Introduction to Signals and Systems, by Stephen Boyd
- Stanford EE 376a winter 2011, Information Theory, by Thomas Cover
- Stanford EE274 I Data Compression: Theory and Applications I 2023
- Stanford University - Computer Security
- Stanford University - Cryptography I
- Stanford University - Cryptography II
- Stanford XCS224U: Natural Language Understanding I Spring 2023
- StanGirard
- stanhegt
- Stapler
- Star Wars:1
- starksheet.xyz
- Starling-LM-7B-beta
- Stars Arena attack
- Starting in cybersecurity ?
- Starting the Avalanche
- Startpage Image Search
- Startpage Video Search
- StartPage Web Search
- Startups
- Starving Farmer
- stas
- STAT 2.1x: Descriptive Statistics | UC Berkeley
- STAT 2.2x: Probability | UC Berkeley
- STAT 441/841 Classification Winter 2017 , Waterloo
- Stat 946 Deep Learning - University of Waterloo
- STAT-157 Deep Learning 2019 - UC Berkeley
- STAT240 - Robust Statistics - UC Berkeley
- State
- State of Automotive Cyber Safety, 2015
- State of Automotive Cyber Safety, 2016
- state of DNS rebinding for April 2023
- stately.ai
- Static analysis method on portable executable files for REMNUX based malware identification
- Static analysis of executables to detect malicious patterns
- Static features exploration for executable packing with unsupervised learning
- Static malware detection & subterfuge: Quantifying the robustness of machine learning and current anti-virus
- Static-binaries
- Statista
- Statistical Computing for Scientists and Engineers - Notre Dame
- Statistical Computing, Fall 2017 - Notre Dame
- Statistical Foundation of Reinforcement Learning - UCSD, by Yu-Xiang Wang, Spring 2021
- Statistical Inference in Big Data - University of Toronto
- Statistical Learning with Python - Stanford Online
- Statistical Machine Learning - S2023 - Benyamin Ghojogh
- Statistical Machine Learning 2020 - Ulrike von Luxburg - University of Tübingen
- Statistical Methods and Machine Learning in High Energy Physics
- Statistical Models in Computational Biology
- Statistical Physics of Machine Learning
- Statistical Rethinking Winter 2015 - Richard McElreath
- Statistical Rethinking: A Bayesian Course Using R and Stan
- Statistics - Brandon Foltz
- Statistics - CrashCourse
- Statistics 110 - Probability - Harvard University
- Statistics 202 - Statistical Aspects of Data Mining, Summer 2007 - Google
- Statistics 243 Introduction to Statistical Computing, Fall 2015 - UC Berkeley
- Statistics and Machine Learning for Astronomy
- Statistics and Telegram Tools
- statox
- STATS 250 - Introduction to Statistics and Data Analysis, UMichigan
- StatsCrop
- statscrop.com
- StatsD at Shopify
- status
- stchris
- stdin_read_to_end
- stdin_readline
- Stealing CSRF tokens with CSS injection (without iFrames)
- Stealing Rembrandts: The Untold Stories of Notorious Art Heists
- Stealing the Show: A History of Art and Crime in Six Thefts
- Stealth
- steamdatabase/valveresourceformat
- steamid
- StefanHaboeck
- StefanoDeVuono
- stefanoj3
- StefanScherer
- stefanscherer/packer-windows
- StefRe
- Steganabara
- Steganographer-一款能够帮助你在图片中隐藏文件或数据的Python隐写工具
- Steganography Online Codec
- steganography:golang 编写的图片隐写工具库
- SteganographyOnline
- Stegbreak
- Stegcloak
- StegCracker
- stegextract
- Steghide
- Stego-toolkit
- StegoCracker
- StegoIntelligence
- StegOnline
- stegseek
- Stegseek release
- Stegsolve
- steipete/Aspects
- stek29: Shenanigans, Shenanigans!
- Stellantis
- Stelo Labs
- stenographer
- step by step
- Step by Step Guide to iOS Jailbreaking and Physical Acquisition
- StephanMeijer
- stephengroat
- stephennancekivell
- stephenR
- Sterra
- Steve
- Steve-V
- stevefan1999-personal
- stevenaldinger
- StevenBlack
- StevenBlack/hosts
- StevenD33
- stevenGravy
- stevenlele
- stevesbrain
- Stick with security: YubiKey, SSH, GnuPG, macOS (2018)
- StickerYou.com
- stickies
- STIGs Benchmarks - Security Technical Implementation Guides
- Stitch
- stjepanjurekovic
- Stockpile
- stocyr
- stoffu
- STÖK - Bounty Thursdays #26
- Stolen 911
- StolenCameraFinder
- stong
- Stop buying bad security prescriptions
- Stop Google Analytics Ghost Spam HOWTO
- Stop trying to fix the user
- StopForumSpam
- Stopping a Jeep Cherokee on the Highway Remotely
- Stoq
- Storage Systems - IISC Bangalore
- storage-slots.apoorv.xyz
- Stored XSS on Facebook
- Stored XSS, and SSRF in Google using the Dataset Publishing Language
- stored.website
- storenth
- Storiesig
- Storyful
- Storyline
- StoryMap
- StoryMaps
- storyyeller/krakatau
- str_find
- str_replace
- Str0ng3erG3ek
- strace Wow Much Syscall (original)
- strace: for fun, profit, and debugging
- strace/strace
- Stract
- StrangeUSB
- STRATEGIES FOR WORKING IN UNCERTAIN SYSTEMS
- Strategies to Edit Production Data
- Stratosphere IPS
- straysheep-dev
- strazzere
- strazzere/android-scripts
- strazzere/android-unpacker
- strazzere/anti-emulator
- StreamingPhish
- Street Check
- streichsbaer
- Strengthen Your Investigatory Powers by Taking the New FOR498: Battlefield Forensics & Data Acquisition Course from SANS
- strftime
- strictlymike
- Striker
- Stripe Increment Magazine Issue 16 on Reliability
- Stripe is Silently Recording Your Movements On its Customers' Websites
- Stripping symbols from a Mach-O
- strivexjun/xantidebug
- Strong node.js
- strongbox-password-safe/strongbox
- Strongholds of the Picts: The fortifications of Dark Age Scotland
- StrongVPN
- strptime
- Struct Typer
- Structs
- Structural Analysis and Visualization of Networks
- Structural feature based anomaly detection for packed executable identification
- Structural Graph Theory - IIT Madras
- Structure of Repository
- struts2_check-用于识别目标网站是否采用Struts2框架开发的工具
- Struts2Scanner:一款Golang编写的Struts2漏洞检测和利用工具,支持并发批量检测
- Struts2VulsScanTools:Struts2全版本漏洞检测工具 19.21
- StrutsHoneypot
- strval
- stryker2k2
- STS2G-Struts2漏洞扫描Golang版-【特点:单文件、全平台支持、可在webshell下使用】
- studer
- studiomoh.com/fun/tumblr_originals
- StudPE
- Study on Human Factors and Team Culture to Improve Pager Fatigue
- stuhli/dfirtrack
- stunner:a tool to test and exploit STUN, TURN and TURN over TCP servers
- Sturdy attack
- STUXNET Scanner: A Forensic Tool
- Stuxnet’s Footprint in Memory with Volatility 2.0
- stuxnet999
- stuxnet999.github.io
- styfle
- Stylus is a Stylish fork without analytics
- su vs sudo -s vs sudo -i vs sudo bash
- su-vikas
- Sub-Domain TakeOver
- Sub3 Suite
- Subdomain Center - The World's Largest Subdomain & Shadow IT Intelligence Database
- Subdomain Center - The World's Largest Subdomain & Shadow IT Intelligence Database
- Subdomain Enumeration Tool Face-off - 2023 Edition
- SubDomain Finder
- subdomain_ipaddr
- subdomain-takeover:子域名接管扫描工具
- SubDomainizer:一个查找子域和隐藏在页面、文件夹和Github等Javascript文件中的有趣内容的工具
- SubDomainRadar.io
- Subdomains
- subDomainsBrute:高并发的DNS暴力(子域名)枚举工具
- SubFinder
- subho007
- subjs
- Sublinear Scaling in Practice: The 1k SRE Project
- Sublist3r
- Submarine Cable Map
- SubQuest
- Subreddits
- subscan.io
- subscraper
- SubSeven
- Substation
- Substitution Cipher
- Subtle Information Hackers Find in the Background of Your Social Media Photos
- Subversion: The Neglected Aspect of Computer Security
- Subverting Sysmon Application of a Formalized Security Product Evasion Methodology
- Sucuri SiteCheck
- SudhanshuC
- Sudo (LD_PRELOAD)
- sudokit
- sudouser777
- Suggested Practices For Museum Security
- SUI Move 合约审计方法/SUI Move Contract Audit Method
- sujal-choudhary
- Suleman Malik
- Sulley
- sullo
- Sumer Money attack
- Summarizing and Analyzing the Privacy-Preserving Techniques in Bitcoin and other Cryptocurrencies
- summoner001
- Sumo:1
- Sumuri Paladin
- Sun rise, noon, and set time and direction.
- SUNBURST分析其他细节
- SunCalc
- suncalc.net
- sundowndev
- SunEarthTools.com
- Sunflower_get_Password-一款针对向日葵的识别码和验证码提取工具
- sunlogin_rce:向日葵 RCE
- sunnyhaibin
- sunnyyip
- Sunset
- Sunset-Sunrise
- Sunset: dawn
- Sunset: dusk
- Sunset: Nightfall
- Sunset:decoy
- Sunset:Midnight
- Sunset:Twilight
- sunu
- SUPER Android Analyzer
- Super Mario
- super-xray
- superchain.network
- Supercharging Gdb With Pernosco
- Supercookie
- Supercookie浏览器访问指纹识别
- supercowpowers/data_hacking
- Superdesk
- superhedgy
- SuperIP
- supernaruto16
- superponible
- superponible/search-strings-extension
- superponible/volatility-plugins
- superpoussin22
- SuperRDP:修复某些版本Windows 不支持 RDP
- supersache
- SuperSandro2000
- Supershell: Supershell C2 远控平台,基于反向SSH隧道获取完全交互式Shell
- supersight.app
- SuperStormer
- supplier:主流供应商的一些攻击性漏洞汇总
- Support DeepSeek R1
- Support Discord Server
- Support Group: discord.gg/qXA4Wf4Fsm
- Support MCP Protocol
- Support QwQ-32B
- Supported Languages
- Supported Vulnerability Identifiers
- Supporter
- supports line numbers
- supra08
- Supremacy: How to analyze transactions with Cruise?
- supremepot
- Suprita-25
- Surendrajat
- SurfCanyon
- SURFcert
- SurfShark
- Surge
- Surgical Robotics Lectures - Carleton University
- Suricata
- Surveillance under Surveillance
- Surveilliance Self Defense
- Survey on malware evasion techniques: State of the art and challenges
- Surya
- SUSE
- sushi2k
- Susidy
- Sustainable Software Engineering & SREs
- sv99
- SvcHostDemo
- sveinbjornt/sloth
- svelizdonoso/logfishh
- svenstaro/genact
- svigne1
- SVN源代码泄露全版本Dump源码
- swagger-api/swagger-editor
- swagger-hack:自动化爬取并自动测试所有swagger-ui.html显示的接口
- SwaggerHub
- swagkarna
- swanandx
- SWAT
- swedishmike
- SweetPotato_Cobalt Strike-修改的SweetPotato,使之可以用于CobaltStrike v4.0
- SweetSearch - A Search Engine for Students
- SweetVishnya
- swelcher/vol2log
- SWF
- Swftools
- Swiffas
- SWIFT Kyc
- Swift Mangling
- swift_demangler
- Swift-frida
- SwiftOnSecurity Sysmon Config
- swiftonsecurity/sysmon-config
- Swiss Cows
- Swisscows
- swisskyrepo
- Switchboard
- sx:快速易用的现代化网络扫描工具
- SXF_aTrust_sandbox_bypass:深信服零信任沙箱逃逸
- SXF_SSLVPN_arbitrary_get_session:SSLVPN任意用户登录漏洞
- Sy2n0
- Sydney
- Sydney - New South Wales
- Sydney Cameras Live
- sydp
- Syft
- sygthred
- Sylas:数据库综合利用工具
- sylvain101010
- Symantec Endpoint Protection 14.0.X
- Symantec Endpoint Protection Manager
- SymbianSyMoh
- Symbol Hound
- Symbolic deobfuscation: From virtualized code back to the original
- Symbolic execution of obfuscated code
- Symbols
- Symfonos:1
- Symfonos:2
- Symfonos:3
- Symfonos:4
- Symfonos:5
- SymPack
- symphony.iohk.io
- Synalize It
- SynapsInt
- sync me
- Synchronizing folders with rsync
- Synchrony
- synnatschke.de/geo-tools/coordinate-converter.php
- Synoptic
- Synthetic types and tracing syscalls in WinDbg
- SyntheticSun
- Syntia: Synthesizing the semantics of obfuscated code
- syria.liveuamap.com
- sysinsider/usbtracker
- Sysinternals
- Sysinternals Suite
- sysmo-usim-tool
- Sysmon
- Sysmon 10.0 - New features and changes
- Sysmon 10.4 release
- Sysmon DNS Logging, Gravwell - PSW #608
- Sysmon in a Box
- Sysmon Modular
- SysmonTools
- SysPack
- System Analysis and Design - IISC Bangalore
- System Calls
- System logging
- System storages - IISc Bangalore
- System Validation, TU Delft
- systemd >= 204
- Systemd Boot Process a Close Look in Linux
- systemd/systemd#11596
- systemd/systemd#7115
- Systems - Aduni
- SystemToken-通过遍历所有进程来寻找一个以SYSTEM权限运行且所有者为 Administrators的进程后,以当前token新启一个SYSTEM权限的shell
- Systran
- SysWhispers
- SysWhispers3WinHttp: 基于SysWhispers3项目增添WinHttp分离加载功能,可免杀绕过360核晶与Defender
- syve.ai
- syzzer
- szepeviktor
- SzLam
- T-Fuzz
- T-Pack
- T-Pot
- T-Pot Honeypot Distro
- t0int1337
- t0t3m/afkit
- t14m4t:一款封装了THC-Hydra和Nmap的自动化爆破工具
- T2 Dev Team: t8012 / Apple T2 / bridgeOS
- t2linux/apple-bce-drv
- t3chn0m4g3
- T50
- t8012/demuxusb
- t8012/efivalidate
- t8012/go-aapl-integrity
- t8012/smcutil
- T81-558: Applications of Deep Neural Networks by Jeff Heaton, 2022, Washington University in St. Louis
- t94j0
- TA-Sigma-Searches
- Tableau
- Tableau Public
- Tabnabbing
- tacaswell
- Tactical, Practical, Digital Forensics - John Grim
- Tactics for Telegram OSINT
- Tagboard
- Tagdef
- TagsYouTube
- Tagul
- taichi-framework/taichi
- Taie-AutoPhishing:剑指钓鱼基建快速部署自动化
- Taie-RedTeam-OS-泰阿安全实验室-基于XUbuntu私人订制的红蓝对抗渗透操作系统
- taiE: 一键getshell集成化工具
- Tails
- Tails OS
- Taiwan Group Index
- TajangSec
- takahiroharuyama/openioc_scan
- Takajo
- Take A Moment To Refocus
- Take Advantage of Out-of-Scope Domains in Bug Bounty Programs
- takeover:子域名接管漏洞扫描工具
- Taking the next step: OSS-Fuzz in 2023
- Taknok
- Tales of old: untethering iOS 11-Spoiler: Apple is bad at patching
- talk
- Talk at NorthSec 2019
- talking-with-cars
- talkingdata/inmap
- Talkwalker
- Talkwalker Alerts
- tally.xyz
- Taming a Wild Nanomite-protected MIPS Binary With Symbolic Execution: No Such Crackme
- Taming the OOM killer
- tamjid0x01
- Tamper Resistance - a Cautionary Note
- Tampering Digital Evidence is Hard: The Case of Main Memory Images
- Tampering with Windows Event Tracing: Background, Offense, and Defense
- TamperingSyscalls:绕过 EDR 的系统调用达到免杀
- tanalam2411
- tanberry
- tandasat
- tandasat/hyperplatform
- tangalanga:Zoom会议扫描工具
- Tango
- TangyWrecker
- tanjiti 信息源
- Tanner
- tannerhelland
- TAOF
- taowu-cobalt-strike-适用于cobalt strike3.x与cobalt strike4.x的插件
- taozhiyu
- TAPIR
- Target
- Target Log
- Taringa
- Taringa (Latin America)
- taroxd
- tarunkant
- tarunKoyalwar
- TAS
- TAS - Right to Information Act 2009
- Task Scheduler Event IDs
- Task Scheduler Lateral Movement
- TaskSchedulerMisc:通过IElevatedFactoryServer 对象达到 UAC Bypass 获取 system 权限
- Tasmanian Government Job Search
- Tasmanian Police Force
- tasvideos/bizhawk
- Tater
- tatsuryu
- TAU Engine
- Taurine
- Taylor & Francis Online
- Tazeg
- tazwake/volatility-plugins
- TBBT
- TBBT:2
- tbeadle
- TBG 5
- tbpchan
- TC1977
- tcb - the alternative to /etc/shadow
- tchannels
- TCIPUTILS.com Email Test
- tclahr
- tclan126
- TCMalloc
- tcostam
- TCP 常见故障排查
- TCP—Architecture, Enhancements, and Tuning
- TCP/IP Attack Lab
- TCP1P CTF 2024: Exploring Nusantara's Digital Realm
- tcpdump
- tcpflow
- TDA555 Introduction to Functional Programming - Chalmers University of Technology
- tdebatty
- tdeekens
- tdenisenko
- tdlmatias
- Te-k
- Teach Yourself Programming in Ten Years
- Teaching Rex another TrustedBSD trick to hide from Volatility
- Team Cymru
- teardemon
- tech-interview-handbook
- techathena
- Techbytes: What The Industry Misses About Incidents and What You Can Do
- techchipnet
- TechNet-Gallery-PowerShell武器库
- Technical analysis of the checkm8 exploit
- Technical Guidance for Prison Planning
- Technical report on the cleverhans v2.1.0 adversarial examples library
- TechSupportJosh
- tecknicaltom
- Ted:1
- TedLau
- tedsalmon
- teejayen
- tegal1337/br0w
- Tehforsch
- Tehsmash
- TekDefense-Automater
- teknoraver
- tele.me
- TeleChappy
- Telega.io
- Telegoo
- Telegra.ph Search Engine
- Telegram
- Telegram App
- Telegram Bot
- Telegram bot to find which groups the person is member of.
- TELEGRAM CATALOG
- Telegram channel list
- Telegram Channels
- Telegram Channels Exchange
- Telegram channels rating
- Telegram Chinese Search
- Telegram Club
- Telegram Community
- telegram directory
- Telegram group
- Telegram Index
- Telegram Nearby Map
- Telegram Network Visualization
- Telegram OSINT
- Telegram OSINT Library
- Telegram Region
- Telegram Search Engine
- Telegram Store
- Telegram Trilateration
- Telegram Web
- Telegram 公眾索引系統
- Telegram-Cat
- Telegram-extractor
- Telegram-List
- Telegram-Sliv
- telegram.me/g4f_channel
- Telegram.org.ru
- Telegram(macOS v4.9.155353) 代码执行漏洞
- TelegramBots.info
- TelegramBox
- TelegramCatalog
- TelegramDB
- TelegramGroup
- Telegramic
- TelegramIndex
- TelegramOnlineSpy
- TelegramReader
- Telegramzy
- Telegrator
- Telegros
- Telegroups
- Telemetr
- Telemetrio
- Teleport
- Teleport Discussions
- teleport 堡垒机任意用户登录漏洞
- Telescan
- Telesco
- TeleTarget
- Teleteg
- Telethon (For Creating Custom Tools)
- Teller
- tellor.io
- TellowKrinkle
- Tellows
- Telltale: Netflix Application Monitoring Simplified
- Telnet and SSH as a secure alternative
- tElock
- Templating
- Temple of Doom
- TempSMS
- Tempus Fugit:1
- Tempus Fugit:3
- Tenable.io
- Tencent App Store
- tencent/bk-cmdb
- tencent/oomdetector
- tencent/tinker
- Tenderly
- Tenderly Dashboard
- Tenderly Explorer
- tennc
- tenyuhuang
- Teoma
- tepsys
- termanix
- termcolor
- TerminalController:windows/linux 远程管理:屏幕监控、键盘记录、文件管理、命令执行、内网穿透、socks5
- terminals-are-sexy
- terminals-origin/terminals
- terminaltables
- Terminator: 通过滥用zam64.sys驱动程序来终止所有EDR / XDR / AV进程
- termineter
- Terms
- Terms and Conditions
- Termux Edition.
- termux-fedora
- Termux-Kali
- termux-lazysqlmap
- Termux-Styling-Shell-Script
- termux-sudo
- termux-ubuntu
- termux-wordpresscan
- TermuxAlpine
- TermuxHackz
- Terra attack
- Terra pattern
- Terraform Bytebase Provider
- Terraform Provider
- terraserver.com
- Terrence Martin
- Tesla
- Tesla hackers explain how they did it at Defcon
- Tesla Motors
- Test Business Logic Data Validation (OTG-BUSLOGIC-001)
- Test Cross Origin Resource Sharing (OTG-CLIENT-007)
- Test from shell script if remote TCP port is open
- Test Upload of Unexpected File Types (OTG-BUSLOGIC-008)
- Test User Registration Process (OTG-IDENT-002)
- test123456654321
- Testing 2 Factor Authentication
- Testing against Brute Force attack (EXTRA-TEST-004)
- Testing Directory Traversal/File Include (OTG-AUTHZ-001)
- Testing Encyclopedias in Production
- Testing for Client Side URL Redirect (OTG-CLIENT-004)
- Testing for Code Injection (OTG-INPVAL-012)
- Testing for Cookie Attributes (OWASP)
- Testing for Cookies attributes (OTG-SESS-002)
- Testing for Cross Site Request Forgery (CSRF) (OTG-SESS-005)
- Testing for HTTP Splitting/Smuggling (OTG-INPVAL-016)
- Testing for HTTP Verb Tampering (OTG-INPVAL-003)
- Testing for Insecure Direct Object References (OTG-AUTHZ-004)
- Testing for JSON Web Token Flaw (EXTRA-TEST-006)
- Testing for Privilege Escalation (OTG-AUTHZ-003)
- Testing for Race Condition (EXTRA-TEST-15)
- Testing for Reflected Cross Site Scripting (OTG-INPVAL-001)
- Testing for Server Side Request Forgery (SSRF) (EXTRA-TEST-010)
- Testing for Server Side Template Injection (EXTRA-TEST-013)
- Testing for SQL Injection (OTG-INPVAL-005)
- Testing for XML External Entity (XXE) (EXTRA-TEST-009)
- Testing in Production at Scale
- Testing notifications
- Testing Password Reset Functionality
- testnetbridge.com
- Tests Under the Magnifying Lens
- Testssl.sh
- testwhat/smaliex
- testwill
- tetanus:用 rust 开发的一款针对 Windows 和Linux 的 C2 工具
- Teuchter
- teward
- tewinget
- Text
- text editor
- text/template
- Textures.js
- TFirewall-防火墙出网探测工具,内网穿透型socks5代理
- TFSec
- tg12
- TgCatalog
- Tgcd
- TGCF
- TgChannels
- tgdfool2
- tghosth
- Tginfo
- tgraf
- Tgram
- TGRAM β
- Tgram.io
- TgramSearch
- TGRM.SU
- TgScanRobot
- tgstat
- TGViewer
- TG頻道群組合集
- Th3inspector
- th3unkn0n
- th3unkn0n/TeleGram-Scraper
- TH3xACE
- ThaaoBlues
- thaidn
- Thales:1
- thalium/icebox
- Thammus
- than0s
- Thank you, vice.com, for a mention!
- That's Them
- That’sThem
- thatlukinhasguy1
- ThatsThem
- thatsthem (Vin Search)
- THC-Hydra
- thc-ipv6
- thc202
- The New York Times - SRE by Influence, Not Authority: How the New York Times Prepares for Large-Scale Events
- The (5th Annual) 2017 Volatility Plugin Contest is Live!
- The 1st Annual Volatility Framework Plugin Contest
- The 2015 Volatility Plugin contest is now live!
- The 2016 Volatility Plugin Contest is now live!
- The 3 R’s of SREs: Resiliency, Recovery & Reliability
- The 48 Laws of Power - Robert Greene
- The 5 principles that helped scale loveholidays
- The 6th Annual Volatility Plugin Contest and the Inaugural Volatility Analysis Contest!
- The 7 Best Social Engineering Attacks Ever
- The Absurdly Underestimated Dangers of CSV Injection
- The ADFA Intrusion Detection Datasets
- The Adventures of a Keystroke: An in-depth look into keylogging on Windows
- The Adventures of Rendezvous in Heroku’s New Architecture
- The air-gap jumpers (BlackHat talk)
- The Anatomy of a Malicious Package
- The application research of virtual machine in packers
- The Arch User Repository (AUR)
- The arms race: Adversarial search defeats entropy used to detect malware
- The Art of Deception: Controlling the Human Element of Security, Kevin D. Mitnick, William L. Simon
- The Art of Fuzzing - Demo 10: In-memory Fuzzing HashCalc using DynamoRio
- The Art of Fuzzing - Demo 6: Extract Coverage Information using DynamoRio
- The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data - Kevin Mitnick, Robert Vamosi
- The Art of Memory Forensics
- The art of memory forensics: Detecting malware and threats in Windows, Linux, and mac memory
- The Art of Network Penetration Testing
- The art of Psychological Warfare – Michael T Stevens
- The Art of Site Reliability Engineering (SRE) with Azure: Building and Deploying Applications That Endure
- The Art of Subdomain Enumeration
- The art of unpacking
- The Atlas of Economic Complexity
- The Auditors Book
- The AWS Billing Machine and Optimizing Cloud Costs
- The Bank Employee's Fraud and Security Handbook: Everything You Need to Know to Detect and Prevent Loss
- The Base-Rate Fallacy and the Difficulty of Intrusion Detection
- the basic language specification of Solidity
- The Basics of FMEA
- The Beginner's Guide to IDAPython
- The Benefits of a Reverse Proxy
- The best visualization tools for flow analysis
- THE BIG BAD WOLF - XSS AND MAINTAINING ACCESS
- The blackmarket
- The bug bounty program that changed my life
- The Bug Hunters Methodology v2.1
- The Building Blocks of a Quantum Computer: Part 1 - TU Delft
- The Building Blocks of a Quantum Computer: Part 2 - TU Delft
- The CFReDS Project
- The Challenges of Investigating Cryptocurrencies and Blockchain Related Crime
- THE Chinese wall security policy
- The Collection of Computer Science Bibliographies
- The complete guide to physical security
- The Connected Car - Ways to get unauthorized access and potential implications, 2018
- The Cookie Monster in Your Browsers
- The Cost of 100% Reliability
- The Cost to Learn Computer Forensics
- The Cross Domain Desktop Compositor: Using hardware-based video compositing for a multi-level secure user interface
- The Curse of SRE Autonomy and How to Manage It
- the cyber mentor
- The Cyber Security Hub
- The Cyberclopaedia
- The cybersecurity status of PX4
- The Daily Swig - Web security digest
- The DAO attack
- The Data and Story Library
- The Data Distribution Service (DDS) Protocol is Critical: Let's Use it Securely!
- the Database
- The Definitive Guide to Same-origin Policy
- The Definitive Security Data Science and Machine Learning Guide
- The Design and Implementation of the Tor Browser [DRAFT]
- The Design and Specification of a Security Kernel for the PDP-11/45
- The development and practice of SRE in the cloud (云端的SRE发展与实践)
- The DFIR Report
- The difference between iptables DROP and null-routing.
- The Document that Eluded AppLocker and AMSI
- The Drebin Dataset
- The Eco Friendly Web Alliance
- The Ether: Evil Science
- The evidence beyond the wall: Memory forensics in SGX environments
- The Evolution of Operating Systems
- THE EVOLUTION OF SECURITY AT RIOT
- The evolving role of operations in DevOps
- The Exploit Database
- The FatRat
- The Feather Thief: Beauty, Obsession, and the Natural History Heist of the Century
- The Frontiers of Reliability Engineering
- the full changelog
- The Gemini inc
- The GitHub Security Lab’s journey to disclosing 500 CVEs in open source projects
- The Great Debate: Is it Linux or GNU/Linux?
- The Great Heist - The Story of the Biggest Bank Robbery in History: And Why All the Money Was Returned
- The Green Web Foundation
- The guide to social meta tags
- The hack, the crash and two smoking barrels. (And all the times I (almost) killed an engineer.)
- The Hacker News
- The Hacker Playbook 3: Practical Guide to Penetration Testing
- The Hacker Playbook 3: Practical Guide to Penetration Testing
- The Hitchhiker’s Guide to Smart Contracts in Ethereum
- The Hive
- The House Shop
- The how to get the OSCP certification wiki
- The IDA Pro Book, 2nd Edition
- The inception bar: a new phishing method
- The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments
- The Information Security Practice Principles
- The infrastructure behind Twitter: efficiency and optimization
- The Infrastructure Behind Twitter: Scale
- The Inmate Search
- The Insta Stalker
- The Interceptor
- The Internals of AppLocker - Part 1 - Overview and Setup
- The Internals of AppLocker - Part 2 - Blocking Process Creation
- The Internals of AppLocker - Part 3 - Access Tokens and Access Checking
- The Internals of AppLocker - Part 4 - Blocking DLL Loading
- The iPhone Wiki
- The Ironic – And Fleeting – Volatility In NVM Storage
- The Journey to Try Harder: TJnull’s Preparation Guide for PEN-200 PWK/OSCP 2.0
- The Journey to Try Harder: TJnull’s Preparation Guide for PEN-200 PWK/OSCP 2.0
- The Jury Is In: Monolithic OS Design Is Flawed
- The Knot
- The Learning with Errors Problem: Algorithms
- THE LEGENDS OF RUNETERRA CI/CD PIPELINE
- The Lego Monolith — A Monolith Microservice Proof of Concept
- The Library 1
- The Library:2
- The Life of a Security Researcher
- The Life of Binaries
- The Limits of Social Engineering
- The Linux and Unix Nobody User
- The macOS Phishing Easy Button: AppleScript Dangers
- The Magic of Learning
- The Magpie Developer
- The Majestic Million
- The Makeup of Successful Geographically-Distributed SRE Teams: Part 1
- The Makeup of Successful Geographically-Distributed SRE Teams: Part 2
- The Malware Museum
- The Man Who Robbed the Pierre
- The Many Shapes of Site Reliability Engineering
- The Map Is Not the Territory: How SLOs Lead Us Astray, and What We Can Do about It
- The matthews correlation coefficient (MCC) should replace the ROC AUC as the standard metric for assessing binary classification
- The Merpay SRE Team: Past and future
- The Missing Semester of Your CS Education
- The Mobile Application Hacker's Handbook
- The Modern Port Scanner
- The Mon-ifesto Part 1: Metrics
- The most complete guide to finding anyone’s email
- The Most Expensive Lesson Of My Life: Details of SIM port hack
- The National Archives (UK)
- The new Facebook Graph Search – part 1
- The new Facebook Graph Search – part 2
- The new signature generation method based on an unpacking algorithm and procedure for a packer detection
- The new version of SOF-ELK is here. Download, turn on, and get going on forensics analysis.
- The Nizza Secure-System Architecture
- The OAuth 2.0 Authorization Framework
- the official documentation
- The Old Reader
- The oldest privesc: injecting careless administrators' terminals using TTY pushback
- The One Weird Trick SecureROM Hates
- The Open Syllabus Project
- The Ops in Serverless
- The Orange Book
- The Penetration Testing Execution Standard
- The Persuasion Reading List
- The Power of Habit: Why We Do What We Do, and How to Change - Charles Duhigg
- The Practice of Network Security Monitoring
- The Practice of Network Security Monitoring: Understanding Incident Detection and Response
- The Prefix WhoIs Project
- The Privacy, Security, & OSINT Show
- The process: Implementing Yelp’s failover strategy
- The Protection of Computer Software: Its Technology and Application
- The Protection of Information in Computer Systems
- The Psychology Book
- The Psychology of Interrogations and Confessions: A Handbook - Gisli H. Gudjonsson
- The quick demo: an interactive session
- The Reading List
- The ReadME Project
- The ReadME Project GitHub community articles
- The Register
- The Rekall Agent Whitepaper
- The Release Manager model
- The Release of Volatility 2.6
- the repository
- The root account (and toor)
- the SafeMath library
- The secret detection topic at Github
- The Secret Life Of JPEGs – NixIntel
- The Security Engineer Handbook
- The Security Implications of iOS Jailbreaking
- The Site Reliability Workbook from Google
- The skills we look for in Cyber Security Incident Response
- The slash after an IP Address - CIDR Notation
- The Smarts Behind Hacking Dumb Devices
- The Smoofs attack
- The Social Engineer's Playbook: A Practical Guide to Pretexting - Jeremiah Talamantes
- The Social-Engineer portal
- The spy in Moscow station
- The SRE I Aspire to Be
- The SRE Incident Response game
- The SRE Journey Continues
- The Sting
- The study of evasion of packed PE from static detection
- The toolbox of open source scanners
- The Tor Browser Hacking Guide
- The Triumph and Tragedy of .env Files
- The ULTIMATE Guide to Mastering NextDNS!
- The Ultimate Load Test
- The Ultimate OSCP Preparation Guide
- The Verica Open Incident Database
- The Volatility Foundation: Fighting for Open Source Forensics
- The Volatility team talks proactive threat hunting with memory forensics (an OSDFCon presentation)
- the wallet analyzooor Main
- the wallet analyzooor No.2
- The Web Application Hacker's Handbook
- The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws (2nd Edition)
- The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws (2nd Edition)
- The world of Site Isolation and compromised renderer
- The worst of both worlds: Combining NTLM Relaying and Kerberos delegation
- the WrongSecrets CTF Party setup
- The Xcode Build System
- The YouTube Channel Crawler
- The Zebrafish Information Network: major gene page and home page updates
- the-art-of-hacking/h4cker
- the-backdoor-factory
- the-cracker-technology/andrax-mobile-pentest
- The-Debarghya
- The-Eye
- the-P1neapple
- the-pro
- The3Hat
- the4rchangel
- theArk
- thebeanogamer/hstsparser
- TheBlackSheep and Erik
- TheBrown
- thec00n
- thedatafi.com
- TheDauntless
- TheDEFIac
- TheDS
- TheDuchy
- TheEragon
- TheEvilSkeleton
- TheFatRat
- TheFatRat - Hacking Over WAN - Embedding Payload in Original Android APK - Without Port Forwarding
- TheFatRat 1.9.6 - Trodebi ( Embed Trojan into Debian Package )
- theflakes/ultimate-forensics-vm
- thefourtheye
- thegraph.com
- TheGroundZero
- theguy147
- thehackerish
- thehackingsage/hacktronian
- thehappydinoa
- TheHarvester
- theHarvester:邮件、子域和雇员、开放端口等信息
- thehiddenwiki.org
- TheHive documentation
- TheHive-Project/awesome
- theinfosecguy
- TheiPhoneWiki's documentation on IMG4 files
- theKidOfArcrania
- thelampgod
- thelegendaryjohn
- TheLocehiliosan
- Themida
- Themida v1008 驱动程序分析,去除花指令的 IDA 文件
- themighty1
- Themis
- TheMythologist
- theopolis
- Theoretical and Computational Neuroscience Summer School - 2024 - CNeuro
- Theoretical Computer Science (Bridging Course)(Tutorial) - SS 2015
- Theory of Automata, Formal Languages and Computation - IIT Madras
- Theory of Computation - Fall 2011 UC Davis
- Theory of Computation - IIT Kanpur
- Theory of computation - Shai Simonson
- Theory of Quantum Communication - University of Waterloo - Fall 2020
- theos/theos
- Therdel
- There are no secure smartphones
- therealchiendat
- therealchjones
- therealcybermattlee
- therealdreg
- TheRealJunior
- thereisnotime/xxusbsentinel
- theresafewconors/file-system-forensics
- These Are the Tools Open Source Researchers Say They Need
- TheShiftedBit
- thesilas
- thesn10
- TheSpeedX
- thestr4ng3r
- thesurlydev
- TheTechromancer
- THEunijobs Australia
- theupdateframework/notary
- thewall
- TheWebCo
- thewhiteh4t
- thewhiteninja
- TheWover
- thewover/donut
- thexen0s
- thexifer.net
- ThexXTURBOXx
- TheYahya
- TheZ3ro
- thibaudrobin
- Thingful
- Things you may not know about Android (Un) packers: A systematic study based on whole-system emulation.
- Think Private Facebook Profiles Pages Are A Dead End? Think Again!
- thinkphp-log-analyse:ThinkPHP日志分析
- thinkphp-RCE-POC-Collection-thinkphp v5.x 远程代码执行漏洞-POC集合
- ThinkPHP2.1_RCE
- ThinkPHP5_RCE
- ThinkphpGUI:Thinkphp(GUI)漏洞利用工具,支持各版本TP漏洞检测,命令执行,getshell和日志泄露检查
- ThinkPHPLangVulCheck:一个用于自检Thinkphp多语言漏洞的工具(QVD-2022-46174-ThinkPHP远程代码执行漏洞)
- ThinkphpRCE-支持代理IP池的批量检测Thinkphp漏洞或者日志泄露的py3脚本
- thinkPHP代码执行批量检测工具
- thinkski/vinetto
- Thirty Years Later: Lessons from the Multics Security Evaluation
- this
- this article
- this document for an overview of community projects and articles
- this for more info on the nmap timing templates
- this form
- this guide
- This is how hackers hack you using simple social engineering
- This is Your President Speaking:Spoofing Alerts in 4G LTE Networks
- this post
- This SRE attempted to roll out an HAProxy config change. You won't believe what happened next...
- this topic
- this troubleshooting post
- This Waifu Does Not Exist - Gwern
- this Wikipedia article
- Thisisgeorg3
- ThisIsLegal
- thisismyrobot
- thisisshubhamkumar
- thisnumber.com
- tholenst
- Thomas Gentilhomme
- Thomas Patzke (@blubbfiction)
- thomas694
- thomasbrockmeier
- thomaslaurenson/irdnumberscanner
- thomasmerz
- Thomasnet®
- thomaspatzke
- thomasRousseau
- thomasync
- Thor
- Thorin-Oakenpants
- Thorsten-Sick
- Thread from CountZero
- THREAD_GETMEM
- Threading and Tasks in Chrome
- ThreadlessInject-BOF:通过BOF实现一种无需创建线程的新型流程注入技术(BOF implementation of @EthicalChaos's ThreadlessInject project. A novel process injection technique with no thread creation, released at BSides Cymru 2023.)
- threadreaderapp
- Threads
- ThreadStackSpoofer:线程堆栈欺骗,以此达到欺骗 AV 检查和分析注入的 shellcode
- Threat Hunt Feed
- Threat Hunting via Windows Event Logs
- Threat Hunting with ETW events and HELK — Part 1: Installing SilkETW 🏄♀🏄
- Threat Hunting with ETW events and HELK — Part 2: Shipping ETW events to HELK ⚒
- Threat intelligence and Blacklist queries
- Threat Intelligence: Taking a Fresh Look at Digital Forensics Backlogs | By Jonathan Zhang
- Threat Jammer
- Threat Miner
- Threat Modeling
- Threat Modeling - Designing for Security
- Threat modeling cheatsheet (from OWASP)
- Threat modeling for dummies
- Threat Modeling for Smart Contracts: Best Step-by-Step Guide
- Threat modeling framework for mobile communication system
- Threat modeling: 12 available methods
- Threat Modeling: Designing for Security
- Threat_Research
- Threat.Zone
- ThreatBook
- ThreatConnect Integrated Chrome Extension
- Threatcrowd
- threatfox.abuse.ch
- ThreatHunter-Playbook
- ThreatIntelligencePlatform.com
- ThreatJammer Lists
- ThreatMapper
- Threatminer
- ThreatPinch Lookup
- Three and a half ways to unpack malware using Ollydbg
- Three Basecamp outages. One week. What happened?
- Three Heads are Better Than One: Mastering Ghidra - Alexei Bulazel, Jeremy Blackthorne - INFILTRATE 2019
- Three months, 30x demand: How we scaled Google Meet during COVID-19
- Three roads lead to Rome
- Three security tactics for every IT leader to consider this fall
- Three-EyedRaven: 内网探测工具
- Thresher – To check heap reachability properties
- Throwback
- Thug
- Thunder Brawl attack
- Thunderbird
- ThunderEX
- ThunderSearch:闪电搜索器,GUI图形化渗透测试信息搜集工具
- Thwarting real-time dynamic unpacking
- tiaghoalves
- tiagoCMatias
- tiann/epic
- tianzhou
- Tiaonmmn
- Tib3rius
- Tibor Hercz @tiborhercz
- Tick Tock by xerub
- ticketer.py
- tickr.ai
- TIDoS-Framework
- tidusjar
- tigattack
- Tiger Team (TV series)
- Tiger.ch
- tigre-bleu
- tihmstar/img4tool
- Tik-tok
- Tiki-toki
- TikTok
- TikTok OSINT: targeted user investigation (Part 1/3: User)
- TikTok: three persistent arbitrary code executions and one theft of arbitrary files
- tillprochaska
- Time Based Security
- Time Protection: The Missing OS Abstraction
- time_unix
- Time-Based CAN Intrusion Detection Benchmark
- Time-based One-Time password
- Timeflow
- Timeline
- Timeline Explorer
- Timeline of Bitcoin Events Demonstrates Online Currency’s Volatility
- timeline.knightlab.com
- timeliner
- TimelineSec-2020年漏洞复现大全
- Timers
- Timesketch
- Timetoast
- timgates42
- timleland
- TimmyOVO
- timoles
- timschneeb
- timvahlbrock
- timvisee/ffsend
- Tinder
- Tinder’s move to Kubernetes
- Tines
- TinEye
- TinEye Reverse Image Search
- tineye.com
- tinfoleak
- tini-tools-针对红蓝对抗各个场景使用的小工具-【主要是Java写的工具】【目前有phpstudy.jar和域名转IP工具.jar】
- Tiny-XSS-Payloads:超级精简的XSS payload
- tinyAdapter
- tinyboxvk
- TinyEye
- TinyML - Tiny Machine Learning at UPenn
- TinyNuke
- TinyProg
- TinyScan
- tinywall
- TIOCSTI injection
- TIOCSTI is a kernel problem.
- tioguda
- Tips and Tricks
- tips from twitter
- tips from twitter p 2
- Tips how to find private, hidden, personal groups and channels
- tishion/mmloader
- Titan
- TitanEngine Community Edition
- Titanium Platform
- TitanMist: Your first step to reversing nirvana
- tiwarishrijan
- TJCHacking
- tklauser
- tkmikan
- tl;dr sec
- tl;dr sec #72
- TL:DR: VPN leaks users’ IPs via WebRTC. I’ve tested seventy VPN providers and 16 of them leaks users’ IPs via WebRTC (23%)
- Tlgrm.eu
- TLS
- TLS - Wiki
- TLS Handshakes (via Cloudflare Learning)
- TLS notebooks
- Tls_prober
- Tls-scan
- tls.bufferover.run
- Tlsh
- Tlspuffin
- tlsx
- tmate-io/tmate
- tmciver-basis
- tmr232/sark
- tmux
- To Catch a Spy: The Art of Counterintelligence
- To Find a Better Solution, Ask a Better Question Member Feature Stories Medium
- to get more flavors
- to omit syncing the file after every logging
- To Scale In Or Scale Out? Here’s How We Scale at Dream11
- Tobaloidee
- tobigrimm
- TobiTenno
- tobtoht
- Today
- toekhaing
- Tofo
- Together
- TokcDK
- Tokeii0
- Token View
- token.unlocks.app
- tokenanalyst.io
- TokenPlayer:操纵和滥用Windows访问令牌,以达到令牌模拟、窃取、提权、bypass UAC、派生、执行 EXE等操作
- Tokens
- tokenscope.com
- tokensniffer
- tokenterminal.com
- Tokugero
- TokyoWesterns CTF 2018 - Slack emoji converter
- TokyoWesterns CTF 2019 - Slack emoji converter Kai
- tom0li
- tom0li: docker逃逸小结
- tom0li: 逻辑漏洞小结
- tom0li:个人隐私保护
- tomasharkema
- TomasTurina
- Tomato:1
- Tomb
- tomb5/tomb5
- Tomba.io
- tomcat-weak-password-scanner:tomcat后台弱口令扫描器
- TomcatWeakScan:Tomcat弱口令批量扫描器
- tomcat不出网回显
- tomchop
- tomchop/volatility-autoruns
- tomdev
- tommasobelluzzo/historicalvolatility
- Tommyboy
- tomoyamachi
- tomspencer/volatility
- tomumk
- TON + Maltego
- TON blockchain investigation tool
- Toncoin 智能合约安全最佳实践/Toncoin Smart Contract Security Best Practices
- tongda_oa_rce-通达oa 越权登录+文件上传getshell
- TongdaOA-通达OA 11.7 任意用户登录
- tonghuaroot
- toniblyx
- toniblyx/prowler
- Toofr
- Tool Analysis Result Sheet
- Tool to visualize graph of transactions
- Tool-X
- ToolB0x
- Toolbag
- Tools
- Tools 101: Volatility Usage
- Tools and Frameworks
- tools.web-max.ca
- tools/fstools
- toolset:免杀小小工具集
- toolske.com/text2sql
- Toolsley
- toolsmith #109: CapLoader network carving from Rekall WinPmem Memory Image
- toolsmith #112: Red vs Blue - PowerSploit vs PowerForensics
- toolsmith #115: Volatility Acuity with VolUtility
- toolsmith: Attack & Detection: Hunting in-memory adversaries with Rekall and WinPmem
- toolsmith: Memory Analysis with DumpIt and Volatility
- ToolWar | Extreme Subdomain Enumeration/Scanning on Windows : OWASP Amass
- Top 10 indexed blockchain data APIs providers
- Top 10 on-chain data APIs for developers
- Top 10 Web Hacking Techniques of 2017
- Top 11 Node.js security best practices | Sqreen.com
- Top 20 Most Popular Hacking Tools in 2023
- Top 5 Skills for a Career in Digital Forensics
- Top 6 tools to enable crypto data visualization in your application
- Top Data Integrations & OSINT Tools for Cryptocurrency Investigations by Maltego
- top explained visually
- Top Vizualization Tools
- Top-10-web-hacking-techniques-of-2018
- Topics
- Topix
- Toppo:1
- topscoder
- tor
- TOR and CDNs
- Tor Browser
- Tor Bulk Exit List
- Tor Project
- Tor-0day-Finding-IP-Addresses
- tor-detect-middleware
- tor.link
- Tor2Web
- TorBot - Open Source Intelligence Tool for the Dark Web
- Torch
- torghost
- Toriptables2
- Torment
- tornaco/x-apm
- Tornado
- Tornado Cash In-Depth
- Tornado.cash - Dune DashBoard
- TornadoCash Eth in pool - Dune DashBoard
- TorontoMedia
- TorPCAP:Tor网络取证分析技术
- Torrent downloads and distributions for IP
- TorrentFreak List of VPNs
- TorScrapper
- Torshammer
- torusrxxx
- tosmolka
- touhidshaikh
- Toutatis
- TovStalin
- Toward Engineering a Secure Android Ecosystem: A Survey of Existing Techniques
- Toward forensically sound cryptocurrency investigation
- Toward generic unpacking techniques for malware analysis with quantification of code revelation
- Towards High Assurance HTML5 Applications
- Towards paving the way for large-scale Windows malware analysis: Generic binary unpacking with orders-of-magnitude performance boost
- Towards static analysis of virtualization-obfuscated binaries
- Townscript
- toXXSin
- toxydose
- toyodadoubi/doubi
- tp_scan:thinkphp 一键化扫描工具 优化版
- tpetry
- tplmap
- Tpwn
- TP漏洞集合利用工具py3版本-来自奇安信大佬Lucifer1993
- tqdm
- Tr0ll 1
- Tr0ll 2
- Tr0ll:3
- TR19: Automotive Penetration Testing with Scapy
- TR22: UDS Fuzzing and the Path to Game Over
- TR23: V2GEvil: Ghost in the wires
- tr33n
- tr4ceflow
- Trace child process with frida on macOS
- Trace Labs OSINT VM
- TraceDroid
- Traces of Windows remote command execution
- TraceTheCode
- Tracing processes for fun and profit
- Tracing Real-Time Distributed Systems
- Tracing Shellcode Execution from VBA Macros
- Tracing SRE’s journey in Zalando - Part I
- Tracing SRE’s journey in Zalando - Part II
- Tracing SRE’s journey in Zalando - Part III
- Tracing, Fast and Slow: Digging into and Improving Your Web Service's Performance
- Track Trace (Cargo)
- Track Trace (Lading)
- Track Trace Post
- Tracking A Bitcoin Scam with Maltego & Tatum
- Tracking Bitcoin Transactions
- Tracking Bitcoin Transactions on the Blockchain
- Tracking Photo’s Geo-location with GPS EXIF DATA – Forensic Analysis | By Bala Ganesh
- Tracking ships and visualize them in QGIS
- TrackOut
- tracktx.io
- Tracy
- TraderStf
- Tradezone Europages
- Trading Economics
- tradingstrategy.ai
- Traefik
- Traefik Kubernetes CRD
- Traefik Kubernetes Ingress
- Traffic Cameras
- Traffic Forecasting and Stress Testing Infrastructure
- Traffic Interception for Penetration Testing Engagements
- Traffic Live NSW
- TrailDiscover
- trailofbits/cb-multios
- trailofbits/pe-parse
- Training
- Training by The Volatility Project Now Available In Three Continents!
- Training material
- Training Site Reliability Engineers
- traitor
- Trammell Hudson - Yubikey (2020)
- Tranco List
- Tranco Research Paper
- transaction-simulation-alchemy
- Transcending transcend: Revisiting malware classification in the presence of concept drift
- transfer:集合多个API的大文件传输工具(go 编写跨平台,适合渗透测试传输文件上传出网)
- Transformation and Evaluation of the MIMIC Database in the OMOP Common Data Model: Development and Usability Study
- Transforming an ELF executable into a library
- transifex-integration
- Translate.com
- translating KeeWeb
- Transmission Control Protocol ( rfc793 )
- Transmit.exe
- Transparency.org Corruption Perception Index
- Transparent California
- Transport Tasmania
- transpose.io
- TRAP
- trape
- Travel By Drone
- travi
- Travic
- TravisCI
- traviscibot
- TravisLeaks
- Tre:1
- treaz
- treefort
- Treeverse
- tremor021
- Trend Micro Threat Discovery Appliance - Session Generation Authentication Bypass (CVE-2016-8584)
- Trend Micro Zero Day Initiative
- Trending
- TrendMicro CTF 2018 Qual - Forensics 300
- TrendMicro CTF 2019 Qual - Forensics 300
- trendmicro/defplorex
- Trends24
- Trendsmap
- Tresorit
- Trevisan LinkedIn Boolean Search Generator
- trevorbryant
- TRExpertWitness
- tria.ge
- tribalchicken/volatility-bitlocker
- tribalchicken/volatility-filevault2
- Trickbot version 1000512 and gtag ono51, drops new nwormDll64 module - includes 12hour PCAP
- Trickbot w/ GTAG MAN6 and version 1000507 - Uses revocation.txt config
- Trickbot w/ GTAG tt002 and version 1000509, 12 hour PCAP w/ beacons
- trickest-workflows
- TricksterShubi
- TrID
- Triggered: Incident #1234 (incident process needs fixing)
- trimstray
- Trip Report: Techno Security & Forensics Investigations Conference
- TripleCross:A Linux eBPF rootkit with a backdoor
- Triscuit2311
- Triton
- TritonDSE
- Trivy
- trizin
- TRM Labs
- trofi
- TrojanCockroach.cpp
- TrojanCockroach.lnk
- trojanizer
- Trollcave
- trolldbois/python-haystack
- trolldbois/python-haystack-reverse
- Trooclick
- Troubleshooting
- Troubleshooting 502 errors: ECS Checklist
- Troubleshooting High I/O Wait in Linux
- Troubleshooting Issues with GPG
- Troubleshooting Segmentation Violations/Faults
- Troubleshooting: A journey into the unknown
- trouger
- Trovando
- Trove
- Troy Hunt on Controlling Nissans
- Troy:更高级的免杀webshell生成工具
- trpt/usbdeath
- True Caller
- True People Search
- trueblocks.io
- Truecaller
- Truehunter
- truepeoplesearch.com
- TrueSkrillor
- trufae
- Truffle
- TruffleHog
- trufflesuite/ganache-cli
- Trust But Verify
- Trust in Apple's Secret Garden: Exploring & Reversing Apple's Continuity Protocol-Slides
- Trusted Network Interpretation (272 pages)
- TrustedPath-UACBypass-BOF:Beacon object file implementation for trusted path UAC bypass
- TrustedSec
- TrustedSec | Upgrade Your Workflow, Part 1: Building OSINT Checklists
- TrustedSec Podcast
- TrustedSec Sysmon Community Guide
- TrustSwap attack
- Trustworthy Machine Learning - Winter Semester 2023-2024, University of Tübingen
- Trustworthy Machine Learning - Winter Semester 2024-2025, University of Tübingen
- TruthFinder
- Try2Hack
- tryethernal.com
- TryHackMe
- TryHackMe | 0day
- TryHackMe | 25 Days of Cyber Security
- TryHackMe | Active Reconnaissance
- TryHackMe | Advent of Cyber 1 [2019]
- TryHackMe | Advent of Cyber 2 [2020]
- TryHackMe | Advent of Cyber 2022
- TryHackMe | Advent of Cyber 3 (2021)
- TryHackMe | Agent Sudo
- TryHackMe | All in One
- TryHackMe | Android Hacking 101
- TryHackMe | Anonforce
- TryHackMe | Anonymous
- TryHackMe | Anonymous Playground
- TryHackMe | Anthem
- TryHackMe | Archangel
- TryHackMe | Aster
- TryHackMe | Atlas
- TryHackMe | AttackerKB
- TryHackMe | Attacking ICS Plant #1
- TryHackMe | Attacking ICS Plant #2
- TryHackMe | Badbyte
- TryHackMe | Baron Samedit
- TryHackMe | Bash Scripting
- TryHackMe | Basic Malware RE
- TryHackMe | Basic Pentesting
- TryHackMe | battery
- TryHackMe | Binary Heaven
- TryHackMe | Biohazard
- TryHackMe | Blaster
- TryHackMe | Blog
- TryHackMe | Blue
- TryHackMe | Blueprint
- TryHackMe | Boiler CTF
- TryHackMe | Bolt
- TryHackMe | Bookstore
- TryHackMe | Borderlands
- TryHackMe | Bounty Hacker
- TryHackMe | Brainpan 1
- TryHackMe | Break it
- TryHackMe | Break Out The Cage
- TryHackMe | broker
- TryHackMe | Brooklyn Nine Nine
- TryHackMe | Brute It
- TryHackMe | Buffer Overflow Prep
- TryHackMe | Burp Suite: Repeater
- TryHackMe | Burp Suite: The Basics
- TryHackMe | Bypass Disable Functions
- TryHackMe | c4ptur3-th3-fl4g
- TryHackMe | Carnage
- TryHackMe | Carpe Diem 1
- TryHackMe | Cat Pictures
- TryHackMe | CC: Ghidra
- TryHackMe | CC: Pen Testing
- TryHackMe | CC: Radare2
- TryHackMe | CC: Steganography
- TryHackMe | CCT2019
- TryHackMe | CherryBlossom
- TryHackMe | Chill Hack
- TryHackMe | Chocolate Factory
- TryHackMe | Chronicle
- TryHackMe | Cicada-3301 Vol:1
- TryHackMe | Classic Passwd
- TryHackMe | CMesS
- TryHackMe | CMSpit
- TryHackMe | Cold VVars
- TryHackMe | ColddBox: Easy
- TryHackMe | Content Discovery
- TryHackMe | Conti
- TryHackMe | ConvertMyVideo
- TryHackMe | Cooctus Stories
- TryHackMe | Couch
- TryHackMe | Crack the hash
- TryHackMe | Crack The Hash Level 2
- TryHackMe | Crocc Crew
- TryHackMe | Cryptography for Dummies
- TryHackMe | CTF collection Vol.1
- TryHackMe | CTF collection Vol.2
- TryHackMe | CVE-2021-41773/42013
- TryHackMe | Cyber Scotland 2021
- TryHackMe | CyberCrafted
- TryHackMe | Cyborg
- TryHackMe | Daily Bugle
- TryHackMe | Dav
- TryHackMe | Dave's Blog
- TryHackMe | Debug
- TryHackMe | Deja Vu
- TryHackMe | Develpy
- TryHackMe | Different CTF
- TryHackMe | Dirty Pipe: CVE-2022-0847
- TryHackMe | Disk Analysis & Autopsy
- TryHackMe | DLL HIJACKING
- TryHackMe | DNS in detail
- TryHackMe | DNS Manipulation
- TryHackMe | dogcat
- TryHackMe | Dumping Router Firmware
- TryHackMe | Dunkle Materie
- TryHackMe | DVWA
- TryHackMe | Easy Peasy
- TryHackMe | En-pass
- TryHackMe | Encryption - Crypto 101
- TryHackMe | EnterPrize
- TryHackMe | envizon
- TryHackMe | ffuf
- TryHackMe | For Business Reasons
- TryHackMe | Forensics
- TryHackMe | Fortress
- TryHackMe | Fowsniff CTF
- TryHackMe | Fusion Corp
- TryHackMe | GameBuzz
- TryHackMe | GamingServer
- TryHackMe | Gatekeeper
- TryHackMe | Geolocating Images
- TryHackMe | Ghizer
- TryHackMe | Git and Crumpets
- TryHackMe | Git Happens
- TryHackMe | GLITCH
- TryHackMe | GoldenEye
- TryHackMe | Google Dorking
- TryHackMe | Gotta Catch'em All!
- TryHackMe | h4cked
- TryHackMe | HA Joker CTF
- TryHackMe | Hacker of the Hill #1
- TryHackMe | hackerNote
- TryHackMe | harder
- TryHackMe | HaskHell
- TryHackMe | hc0n Christmas CTF
- TryHackMe | Hip Flask
- TryHackMe | History of Malware
- TryHackMe | How to use TryHackMe
- TryHackMe | HTTP in detail
- TryHackMe | Hydra
- TryHackMe | Ice
- TryHackMe | Ignite
- TryHackMe | Inclusion
- TryHackMe | Inferno
- TryHackMe | Injection
- TryHackMe | Internal
- TryHackMe | Intro PoC Scripting
- TryHackMe | Intro to IoT Pentesting
- TryHackMe | Intro to LAN
- TryHackMe | Intro To Pwntools
- TryHackMe | Intro to x86-64
- TryHackMe | Introduction to Django
- TryHackMe | Introduction to Flask
- TryHackMe | Introduction to OWASP ZAP
- TryHackMe | Introductory Networking
- TryHackMe | Introductory Researching
- TryHackMe | Investigating Windows
- TryHackMe | Investigating Windows 2.0
- TryHackMe | Investigating Windows 3.x
- TryHackMe | Iron Corp
- TryHackMe | ISO27001
- TryHackMe | Jack-of-All-Trades
- TryHackMe | Jacob the Boss
- TryHackMe | JavaScript Basics
- TryHackMe | Jeff
- TryHackMe | JPGChat
- TryHackMe | Juicy Details
- TryHackMe | Jupyter 101
- TryHackMe | JVM Reverse Engineering
- TryHackMe | KaffeeSec - SoMeSINT
- TryHackMe | Kenobi
- TryHackMe | kiba
- TryHackMe | KoTH Food CTF
- TryHackMe | KoTH Hackers
- TryHackMe | Kubernetes Chall TDI 2020
- TryHackMe | LazyAdmin
- TryHackMe | Learn and win prizes
- TryHackMe | Learn and win prizes #2
- TryHackMe | Learn Linux
- TryHackMe | Learn Rust
- TryHackMe | Learning Cyber Security
- TryHackMe | LFI Basics
- TryHackMe | Lian_Yu
- TryHackMe | Library
- TryHackMe | Linux Agency
- TryHackMe | Linux Backdoors
- TryHackMe | Linux Function Hooking
- TryHackMe | Linux Fundamentals Part 1
- TryHackMe | Linux Fundamentals Part 2
- TryHackMe | Linux Fundamentals Part 3
- TryHackMe | Linux Modules
- TryHackMe | Linux PrivEsc
- TryHackMe | Linux PrivEsc Arena
- TryHackMe | Linux Privilege Escalation
- TryHackMe | Linux Server Forensics
- TryHackMe | Linux Strength Training
- TryHackMe | Looking Glass
- TryHackMe | Lunizz CTF
- TryHackMe | M4tr1x: Exit Denied
- TryHackMe | Madeye's Castle
- TryHackMe | Madness
- TryHackMe | magician
- TryHackMe | MAL: Malware Introductory
- TryHackMe | MAL: Researching
- TryHackMe | Meltdown Explained
- TryHackMe | Memory Forensics
- TryHackMe | Metamorphosis
- TryHackMe | Metasploit
- TryHackMe | Metasploit: Introduction
- TryHackMe | Mindgames
- TryHackMe | Misguided Ghosts
- TryHackMe | MITRE
- TryHackMe | Mnemonic
- TryHackMe | Mobile Malware Analysis
- TryHackMe | Motunui
- TryHackMe | Mr Robot CTF
- TryHackMe | Musical Stego
- TryHackMe | Mustacchio
- TryHackMe | NahamStore
- TryHackMe | Nax
- TryHackMe | NerdHerd
- TryHackMe | Nessus
- TryHackMe | Networking
- TryHackMe | Ninja Skills
- TryHackMe | Nmap
- TryHackMe | Nmap Live Host Discovery
- TryHackMe | OhSINT
- TryHackMe | One Piece
- TryHackMe | OpenVAS
- TryHackMe | OpenVPN
- TryHackMe | OverlayFS - CVE-2021-3493
- TryHackMe | Overpass
- TryHackMe | Overpass 2 - Hacked
- TryHackMe | Overpass 3 - Hosting
- TryHackMe | OWASP Juice Shop
- TryHackMe | OWASP Mutillidae II
- TryHackMe | OWASP Top 10
- TryHackMe | Passive Reconnaissance
- TryHackMe | Peak Hill
- TryHackMe | Pentesting Fundamentals
- TryHackMe | Phishing: HiddenEye
- TryHackMe | Physical Security Intro
- TryHackMe | Pickle Rick
- TryHackMe | Polkit: CVE-2021-3560
- TryHackMe | Poster
- TryHackMe | Principles of Security
- TryHackMe | Printer Hacking 101
- TryHackMe | Psycho Break
- TryHackMe | pyLon
- TryHackMe | Python Basics
- TryHackMe | Python Playground
- TryHackMe | Ra
- TryHackMe | Racetrack Bank
- TryHackMe | Recovery
- TryHackMe | Red Stone One Carat
- TryHackMe | Red Team Recon
- TryHackMe | Regular expressions
- TryHackMe | Relevant
- TryHackMe | REloaded
- TryHackMe | REmux The Tmux
- TryHackMe | Retro
- TryHackMe | Revenge
- TryHackMe | Reverse Engineering
- TryHackMe | Reversing ELF
- TryHackMe | REvil Corp
- TryHackMe | Road
- TryHackMe | Rocket
- TryHackMe | RootMe
- TryHackMe | RustScan
- TryHackMe | SafeZone
- TryHackMe | Sakura Room
- TryHackMe | Searchlight - IMINT
- TryHackMe | Shaker
- TryHackMe | Shodan.io
- TryHackMe | Simple CTF
- TryHackMe | Smag Grotto
- TryHackMe | Solar, exploiting log4j
- TryHackMe | Source
- TryHackMe | Splunk
- TryHackMe | Spring
- TryHackMe | SQHell
- TryHackMe | SQL Injection
- TryHackMe | SQL Injection Lab
- TryHackMe | Squid Game
- TryHackMe | SSTI
- TryHackMe | Starting Out In Cyber Sec
- TryHackMe | Startup
- TryHackMe | StuxCTF
- TryHackMe | Sublist3r
- TryHackMe | Sudo Buffer Overflow
- TryHackMe | Sudo Security Bypass
- TryHackMe | Super-Spam
- TryHackMe | Sustah
- TryHackMe | Sweettooth Inc.
- TryHackMe | Team
- TryHackMe | That's The Ticket
- TryHackMe | The Blob Blog
- TryHackMe | The Cod Caper
- TryHackMe | The find command
- TryHackMe | The Great Escape
- TryHackMe | The Hacker Methodology
- TryHackMe | The Impossible Challenge
- TryHackMe | The Marketplace
- TryHackMe | The Server From Hell
- TryHackMe | Theseus
- TryHackMe | Thompson
- TryHackMe | tmux
- TryHackMe | toc2
- TryHackMe | Tokyo Ghoul
- TryHackMe | tomghost
- TryHackMe | Tony the Tiger
- TryHackMe | Toolbox: Vim
- TryHackMe | Tor
- TryHackMe | TShark
- TryHackMe | Tutorial
- TryHackMe | UltraTech
- TryHackMe | Unbaked Pie
- TryHackMe | Undiscovered
- TryHackMe | Unstable Twin
- TryHackMe | Uranium CTF
- TryHackMe | USTOUN
- TryHackMe | Volatility
- TryHackMe | Vulnerabilities 101
- TryHackMe | VulnNet
- TryHackMe | VulnNet: dotjar
- TryHackMe | VulnNet: dotpy
- TryHackMe | VulnNet: Internal
- TryHackMe | VulnNet: Node
- TryHackMe | Vulnversity
- TryHackMe | Walking An Application
- TryHackMe | Watcher
- TryHackMe | Web Scanning
- TryHackMe | WebAppSec 101
- TryHackMe | WebGOAT
- TryHackMe | WebOSINT
- TryHackMe | Wekor
- TryHackMe | Welcome
- TryHackMe | Wgel CTF
- TryHackMe | What is Networking?
- TryHackMe | Why Subscribe
- TryHackMe | Wifi Hacking 101
- TryHackMe | Willow
- TryHackMe | Windows Fundamentals 1
- TryHackMe | Windows Fundamentals 2
- TryHackMe | Windows Fundamentals 3
- TryHackMe | Windows PrivEsc
- TryHackMe | Windows PrivEsc Arena
- TryHackMe | Windows x64 Assembly
- TryHackMe | Wonderland
- TryHackMe | Wordpress: CVE-2021-29447
- TryHackMe | WWBuddy
- TryHackMe | Year of the Dog
- TryHackMe | Year of the Fox
- TryHackMe | Year of the Jellyfish
- TryHackMe | Year of the Owl
- TryHackMe | Year of the Pig
- TryHackMe | Year of the Rabbit
- TryHackMe | You're in a cave
- trymoose
- tryshadow.xyz
- ts2date
- TsarFox
- tscookie_data_decode
- tscookie_decode
- tsh:一个开源的 UNIX 后门
- tshtun:Py写的tsh的流量加解密过程
- TSK
- tsl0922/ttyd
- tslint-plugin-security
- tsteur
- TsumiHokiro
- Tsunami
- tsybenko
- tteck
- ttffdd
- TTProtect
- TTSL
- TTY Input Pushback Privilege Escalation
- Tubuep
- TUe Numerical Linear Algebra 2021, by Martijn Anthonissen
- tulir
- TUM IN2346 Introduction to Deep Learning Fall 2024, by Daniel Cremers
- Tumblr
- Tumblr Originals
- Tumblr Search
- TUN
- TunnelBear
- TupleType
- Turbinia API server
- Turbinia client CLI tool
- Turbinia Python API library
- Turbo Intruder
- TurboDiff
- turing-technician/fasthook
- Turjo Chowdhury @turjoc120
- turkmenkaan
- Turkojan
- Tutanota
- Tutela
- tutela.xyz
- Tutorial
- Tutorial - Debugging In Source Code With IDA Pro
- Tutorial 8: Linux Binary Protections
- Tutorial for creating security.txt (Pieter Bakker)
- Tutorial miasm
- Tutorial on privilege escalation and post exploitation tactics in Google Cloud Platform environments
- tutorial video
- Tutorial Videos
- Tutorial-Analyzing GSM with-Airprobe and Wireshark
- Tutorial: An overview of malware detection and evasion techniques
- Tutorials in docs/tutorials
- Tuts 4 You
- Tuts 4 you - UnPackMe (.NET)
- Tuts 4 you | unpackme
- Tuts4You community
- tututu-patch
- tux-mind
- TuxSH
- tvfischer/ps-srum-hunting
- TVS_extractor
- Twazzup
- twbirthday
- TwChat
- tweepsect
- Tweet Tag
- Tweet4me
- TweetArchivist
- TweetBeaver
- TweetDeck
- TweetMap
- Tweetpaths
- TweetPsych
- Tweetreach
- tweetreach.com/
- TweetStats
- TweetTunnel
- Twellow
- twelvelabs
- Tweriod
- tweska
- Twiangulate
- Twicsy
- Twilio
- Twilio SRE Gameday Template
- TwiMap - Explore Twitter on the Map
- Twingly
- twintproject/twint
- Twipho
- Twipu
- Twisted-honeypots
- Twitonomy
- TwitRSS
- Twitter
- Twitter - Hiring Great SREs
- Twitter : @adrien_jeanneau
- Twitter : @R_Marot
- Twitter Account Analytics by burrrd.
- Twitter Audit
- Twitter Cards
- Twitter Chat Schedule
- Twitter Counter
- Twitter Fall
- Twitter Hack Addresses and Transactions
- Twitter Nansen - Moivre
- Twitter Search
- Twitter Search Advanced
- Twitter Search Basics
- Twitter Search Engine
- Twitter Search Tool - Search For Tweets
- Twitter Shadowban Test
- Twitter Social Graph
- TWITTER XSS + CSP BYPASS
- twitter-79
- twitter.com/search-advanced
- Twitterfall
- Twitter承认未经允许将用户数据与广告商共享
- Twlets | Twitter to Excel
- Two Excel docs that drop Netwire, includes C2 check-ins
- Two Formal Analyses of Attack Graphs
- Two techniques for detecting packed portable executable files
- twofactorauth.org
- twpayne
- TWUBS Twitter Chat
- Tx eth samczsun
- tx-data.surge.sh
- tx.cool
- tx.eigenphi.io
- tx2uml
- txio view react
- TXM & SPTM
- TXT Record Lookup (via MxToolbox)
- TXT Records - Wiki
- TXT Records (via Cloudflare Learning)
- txtool
- txt文本文件去重及导入数据库处理
- tylerbrock/mongo-hacker
- tylerha97/findevil
- Type enforcement chapter (from SELinux book)
- Typhoon : 1.02
- Typical hacker errors leading to deanon
- typoon
- Typora
- Tyrrrz
- tyrrrz.me/donate
- tzi
- U.S. Automotve Cyber Security Summit
- U.S. Government Commercial Cloud Services (C2S) baseline inspired by CIS v2.1.1
- U039b
- UA: Literally Vulnerable
- UAC
- UAC Bypass by Mocking Trusted Directories
- UAC is not all that bad really
- UAC绕过初探
- Uber XSS via Cookie
- UberATC
- Ubersuggest
- uBlock
- uBlock Origin
- Ubuntu
- Ubuntu 24.04 LTS
- Ubuntu CVE Tracker
- Ubuntu-gdm3-accountsservice-LPE
- UC Berkeley CS 161 Computer Security, Summer 2021, by Nicholas Ngai and Peyrin Kao
- UC Berkeley CS 182 / 282a Deep Learning spring 2023, by Anant Sahai
- UC Berkeley CS 189 / 289A Introduction to Machine Learning fall 2023, by Jennifer Listgarten & Jitendra Malik
- UC Berkeley CS 189 Introduction to Machine Learning (CDSS offering) spring 2022, by Marvin Zhang
- UC Berkeley CS 194/294-196 Large Language Model Agents Fall 2024, by Dawn Song & Xinyun Chen
- UC Berkeley CS 194/294-267 Understanding Large Language Models Foundations and Safety spring 2024, by Dawn Song & Dan Hendrycks
- UC Berkeley CS 198-96 Introduction to Neurotechnology fall 2020
- UC Berkeley CS 294-165 Sketching Algorithms fall 2020, by Jelani Nelson
- UC Berkeley CS184/284A Computer Graphics and Imaging Spring 2022, by Ren Ng
- UC Berkeley EE 120 Signals and Systems spring 2019, by Murat Arcak
- UC Berkeley EE 123 Digital Signal Processing fall 2003, by Avideh Zakhor
- UC Berkeley EE 225B Digital Image Processing spring 2006, by Avideh Zakhor
- UC Berkeley EECS 16B Designing Information Devices and Systems II fall 2020, by Seth Sanders, Miki Lustig
- UC Berkeley EECS16A Designing Information Devices and Systems I summer 2020, by Grace Kuo, Panos Zarkos, Urmita Sikder
- UC Berkeley Math 55 Discrete Mathematics fall 2021, by Nikhil Srivastava
- UC Berkeley STAT 150 Stochastic Processes spring 2021, by Brett Kolesnik
- UC Davis MAT 133 Mathematical Finance Spring 2024, by Matthias Köppe
- UC Davis MAT 168 Optimization winter 2024, by Matthias Köppe
- UC San Diego COGS 118A Supervised Machine Learning fall 2020, by Jason Fleischer
- UC San Diego COGS 118B Unsupervised Machine Learning winter 2024, by Jason Fleischer
- UC San Diego COGS9 Introduction to Data Science fall 2020, by Jason Fleischer
- UC San Diego/edX DSE 220X Machine Learning Fundamentals, by Sanjoy Dasgupta
- UC Santa Barbara ME 269 Network Systems, Dynamics and Control fall 2021, by Francesco Bullo
- UC Santa Cruz CSE 101 Intro to Data Structures and Algorithms fall 2022, by Seshadhri Comandur
- UC Santa Cruz CSE 104, 204 Computational Complexity spring 2022, by Seshadhri Comandur
- UC Santa Cruz CSE 201 Analysis of Algorithms winter 2022, by Seshadhri Comandur
- UC Santa Cruz CSE 202 Combinatorial Algorithms spring 2021, by Seshadhri Comandur
- UC Santa Cruz CSE 290A Randomized Algorithms spring 2020, by Seshadhri Comandur
- UCBrowser
- UCF
- ucgJhe
- uckelman-sf
- UCL Course 2015 on Reinforcement Learning by David Silver from DeepMind
- UCLA Secure UNIX
- UCLA STAT 100C Linear Models spring 2023, by Arash Amini
- UCLA Stats 10 Introduction to Statistical Reasoning summer 2022, by Miles Chen
- UCLA Stats 101C Statistical Models and Data Mining summer 2022, by Miles Chen
- UCLA Stats 102A Introduction to Computational Statistics with R winter 2024, by Miles Chen
- UCLA Stats 102B Computation and Optimization for Statistics spring 2024, by Miles Chen
- UCLA Stats 102C Introduction to Monte Carlo Methods fall 2023, by Miles Chen
- UCLA Stats 15 Introduction to Data Science fall 2022, by Miles Chen
- UCLA Stats 200B Theoretical Statistics winter 2024, by Arash Amini
- UCLA Stats 200C High-dimensional Statistics spring 2022, by Arash Amini
- UCLA Stats 203 Large Sample Theory fall 2021, by Jingyi Jessica Li
- UCLA Stats 205 Hierarchical Linear Models spring 2024, by Jingyi Jessica Li
- UCLA Stats 21 Python and Other Technologies for Data Science spring 2024, by Miles Chen
- UCLA Stats 231C Theories of Machine Learning spring 2022, by Arash Amini
- UCLA Stats C161/C261 Introduction to Pattern Recognition and Machine Learning winter 2024, by Arash Amini
- UCLA Stats M254 Statistical Methods in Computational Biology spring 2024, by Jingyi Jessica Li
- UCSD CS291A Differential Privacy Fall 2021, by Yu-Xiang Wang
- UCSD CS292F Convex Optimization Spring 2020, by Yu-Xiang Wang
- UCSD MATH 273B Information Geometry and its Applications winter 2022, by Melvin Leok
- UCSD Math 280 Probability Theory and Stochastic Processes, by Todd Kemp
- Udacity's Self Driving Car Engineer Course
- UDcide
- Udemy - How to Do SRE When You Have No SRE
- Udemy - Learn Social Engineering from Scratch
- UDP vs TCP, how much faster is it?
- udpme:从协议层面借助 EDNS0 过滤掉有问题的 UDP 报文
- udpx: UDPX是一个用Go语言编写的单包UDP扫描器,速度快,重量轻,支持发现超过45个服务,并能添加自定义服务
- UDSim
- UEFI Defensive Practices Technical Report
- UEFI Lockdown Quick Guidance
- uEmu
- UF EML 6934 Optimal Control spring 2012, by Anil V. Rao
- UFADE
- Ufgraph
- UFONet
- Uglify
- UHBCRU - Ultimate Hosts Blacklist Central Repo Updater
- UHBIRU - Ultimate Hosts Blacklist Test Launcher
- UHBW - Ultimate Hosts Blacklist Whitelist
- UhOh365
- UID/GID Synchronization and Management (original)
- uidsploit
- UIUC CS 420 / ECE 492 / CSE 402 Introduction to Parallel Programming for Scientists and Engineers fall 2015, by Sanjay Kale
- UIUC CS 498 ABD / CS 598 CSC Algorithms for Big Data fall 2020, by Chandra Chekuri
- UIUC CS 588 Autonomous Vehicle System Engineering fall 2021, by David Forsyth
- UIUC ECE 408 / CS 408 Applied Parallel Programming spring 2018, fall 2022, by Wen-mei Hwu, Sanjay Patel
- UIUC ECE 490 Introduction to Optimization fall 2020, by Venugopal V. Veeravalli
- UIUC ECE 508 / CS 508 Manycore Parallel Algorithms spring 2019, by Wen-mei Hwu
- UIUC ECE 534 Random Processes fall 2020 - Ilan Shomorony
- UIUC Math 564 Applied Stochastic Processes fall 2016, by Kay Kirkpatrick
- UIUC STAT 437 Unsupervised Learning spring 2024, by Tori Ellison
- UK Birth Adoption Register
- UK NCSC - Logging Made Easy WEC (Windows Event Collection) Configuration File
- UK Phone Book
- UK Web Archive
- Ukface
- uknowsec / Active-Directory-Pentest-Notes
- Ukrainci
- ukraine.liveuamap.com
- UkrOpen
- UlisesGascon
- Ullaakut
- Ultimate Crypto Tools Thread
- Ultratools ipv6Info
- umair-rhl
- umap.openstreetmap.fr
- UMass CS685: Advanced Natural Language Processing (Spring 2022)
- Umbrella
- umutoztunc
- umutphp
- UN COMTRADE Database
- UN Data
- Una base de datos espacial integrada en un Sistema de Información Geográfica para la gestión del terroir: un nuevo sistema consistente e interactivo
- Unactived
- unauthorized_com: 未授权检测的命令行版,支持批量检测
- UNC Comp533 - Distributed Systems Spring 2020
- unc0ver
- Uncertify
- uncognic
- Uncompyle
- Unconditional self-modifying code elimination with dynamic compiler optimizations
- Unconference: Unsolved Problems in SRE
- Uncovering Planned Obsolescence Practices in Robotics and What This Means for Cybersecurity
- UNCTAD Country Fact Sheets
- UNCTAD Investment Country Profiles
- UNCTAD STAT
- Under the Hood: Ensuring Site Reliability
- Undergrad Complexity Theory at CMU
- undergraduate machine learning at UBC 2012, Nando de Freitas
- Undergraduate Probability with Professor Roman Vershynin
- Underground
- Understand UNIX/Linux Inodes Basics with Examples
- Understanding API Security
- Understanding Business Metrics Can Make You a Better SRE
- Understanding Cryptology: Core Concepts
- Understanding Cryptology: Cryptanalysis
- Understanding Discretionary Access Control In Trusted Systems
- Understanding Docker container escapes
- Understanding how DLL Hijacking works
- Understanding IP Addresses
- Understanding Linux CPU Load - when should you be worried?
- Understanding linux malware
- Understanding Privilege Escalation
- Understanding Quantum Information and Computation - Qiskit
- Understanding the basics of Linux Binary Exploitation
- Understanding usbmux and the iOS lockdown service
- UNDPs Human Development Index
- Une DOC AUTOMATIQUE avec SchemaSpy (et SYMFONY et GITLAB)
- Unearthing Malicious And Other “Risky” Open-Source Packages Using Packj
- UNECE
- UNESCO Institute for Statistics
- unfuck: Python 2.7 字节码反混淆器
- unfurl
- Unguard
- Unicode Domains are bad and you should feel bad for supporting them
- Unicorefuzz
- Unicorn
- Unicorn - The ultimate CPU emulator
- Unicorn Engine
- Unicornafl
- unicornsasfuel
- UniCourt
- UNIDO Statistical Databases
- Unified Audit Log
- Unified Host and Network Dataset
- Unified Hosts AutoUpdate
- Unified Reporting of Service Reliability
- Unikernels: The Next Stage of Linux’s Dominance
- Unipacker
- Unique Kaspersky AV User ID Allowed 3rd-Party Web Tracking
- Unique Machine
- Uniscan
- Unit Tests
- United States Digital Service - Lessons Learned in Black Box Monitoring 25,000 Endpoints and Proving the SRE Team's Value
- Unity Technologies - Being Reasonable about SRE
- Universal Privilege Escalation and Persistence
- Universal Scammer List
- Universal XSS via Evernote WebClipper
- University of Crete, Computer Science video lectures (mostly Greek language lectures, very few 100% English-speaking courses). Very popular CS destination for European Erasmus students
- University of Maryland - Cryptography
- University of Maryland - Hardware Security
- University of Maryland - Software Security
- University of Maryland - Usable Security
- University of Maryland CMSC828U Algorithms in Machine Learning: Guarantees and Analyses fall 2020, by Furong Huang
- University of Twente Discrete Optimization, by Marc Uetz
- University of Washington - Essentials of Cybersecurity
- University of Washington - Finding Your Cybersecurity Career Path
- University of Washington - Introduction to CyberSecurity
- University of Washington EE514A/EE515A - Information Theory I/II fall 2013, by Jeff Bilmes
- University of Wisconsin-Madison CS/ECE 561 - Probability and Information Theory in Machine Learning fall 2020, by Matthew Malley
- University of Wisconsin-Madison CS/ECE/ISyE 524 Introduction to Optimization spring 2017-18, by Laurent Lessard
- University of Wisconsin-Madison ECE 332 Feedback Control Systems fall 2021, by Steven Fredette
- University of Wisconsin-Madison ECE/CS/ME 532 Matrix Methods in Machine Learning fall 2017, by Laurent Lessard
- University of Wisconsin-Madison ISyE/Math/CS 728 Integer Optimization (second part of the course) spring 2020
- University of Wisconsin-Madison ISyE/Math/CS/Stat 525 Linear Optimization fall 2021, by Alberto Del Pia
- uniwhales.io
- Unix / Linux Cheat Sheet
- unix-privesc-check
- Unix-Privilege-Escalation-Exploits-Pack
- Unix-User
- unk0unk0unk0
- Unknown malcode detection using OPCODE representation
- unknowndevice64 v2.0
- Unknowndevice64:1
- unknwon
- Unleashing D* on Android Kernel Drivers
- Unleashing the Hayabusa Feathers: My Top Features Revealed!
- unleashnfts.com
- Unlinker
- Unloading the Sysmon Minifilter Driver
- UnlockECU
- Unmasking the Social Engineer: The Human Element of Security - Christopher Hadnagy, Dr. Ekman Paul
- Unmasking Venom Spider
- Unpacking Android APKs with Medusa
- Unpacking Android malware with Medusa
- Unpacking framework for packed malicious executables
- Unpacking Gootkit Malware With IDA Pro and X64dbg - Subscriber Request
- Unpacking Gootkit Part 2 - Debugging Anti-Analysis Tricks With IDA Pro and x64dbg
- Unpacking Process Injection Malware With IDA PRO (Part 1)
- Unpacking Process Injection Malware With IDA PRO (Part 2)
- Unpacking Pykspa Malware With Python and IDA Pro - Subscriber Request Part 1
- Unpacking techniques and tools in malware analysis
- Unpacking the Packed Unpacker: Reverse Engineering an Android Anti-Analysis Native Library
- Unpacking VB6 Packers With IDA Pro and API Hooks (Re-Upload)
- Unpacking virtualization obfuscators
- Unpacking, reversing, patching
- UnpacMe
- Unpckarc
- Unquoted Service Path
- UNQUOTED SERVICE PATHS
- unrar-cve-2022-30333-poc:unRAR 6.11之前版本存在目录穿越漏洞
- Unscoping entities
- UNStats Social Indicators
- Unsupervised clustering machine learning on packed executable
- Unsupervised Learning (STAT 841), Winter 2017
- UNSW-NB15 data set
- Untangling Exotic Architectures with Binary Ninja
- unterwulf
- UnThemida: Commercial obfuscation technique analysis with a fully obfuscated program
- Untitled Goose Tool
- Unveiling Bitcoin Nodes: A Comprehensive Guide for Beginners 2023
- unveilr: 小程序反编译工具
- UnverifiedAppLockerBypasses.md
- UnverifiedAppLockerBypasses.md
- uovobw
- UPack
- Update about the October 4th outage
- Update Tools
- Update: Elasticsearch lessons learnt for Advanced Global Search
- Updates
- Updating API Keys
- upgoingstar
- Upgrade self XSS to Exploitable XSS an 3 Ways Technic
- upgradehub.xyz
- Upgrading Pinterest operational metrics
- Upsala Conflict Data Program
- Uptane
- Uptodown
- uptoratlen
- uptux
- UPX
- UPX-Scrambler
- urbanadventurer
- URIX OS
- UrkFace
- URL content buster
- URL Decode and Encode
- URL ECCENTRICITIES IN JAVA
- URL Redirection - Wiki
- url_decode
- url_encode
- url_escape
- url_join
- url_parse
- url_unescape
- urldna.io
- Urldns:通过 Urldns 链来探测是否存在某个类,以便针对性的使用攻击链
- urless
- URLextractor
- urlfinder
- URLFinder:类似JSFinder的golang实现,更快更全更舒服
- URLhaus
- urlhaus.abuse.ch
- urllib3
- urlQuery
- urlquery.net
- URLs
- Urlscan.io
- URLVoid
- US Air Space Map
- US Data and Statistics
- US Nav Guide
- US NSA Spotting the Adversary with Windows Event Log Monitoring
- US Search
- us-19-Tsai-Infiltrating-Corporate-Intranet-Like-NSA
- US-CERT
- USA Data Search
- Usable Security Course
- Usage
- usamavarikkottil
- usarmyresearchlab/dshell
- USB Anti Forensic Tool: usbdeath
- USB Cleaver
- USB Forensics - Find History of Connected USB | Data Stolen By USB?
- USB-C Port Controller (ACE) Secrets
- USB2CAN
- usbmon
- USBPcap
- usbrip / Инструменты Kali Linux
- usbrip: USB-форензика для Линуксов, или Как Алиса стала Евой / Форум информационной безопасности Codeby.net
- Usbrip:用于跟踪USB设备固件的简单CLI取证工具
- usbrip/cron/usbrip.cron
- USBtin
- USBvalve-tbfa-Mod
- uscada
- USDT 假充值手法
- use a JPN copy of Puyo Puyo Tetris to launch the webapplet
- Use cases of data and Schemaspy: Database Management
- Use DNS Rebinding to Bypass SSRF in Java
- Use Docker
- Use Helm charts (community)
- Use Linux user namespaces to fix permissions in docker volumes
- Use Mitaka to Perform In-Browser OSINT to Identify Malware, Sketchy Sites, Shady Emails & More
- Use Sysmon DNS data for incident response
- Use Terraform (community)
- Use-after free in leveldb
- use-dns-data-produce-threat-intelligence
- user
- User Datagram Protocol ( rfc768 )
- User Documentation
- User Information Generator Articles
- User Login & Consent Example
- User Manual
- User Search
- User Searcher
- User Sherlock
- User-Agent Switcher and Manager
- User-Agent Switcher for Chrome
- User-Computer Authentication Associations in Time
- user202729
- UserInfoBot
- Username Check
- Username History Bot
- UserRegEnum_0x727: 域内普通域用户权限查找域内所有计算机上登录的用户
- usersearch.org
- USGS Earth Explorer
- USGS Land Sat
- Using a combination of measurement tools to extract metrics from open source projects
- Using a Custom Startup Sound on a Power Macintosh G3 Blue and White
- Using access keys as source argument
- Using access keys in scripts
- Using Bash for DevOps
- Using Burp and Postman, Brad Schiff explain Cookies, Sessions, JSON Web Tokens (JWT) - thanks!
- Using ChatOps to help Actions on-call engineers
- Using DNS Traffic Management to Add Resiliency to Shopify’s Services
- Using Docker to execute jobs
- Using entropy analysis to find encrypted and packed malware
- Using Fault-Injection to Improve our new Runtime Platform’s Reliability
- Using Flight Tracking For Geolocation – Quiztime 30th October 2019 – NixIntel
- Using IDAPython to Make Your Life Easier, Part1
- Using IDAPython to Make Your Life Easier, Part2
- Using IDAPython to Make Your Life Easier, Part3
- Using IDAPython to Make Your Life Easier, Part4
- Using IDAPython to Make Your Life Easier, Part5
- Using IDAPython to Make Your Life Easier, Part6
- Using iOS 11.2-11.3.1 Electra Jailbreak for iPhone Physical Acquisition
- Using Log Data as Forensic Evidence
- Using Maltego and tatum to track the money trail of a bitcoin scam
- Using Maltego with netlas.io plugin
- Using ML to Automate Dynamic Error Categorization
- Using Model Checking to Analyze Network Vulnerabilities
- Using modern observability to establish a data-driven culture
- Using osquery for remote forensics
- Using PRDs and User Journeys to Design User-Friendly Tools
- Using Serial kdb / kgdb to Debug the Linux Kernel - Douglas Anderson, Google
- Using Social Engineering Tactics For Big Data Espionage
- Using SSH agent forwarding
- Using Sysmon and ETW For So Much More - Binary Defense
- Using Sysmon and ETW For So Much More | By David Kennedy
- Using Sysmon in Azure Sentinel
- Using Tableau Dashboards as Visualization Tool for MIMIC-III Data
- Using Team Cymru’s MHR with Volatility
- Using the Sun and the Shadows for Geolocation
- Using Volatility for Introspection
- Using Volatility in Cyber Triage to Analyze Memory
- Using Xcode Targets
- Using Yara rules with Volatility
- usnjrnl_dump
- usphonebook.com
- USSearch
- USV
- USV:2017
- UT Austin ECE 381V Bandits and Online Learning fall 2021, by Sanjay Shakkottai
- UT Dallas CS 7301 Advanced Topics in Optimization for Machine Learning spring 2021, by Rishabh Iyer
- utf8_decode
- Utilizing GitHub Actions for gathering Subdomain & Exploit Intelligence
- Utilizing GitHub Actions for gathering Subdomain & Exploit Intelligence
- UTLS
- UTopia
- Utrace
- UTXO Model
- UTXO model in Bitcoin Vs Account/Balance Model Ethereum
- UTXO VS Account Model
- UU
- Uundo
- Uunp (IDA Pro plugin)
- UUP
- UVA DEEP LEARNING COURSE
- UVRX
- UVRX Search
- UW AMATH 584 Applied Linear Algebra & Introductory Numerical Analysis fall 2005, by Loyce Adams
- UW AMATH 584 Applied Linear Algebra & Numerical Analysis by Nathan Kutz
- UW ECON 484 Econometrics and Data Science spring 2020, by Gregory Duncan
- UW Madison CS 320 Data Programming II spring 2021, by Tyler R. Caraza-Harter
- UW Madison CS 354 Machine Organization and Programming spring 2020, 2021, by Michael Doescher
- UW Madison CS 368 C++ for Java Programmers Fall 2020, by Michael Doescher
- UWP版EDGE浏览器被发现将用户安全标识符和网址发送给微软分析
- uWSGI vs. Gunicorn, or How to Make Python Go Faster than Node
- uxmal/reko
- uxss-db
- uzil
- UzTelegram
- v_jstools:模仿着写一个开源的 chrome 插件,用来快速调试前端 js 代码
- V-Rico
- V0lk3n
- V0lt
- v1.1
- v1.2
- v1.3
- v1.4
- v1.5
- v1.6
- v1.7
- v1.8
- v1.9
- v1a0
- v1s7
- V2
- v2-dev
- v3daxt
- v7hinc/wooyun
- vabs tutorial
- Vacuum
- vadimcn/vscode-lldb
- vaf-非常先进的Web Fuzzer工具
- Vagrant
- vaguileradiaz
- vaibhavpandeyvpz/apkstudio
- VainlyStrain
- ValdikSS
- ValekoZ
- valentinradu
- valga
- Valid.Network
- validator
- validcube
- validemail.io
- Validin
- Validin LLC
- ValidNumber.com
- valioDOTch
- valitraitors.info
- ValueDeFi attack
- VAmPI
- Vancir
- Vane11ope
- Vanguard - Cloudy with a Chance of Chaos
- vanillagorillaa
- vapi:API漏洞练习靶场
- varc
- VARIoT
- Varna
- VAST
- VastBlast
- Vault
- vault.png
- VB2015 paper: VolatilityBot: Malicious Code Extraction Made by and for Security Researchers
- VBA
- VBA stomping resources by the Walmart security team
- VBad
- VBAs
- VbScrub
- vbty
- vbulletin5-rce利用工具(批量检测/getshell)
- VcenterKiller:一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005,提供一键上传webshell,命令执行或者上传公钥使用SSH连接
- VCL rules for hit-for-pass
- VCL rules for hits
- vcsmap
- vdloo
- vechain core nodes security checklist
- Vector Attack Scanner – To search vulnerable points to attack
- Vector Calculus for Engineers - HKUST
- vector35/binaryninja-api
- VEDAS Advisories
- veggiespam
- Vegile - Ghost In The Shell
- Vehicle History (Make/Model & Vin Search)
- Vehicle History (Plate Search)
- Vehicle History Reports
- Veil Framework
- Veles
- Velociraptor
- Velociraptor Walkthrough and Hayabusa Integration
- Venacus
- vencakrecl
- Venngage
- Venom
- Venom Shellcode Generator
- venshine/decompile-apk
- Veoh
- VeraCrypt
- Vercel.py
- Verification Handbook
- VerifiedAppLockerBypasses.md
- VerifiedAppLockerBypasses.md
- Verify Email
- verify-email.org
- Verifying Smart Contracts using Blockscout
- Verisign
- verocloud/obsidian-mindmap-nextgen
- Version (beta)
- version has to be <7.66.0
- version/tag
- versionista
- versions
- Vessel Finder
- Vessel Tracker
- Vezir-Project
- Vfat.Tools
- Vfuzz
- vgpastor
- VHD虚拟磁盘+BitLocker加密
- VHostScan
- vhpcdpgl
- VIA4CVE
- ViaMichelin
- viardant
- Viblo CTF
- VIC - Freedom of Information Act 1982
- vicferpoy
- VicOne
- Vicroads Victoria
- Victim contract
- Victim contract 2
- Victim:1
- Victoria Drake
- Victorian Government Job Search
- Victorian Police Force
- victorlpgazolli
- VidaHasan
- Vidar sample with data exfil via ZIP file
- Video
- Video #1
- Video #2
- Video #3
- Video #4
- Video #5
- VIDEO DEMO
- Video Lectures of Wulfram Gerstner: Computational Neuroscience - EPFL
- Video Now Available - #DFIRFIT or BUST: A Forensic Exploration of iOS Health Data
- Video prediction notebook
- Video Stabilization Methods
- View in Google Earth
- View2aKill
- ViewDNS
- ViewDNS.info
- Viewing text files from the shell prompt
- Vigenere Cipher
- Vigilante.pw
- ViHoMa
- Vijay Kumar
- Vijay-P
- vikas171999
- vikke1234
- vikman90
- vikwin/pcapfex
- VillanCh
- VIM Cheatsheet
- Vimeo
- Vin decoderz (Vin Search)
- Vin Place
- Vin-Info
- Vincebye
- vincentcox/stacoan
- VINCheck® | National Insurance Crime Bureau
- vinckr
- Vineeth Jagadeesh @djvinnie
- VineLink
- vinicel
- viniciusmarangoni
- Violator
- Violent Python : A Cookbook for Hackers (2013)
- Violent Python and Exploit Development
- Viper Framework
- Viper-msf(metasploit-framework)图形界面
- virajchitnis
- ViRb3
- virb3/trustmealready
- vircar
- Virdoexhunter
- virgo-o
- virink
- virt-manager
- Virtual machine obfuscation
- Virtual Memory System
- Virtual Private Network (VPN) Lab
- Virtual Radar
- Virtual Reality - IIT Madras
- VirtualBox
- VirtualBox or VMWare hypervisor
- VirtualHacking Repo
- Virtualization
- Virtualization Management
- VirtualMachineObfuscationPoC
- virusdefender
- ViruSign
- VIRUSNET
- VirusSamples
- VirusShare
- VirusTotal
- VirusTotal domain information
- Virustotal with apikey
- virustotal/yara
- Vis.js
- vis.occrp.org
- Vis0r
- vishnoisuresh
- Visibility into Loggers (and Other Low Level Services)—Seeing the Trees from the Forest
- Visme
- Visor Finance attack
- VisUAL ARM Simulator
- Visual Studio
- Visual Threat
- Visualise Blockchain Transactions in Gephi
- Visualization
- Visualization of Bitcoin Transactions for Forensic and Security Analysis
- Visualization of Blockchain Data: A Systematic Review
- Visualization Tools - EVM
- Visualize ERC20 token transfers in Truffle Tests
- Visualize Free
- Visualize the bitcoin blockchain Transforms in Maltego
- Visualize.me
- visualizing bitcoin transactions in 3d and virtual reality
- Visualizing blockchain transactions with Maltego
- Visualizing Hayabusa results in Elastic Stack
- visually
- VisualPharm
- visualping
- visualsitemapper.com
- vitaly-kamluk/bitscout
- vitaly-t/pg-promise
- vitalysim
- VitaShell
- vitor-fernandes
- vitoriario
- vivalavladislav
- Vivaldi
- vivekperkawar
- vixentael
- Viz38
- Vizala
- vjerci
- vjyanand
- VK Community Search
- VK Parser
- VK People Search
- VK to RSS Appspot
- VK Watch
- VK5
- VKontakte
- vlad-s
- VLANS vs. subnets for network security and segmentation
- vldrk
- VltraHeaven
- vmatsiiako
- VMAttack: Deobfuscating virtualization-based packed binaries
- VMHunt
- VMHunt: A verifiable approach to partially-virtualized binary code simplification
- VMpc
- VMProtect
- VMRay
- VMRay IDA Plugin v1.1: Streamlining Deep-Dive Malware Analysis
- VMRe: A reverse framework of virtual machine protection packed binaries
- VMUnpacker
- VMware
- VMware vCenter RCE 漏洞踩坑实录——一个简单的RCE漏洞到底能挖出什么知识
- VMware_vCenter:VMware vCenter版本小于7.0.2.00100的未授权任意文件读取+SSRF+XSS
- VMX_INTRINSICS
- voat
- vogelsgesang
- Voice over LTE implementations contain multiple vulnerabilities - CERT ALERT
- Void2Steppin
- voided
- voidz0r
- VoilaNorbert
- Voipwardialer
- Vokaysh
- Volafox
- Volatile Memory Extraction: The Volatility Framework
- Volatility - Update All The Things
- Volatility – An advanced memory forensics framework
- Volatility 1.3 is out!
- Volatility 2.3 and FireEye's diskless, memory-only Trojan.APT.9002
- Volatility 2.3 Released! (Official Mac OS X and Android Support)
- Volatility 2.4 at Blackhat Arsenal - Defeating Truecrypt Disk Encryption
- Volatility 2.4 at Blackhat Arsenal - Reverse Engineering Rootkits
- Volatility 2.4 at Blackhat Arsenal - Tracking Mac OS X User Activity
- Volatility 3 and WSL 2 - Linux DFIR Tools in Windows?
- Volatility at Black Hat USA & DFRWS 2014
- Volatility at Black Hat USA & DFRWS 2015!
- Volatility Bot
- Volatility Bot: Automated Memory Analysis
- Volatility Memory Analysis Article Featured in eForensics Magazine
- Volatility Memory Forensics and Malware Analysis Training in Australia!
- Volatility Plugin for Detecting Cobalt Strike Beacon
- Volatility Plugin for Detecting RedLeaves Malware
- Volatility plugin for Dyre
- Volatility plugin for PlugX updated
- Volatility Profiles and Windows 10
- Volatility rules...any questions?
- Volatility The advanced memory forensics framework v1.4 released
- Volatility The advanced memory forensics framework v2.3 available (Support of OSX)
- Volatility Update: Core team is growing!
- Volatility Updates Summer 2015
- Volatility v2.4 – Art of Memory Forensics Released
- Volatility Windows Command Reference
- Volatility: 2.2 is Coming Soon
- Volatility3
- Volatility3 CheatSheet
- Volatility3 Inodes Plugin
- Volatility3 Prefetch Plugin
- volatilityfoundation/community
- volatilityfoundation/profiles
- volatilityfoundation/volatility
- volatilityfoundation/volatility3
- VolatilityPro: 一款用于自动化处理内存取证的Python脚本,并提供GUI界面
- Volcano
- VolgaCTF 2018 - Corp Monitoring
- VolgaCTF 2019 - shop
- VolgaCTF 2020 - library
- VolgaCTF 2020 Qualifier - User Center
- VolgaCTF 2021 - Static Site
- VolgaCTF 2021 Qual - JWT
- volokitinss
- Voltage Finance attack
- VoLTE Phreaking - Ralph Moonen
- VolUtility
- vorburger
- vorburger/ed25519-sk.md
- VoroninMichael
- Vortex
- vortexau
- Vortyne
- Voter Records
- VPN Comparison by That One Privacy Guy
- VpsEnvInstall:一键部署VPS渗透环境
- vreale
- VS Code plugin
- VS CODE钓鱼
- vscan:开源、轻量、快速、跨平台 的红队(redteam)外网打点扫描器,功能 端口扫描(port scan) 指纹识别(fingerprint) nday检测(nday check) 智能爆破 (admin brute) 敏感文件扫描(file fuzz)
- VScode
- VSCode Marketplace - gera2ld.markmap-vscode
- Vscode Solidity Inspector
- vscode.blockscan.com
- vshell:基于蚁剑控制台编写的rat,使用蚁剑远程控制主机
- Vsitut
- vSphere Hypervisor
- VT-IDA Plugin
- vtasio
- VTchromizer
- vtnerd
- Vue
- Vue.js
- vulcandth
- VulDB
- Vuldroid
- Vulfocus-一个漏洞集成平台,将漏洞环境 docker 镜像,放入即可使用,开箱即用
- vulhub
- VulIoT: DIR-816 823g系列路由器漏洞利用
- vulmap-Web漏洞扫描和验证工具,可对Web容器、Web服务器、Web中间件以及CMS等Web程序进行漏洞扫描,并且具备漏洞利用功能
- Vulmon
- Vuln_Bulid: 自建漏洞环境库【fastjson、jxc、log4j、ssrf、shiro、ofcms等】
- vuln-regex-detector
- VulnApp
- VulnCheck KEV
- VulnCheck XDB
- VulnDroid
- Vulnerabilities
- Vulnerability as a service: Heartbleed
- Vulnerability as a service: Shellshock
- Vulnerability Exploit & website Hacking for Dummies
- Vulnerability Lab
- Vulnerability Response Process
- vulnerability-lab:OA/中间件/框架/路由器相关漏洞
- vulnerability-paper:渗透测试、PTE、免杀、靶场复现、hw、内网后渗透、oscp、等收集文章
- Vulnerability-Wiki:一个综合漏洞知识库,集成了Vulhub、Peiqi、Edge、0sec、Wooyun等开源漏洞库
- Vulnerability-不定期从棱角社区对外进行公布的一些最新漏洞
- vulnerability: 收集、整理、修改互联网上公开的漏洞POC
- vulnerability0lab
- Vulnerable Android Application
- Vulnerable Flask Web App
- Vulnerable Out of the Box: An Evaluation of Android Carrier Devices
- Vulnerable SOAP Web Service
- Vulnerable WordPress Installation
- vulnerable-AD:使用powershell脚本创建一个带有域漏洞的域环境
- VulnerableAndroidAppOracle
- VulnerableLightApp
- vulners
- Vulners.com
- VulnHub
- Vulnhub Pentester Lab: S2-052
- Vulnhub.com
- VulnIQ
- VulnLab
- Vulnnet Active
- Vulnnet Roasted
- VulnOS: 1
- VulnOS: 2.0
- vulnReport-安服自动化脚本:包括 Nessus、天境主机漏洞扫描6.0、APPscan、awvs等漏洞报告的整理,Google翻译等
- VulnUni 1.0.1
- Vulnupload
- VulScanner:一款适合在渗透测试中随时记录和保存的漏洞检测工具
- VulsRepo
- vusec/vuzzer
- vuvuzela/vuvuzela
- VWGen
- VX Heaven
- VX Underground
- vx-underground.org
- vxcute
- VxSig
- vxunderground
- VXvault
- vyaspranjal33
- VyOS Integration
- vzamanillo
- W0ni
- w0rk3r
- w0rmr1d3r
- W10Privacy
- w181496
- w1kend
- W1LDN16H7
- W1ndys
- W1R3S.inc
- W3 Accessibility Tools
- W32.Stuxnet Dossier
- W34kn3ss 1
- W3af
- W3C Link Checker
- W3C Service Workers Nightly
- W3C Suborigins [DRAFT]
- w3c/webappsec
- w3c/webappsec-trusted-types
- w3challs
- w3snoop
- w4kfu
- WA
- WA - Freedom of Information Act 1992
- waall
- wabzqem
- wacker:一组脚本,可辅助对WPA3接入点执行在线词典攻击
- WACV Paper
- WADComs
- WAF - Wiki
- WAF Bypass
- WAF Bypass之webshell上传jsp与tomcat
- WAF-bypass-xss-payloads:一直更新的 bypass waf 的 XSS payload 仓库
- wafw00f-帮助你快速识别web应用是否使用何种WAF(扫描之前很有用)
- WAF建设运营及AI应用实践
- WAF绕过的捷径与方法
- wagga40
- Wagging the Dog: Abusing Resource-Based Constrained Delegation to Attack Active Directory
- wagmi.sh
- WagnerSariolli
- wagonza
- wagoodman
- WAIT: What Anime Is This?
- waiwai24
- waja
- Wakanda:1
- Walla
- Walla (Israel)
- Wallet Guard
- walletchecker.io
- walletexplorer
- walletLabels.xyz
- walletrecoveryservices.com
- Wallfux
- Wallpapers
- wand3rlust
- wanderingeek
- Wanderson-Magalhaes
- WangYihang
- wannabe1337.xyz
- Wappalyzer fingerprints
- Ward
- Warez BB
- wargio
- warmer
- warn
- warn_once
- warptangent
- Warpten
- warwire.net
- WASC
- WAScan-一款功能强大的Web应用程序扫描工具【基于python开发的命令行扫描器】
- wasm-pack
- Watch Live Survelliance Online Australia
- WatchAD2.0: WatchAD2.0是一款针对域威胁的日志分析与监控系统
- Watchdog
- watchers.pro
- watchvuln: 一个高价值漏洞采集与推送服务
- water111
- WaterDragon:水龙:用Github Action实现IP代理功能
- WATools
- Watson
- WaveAtlas: Surfing through the landscape of current malware packers
- Wavsteg
- wayback
- Wayback Machine
- Wayback Machine Archiver
- waybackpy
- waybackurls:通过在web.archive.org、virustotal.com和commoncrawl.org上获取域名所有域名的 URL
- Wayland
- Ways to minimize privileges
- Waze
- wazuh
- Wazuh Ansible
- Wazuh AWS CloudFormation
- Wazuh blog
- Wazuh Bosh
- Wazuh Chef
- Wazuh installation guide
- Wazuh Kubernetes
- Wazuh Puppet
- Wazuh Salt
- Wazuh website
- wbenny/detoursnt
- wbowling
- WCE
- wchill
- WCTF 2018 - binja - rswc
- WCTF 2020 - thymeleaf
- WCTF2019: Gyotaku The Flag
- wdahlenburg
- We can still crack you! General unpacking method for Android Packer (NO ROOT)
- We need assurance!
- we11cheng/wcshadowrocket
- Weak Apple DEP Authentication Leaves Enterprises Vulnerable to Social Engineering Attacks and Rogue Devices
- Weakest link security
- weaknetlabs/byteforce
- Weaponisation of CVE-2021-42287/CVE-2021-42278
- Weaponizing data science for social engineering: Automated E2E spear phishing on Twitter
- Weasel
- Weathering the Storm: How Early Warnings Save the Farm
- WeaverScan: 泛微oa漏洞利用工具
- Web
- Web 3.0 - Build Realtime Decentralized applications
- Web App Hacking (Hackers Handbook)
- Web Application Exploitation @ Rawsec Inventory
- Web Application Firewall (WAF) Evasion Techniques
- Web Application Firewall (WAF) Evasion Techniques #2
- Web Application Firewall Best Practices
- Web Application Penetration Testing
- WEB APPLICATION PENETRATION TESTING NOTES
- Web Application Security Zone by Netsparker
- Web Attack and Exploitation Distro (WAED)
- Web Attack Payloads
- Web Browser Access Control Lab
- Web Cache Deception
- Web Cache Poisoning
- Web Cache欺骗攻击
- Web Design Decal - HTML/CSS/JavaScript Course, University of California, Berkeley
- Web Developer Security Toolbox
- Web Developer:1
- Web Development Tutorials
- Web for Pentester
- Web for Pentester II
- Web Fusée Launcher
- Web Hacking
- Web Hacking 101 中文版
- Web Information Retrieval (Proff. L. Becchetti - A. Vitaletti)
- Web Interface
- Web Logs Secrepo
- Web page formulary brute-force
- Web Performance and Related Stories — upgrad.com
- Web Service 渗透测试从入门到精通
- Web Technologies Prof. Dr. Christoph Meinel - HPI
- Web technology for developers - HTTP
- Web Tracking Lab
- web UI
- Web User Interface
- Web_Generic
- Web_Tricks
- Web-Attack-Cheat-Sheet:web 攻击清单
- Web-Cache-Vulnerability-Scanner
- Web-Check
- web-check.xyz
- web-flow
- Web-Fuzzing-Box - Web 模糊测试字典与一些Payloads,主要包含:弱口令暴力破解、目录以及文件枚举、Web漏洞
- web-malware-collection
- Web-Security-Note
- web, 前端, javascript, nodejs, electron, babel, webpack, rollup, react, vue ...
- Web.dev metadata tags
- Web2Attack
- Web3 Security Deep Dive
- Web3 项目安全实践要求/Web3 Project Security Practice Requirements
- Web3, Crypto, Metaverse and NFT resources for OSINT investigations
- web3antivirus.io
- web3cat
- web3rekt.com
- web3sec.news
- WebAliveScan-根据端口快速扫描存活的WEB
- WebAssistant
- WebBatchRequest:使用 JAVA 编写的批量请求工具,可做获取 title 或者web存活检测
- WebBreacher
- Webcam
- Webcam Hopper
- Webcam Network
- Webcam Taxi
- Webcams Travel
- Webcast: Implementing Sysmon and Applocker
- Webcast: Windows logging, Sysmon, and ELK
- webcgi-exploits:多语言 Web CGI 接口漏洞利用
- webcitation
- webcrawl
- WebCrawler
- webdav
- WebFinery
- WebGoat.NET
- WebGun
- WebHacking
- webhacking.kr
- Webhacking.kr
- webhintio/hint
- WebKams
- Webkit docs on developer.apple.com
- weblate
- WebLogic RCE (CVE-2019-2725) Debug Diary
- weblogic T3 collections java InvokerTransformer Transformer InvokerTransformer weblogic.jndi.WLInitialContextFactory
- weblogic_exploit-weblogic漏洞利用工具【包括了weblogic常见高危漏洞的利用】
- weblogic_memshell-适用于weblogic的无shell的内存马
- Weblogic-CVE-2023-21839:Oracle WebLogic Server远程代码执行
- weblogic-framework:weblogic漏洞检测利用工具
- weblogic-framework:weblogic漏洞检测框架
- WeblogicEnvironment:weblogic 环境搭建工具
- WeblogicExploit-GUI:Weblogic漏洞利用图形化工具 支持注入内存马、一键上传webshell、命令执行
- weblogicScanner-完整weblogic 漏洞扫描工具修复版
- WeblogicTool: WeblogicTool,GUI漏洞利用工具,支持漏洞检测、命令执行、内存马注入、密码解密等
- WebMeUp
- Webmii
- Webmin <=1.920 远程命令执行漏洞 -CVE-2019-15107
- Webmin CVE-2019-15642
- Webmin Remote Code Execution (authenticated)-CVE-2019-15642
- webpack-obfuscator
- Webpackfind:类似Packer-Fuzzer的Webpack自动化信息收集工具
- WebPcap
- webprobe:一款快速探测web存活并获取title的工具
- webpwn3r
- WebReader
- WebRTC bypass CSP connect-src policies
- Webscout
- websec.fr
- websec.fr
- WebSecurity Dojo
- Webshell_Generate:用于生成各类免杀webshell
- webshell-bypassed-human:过人 webshell 的生成工具
- WebshellBypass:冰蝎 哥斯拉 WebShell bypass
- Webshell工具和分析/使用文章: awesome-webshell
- Webshell攻与防PHP
- Website
- Website Classification Dataset
- Website Evidence Collector
- Website Informer
- Website Ripper Copier
- WebSite Watcher
- WebsiteCarbon - Carbon Calculator
- WebsiteTechMiner.py
- websocket_tunnel:将tcp连接转为websocket连接使其可以通过cdn传输 支持域前置技术以隐藏域名
- websploit
- Websta
- Webstagram
- WebStorm
- webtoolsvn
- webvictim
- WebXploiter
- Web中间件常见漏洞总结
- Web安全中比较好的文章
- Web应用安全测试前期情报收集方法与工具的介绍
- Web攻防之暴力破解 何足道版
- Web日志取证分析工具
- Web缓存欺骗测试
- WeChall
- WeChat
- wechat: 微信收藏的文章【渗透、技巧相关文章】
- Weekend Project: A Custom IDA Loader Module for the Hidden Bee Malware Family
- weeman
- Weevely3
- weex-devtool
- WEF:WIFI 攻击框架
- wego.here.com
- Weibo
- Weibo (China)
- WeihanLi
- weiquan: cs维权插件
- weitieda
- weixin/miaow
- WELA (Windows Event Log Analyzer)
- WeLeakInfo
- wellmess_cookie_decode
- WerdLists
- wereii
- wernight
- WerWolv
- WerWolvTranslationBot
- Wes974
- wesinator
- wesley587
- weslly
- West Point NSA Data Sets
- West Wild:2
- Western Australia Government Job Search
- Western Australia Police Force
- Westlakef
- westonsteimel
- WestWild: 1.1
- WETH white hat attack
- Wetland
- WeWork - Learning from Learnings: Anatomy of Three Incidents
- weyung
- wfdroid-termux
- wfuzz-web应用fuzz工具kali自带工具之一
- Wfuzz初上手
- Wfuzz基本功
- Wfuzz高阶功法1
- Wfuzz高阶功法2
- wh1tenoise
- Whale Watching — On-Chain Analysis Tools In Action
- What are capabilities?
- What are Cookies (via Cloudflare Learning)
- What are DNS records? (via Cloudflare learning)
- What are segmentation faults (segfaults), and how can I identify what's causing them? (original)
- What are your favorite command line features or tricks?
- What Breaks Our Systems: A Taxonomy of Black Swans
- What can you do when you can't chmod chmod?
- What differences it will make, if i use “telinit 6” instead of “reboot” command to restart my computer?
- What do the fields in ls -al output mean? (original)
- What do Upclicker, Poison Ivy, Cuckoo, and Volatility Have in Common?
- What Do WebLogic, WebSphere, JBoss, Jenkins, OpenNMS, and Your Application Have in Common? This Vulnerability.
- What does LC_ALL=C do? (original)
- What Gets Measured Gets Fixed
- What happens when you send one DAI
- What Happens When You Type en.wikipedia.org?
- What happens when...
- What I Learned in One Year as an SRE Trainee
- What if kill -9 does not work? (original)
- What is a process, and why doesn't it get killed?
- What is a backdoor? Let’s build one with Node.js
- What is a segmentation fault on Linux?
- What is a Side-Channel Attack ?
- What is a WAF (via Cloudflare Learning)
- What is an inode as defined by POSIX?
- What is CORS?
- What is every BODY saying – Joe Navarro
- What is going on with OAuth 2.0? And why you should not use it for authentication.
- What is grep, and how do I use it? (original)
- What is HTTP/2 - The Ultimate Guide
- What Is Incremental Backup?
- What is LVM and what is it used for?
- What Is ML Ops: Solutions and Best Practices for DevOps of Production ML Services
- What Is My IP Address?
- What is my User Agent
- What is nobody user and group?
- What is Purpose of using mysql_secure_installation?
- What is Random Access Memory?
- What is Site Reliability Engineering (SRE)?
- What is SOP?
- What Is SRE?
- What is SSL (via Cloudflare learning)
- What is the algorithm used to encrypt Linux passwords?
- What is the danger in having a fully used SWAP in an Ubuntu server?
- What is the difference between 127.0.0.1 and localhost?
- What is the difference between a hard link and a symbolic link?
- What is the difference between a VLAN and a subnet? (original)
- What is the difference between CORS and CSPs? (original)
- What is the difference between curl and wget? (original)
- What is the difference between rm -r and rm -f?
- What is the difference between Unix, Linux, BSD and GNU? (original)
- What is the preferred Bash shebang? (original)
- What is the purpose of the 'nobody' user?
- What is UXSS?
- What is your favorite Linux distro and why?
- What is your IP, what is your DNS
- What is your single most favorite command-line trick using Bash?
- What is/are the advantage(s) of running applications in background?
- What it’s like to work as an embedded microservices SRE
- What permissions should my website files/folders have on a Linux webserver?
- What steps to add a user to a system without using useradd/adduser?
- What system call is used to load libraries in Linux?
- What the Microservices SRE Team are doing as SRE Evangelists
- What the SRE team wants to achieve with the development team
- What Tools Do Site Reliability Engineers Use?
- What tracking down missing TCP Keepalives taught me about Docker, Golang, and GitLab
- What we learned from an iOS app OOMs incident
- What You Didn't Know About XML External Entities Attacks
- What you should do if you think someone has stolen your crypto-assets
- What's Happening in the World of Volatility?
- What's My DNS Server?
- What's new in reNgine
- What's the advantage of synchronizing UID/GID across Linux machines?
- What's the difference between /sbin/nologin and /bin/false
- What's the Difference Between DevOps and SRE? with Seth Vargo and Liz Fong-Jones of Google
- What's the problem? (from Saydjari's book)
- What's the proper way to prepare chroot to recover a broken Linux installation?
- What's wrong with always being root?
- whataa/pandora
- WhatBreach
- WhatIsMyIPAddress
- whatismyipaddress.com
- Whats Up In Town
- whatsABI
- WhatsApp
- WhatsApp Media Decrypt
- WhatsApp取证技术:如何在未Root的Android设备上解密数据库
- Whatsmyname
- WhatsMyName Docker
- WhatsMyName-Client
- WhatsMyName-Python
- WhatsMyName-Web
- WhatWeb
- whatyoubendoing
- Wheeled Mobile Robots
- Wheest
- When does Apache log to access.log - before or after serving the request?
- When malware is packin' heat; limits of machine learning classifiers based on static analysis features
- When malware is packing heat
- When procmon trace is not enough
- When should I not kill -9 a process?
- When The Cloud Gets Dark — How Amazon’s Outage Affected Airbnb
- Where are the passwords of the users located in Linux?
- Where is my password stored on Linux?
- Where the Money Is: True Tales from the Bank Robbery Capital of the World
- Wherevent
- Which Face is Real?
- whichAlive:批量多线程探测url存活,获取基本信息(标题、ip、长度、跳转、server等)
- Whisker:一个 C# 工具,用于通过操作其 msDS-KeyCredentialLink 属性来接管 Active Directory 用户和计算机帐户,从而有效地将“影子凭据”添加到目标帐户
- WhistleMaster
- White Pages
- White Pages (AU)
- White Pages (US)
- White-hua
- White-Stingray: Evaluating IMSI Catchers Detection Applications
- WhiteIntel
- WhitePages
- WhitePages Plus (pipl)
- Whitepaper: Security Cookies
- Whitespace
- Whitewidow
- WhiteWinterWolf
- Who Am I
- Who Called Me
- WHO Data
- Who Watches the Watchmen? Keeping an Eye on Our Monitoring Systems
- whois
- Whois Arin Online
- whois.domaintools.com
- whois.net
- WhoIsHostingThis
- WhoisMind
- Whoisology
- whoisology.com
- WhoIsRequest
- WhoisXML API | OWASP Amass and WhoisXML API Are Now Integration Partners
- WhoisXMLAPI
- Whonix
- Whonow DNS Server
- whopostedwhat
- Why (and how) GitHub is adopting OpenTelemetry
- Why Are the Top Internet Companies Choosing SRE over Traditional O&M?
- Why are there 3 ranges of private IPv4 addresses?
- Why Cilium?
- Why Corporate Security Should Be Like Museums
- Why couldn't MAC addresses be used instead of IPv4|6 for networking? (original)
- Why do some system users have /usr/bin/false as their shell?
- Why do we need a 3-way handshake? Why not just 2-way?
- Why do we use su - and not just su? (original)
- Why Does (My) Monitoring Suck?
- Why doesn't HTTP have POST redirect?
- Why du and df display different values in Linux and Unix
- Why Facebook's api starts with a for loop
- Why GitHub
- Why iOS 12.4 Jailbreak Is a Big Deal for the Law Enforcement
- Why is it bad to log in as root? (original)
- Why isn’t all test automation run on the pipeline?
- Why mail() is dangerous in PHP
- Why npm lockfiles can be a security blindspot for injecting malicious modules
- Why ping uses UDP port 1025
- Why shadow your passwd file?
- Why SREs can't afford to NOT do Chaos Engineering
- Why We Killed Our End-to-End Test Suite
- Why We Swear by the RCA
- Why you should avoid running applications as root
- Why you shouldn't use ENV variables for secret data
- whyitfor
- Wi-Fi Kill
- Wickr
- widdix/aws-s3-virusscan
- wiegandm
- wiene
- Wifi Forensic Investigation using Wifihistoryview
- WiFi IMSI Catcher
- Wifi Jammer
- wifi-hacker
- WiFi-Pumpkin
- WifiBruteCrack
- wificafespots.com
- WiFiDuck
- WiFiDuck:一款通过无线键盘来注入攻击的近源渗透攻击
- Wifijammer
- WifiJammer-NG
- Wifikill
- wifimap.io
- wifiphisher
- Wifislax
- wifispc.com
- wifitap
- Wifite
- wifite2
- wifresti
- Wigle.net
- WiinkZ
- wiki
- Wiki & How-to Guide
- Wiki Leaks
- WIKI pages
- WIKI-POC-EXP:收集各大文库集合+POC+EXP(pochouse,peiqi_wiki,棱角社区,零组等)
- WIKI-POC: 漏洞库【OA以及各种web APP漏洞】
- Wikido
- wikijm
- Wikimapia
- wikimapia.org
- Wikipedia
- Wikipedia (EN)
- Wikipedia (RU)
- Wikipedia article
- wikiroutes.info
- WildList
- Wiley
- WilliamBruneau
- Willianvdv
- williballenthin
- williballenthin/python-evtx
- williballenthin/python-idb
- williballenthin/python-registry
- willinois
- willisweb
- willkrakow
- willmurphyscode
- willtrnr
- win IIS端口复用
- win-port-proxy: 添加windows端口转发的小工具
- Win32 portable executable packing uncovered
- win32kbase
- Winafl_inmemory
- WinAPI-Tricks:恶意软件使用或滥用的各种 WINAPI 技巧/功能的集合
- Winbindex
- WinDbg
- WinDbg Basics for Malware Analysis
- Windbg logviewer.exe缓冲区溢出漏洞
- WinDbg: using pykd to dump private symbols
- WinDgb
- Windows
- Windows / Linux Local Privilege Escalation Workshop
- Windows 10 Task Scheduler服务DLL注入漏洞分析
- Windows Applocker Policy – A Beginner’s Guide
- Windows Auditing Mindmap
- Windows Credentials and Memory Dumps – Part 4: Volatility & Mimikatz
- Windows Defender review 2022
- Windows Domain Hardening
- Windows elevation of privileges ToC
- Windows Event ID 4776 [SOLVED]
- Windows Event Log Analysis - Analyst Reference
- Windows Event Log Analysis with Hayabusa
- Windows Event Viewer Log (EVT)单条日志清除(三)——删除当前系统指定指定时间段evt日志记录
- Windows Event Viewer Log (EVT)单条日志清除(二)——程序实现删除evt文件指定时间段的日志记录
- Windows Events log for IR/Forensics ,Part 1
- Windows Events log for IR/Forensics ,Part 2
- Windows Exploit Suggester
- Windows Forensic Data Collection: IR-rescue
- Windows Forensics with Plaso
- Windows Hacking 之:ApplicationIntrospection & Hooking With Frida
- Windows Hello
- Windows Hosts
- Windows Implementation Libraries (WIL)
- Windows Internals - Processes Part 6 of 20 - Process related windbg commands.
- Windows IPC Fuzzing Tools
- Windows Kernel Exploits
- Windows Local Privilege Escalation
- Windows Local Privilege Escalation Cookbook
- Windows Memory Analysis
- Windows Memory Forensics Training for Analysts by Volatility Developers
- Windows Pentesting with Kali Linux v2
- Windows Post Gather Modules
- Windows Priv Esc
- Windows Privesc resources
- Windows Privilege Escalation
- Windows Privilege Escalation – Unquoted Services
- Windows Privilege Escalation — Part 1 (Unquoted Service Path)
- Windows Privilege Escalation Fundamentals
- Windows Privilege Escalation Guide
- Windows Privilege Escalation Techniques (Local) - Tradecraft Security Weekly #2
- Windows Privilege Escalation Unquoted Service - Part 1
- Windows Privilege Escalation Unquoted Service - Part 2
- Windows Privilege Escalation Unquoted Service - Part 3
- Windows Privilege Escalation via DLL Hijacking
- Windows Privilege Escalation via Unquoted Service Paths
- Windows Privilege Escalations
- Windows Process Genealogy
- Windows Process Genealogy (Update)
- Windows Security Event ID Helper
- Windows security event log library
- Windows Security Monitoring - Policy & Event IDs
- Windows Terminal
- Windows x64 binaries
- Windows XP
- Windows 下的 7 种 DLL 劫持技术
- Windows 日志攻防之攻击篇
- Windows 注册表取证分析
- windows 溢出提权小记
- Windows_LPE_AFD_CVE-2023-21768: 用户权限提升漏洞
- Windows-CVE-2020-0796:疑似微软SMBv3协议“蠕虫级”漏洞
- windows-kernel-exploits
- windows-privesc-check
- Windows-Privilege-Escalation
- Windows-Privilege-Escalation-Resources
- windows-protocol:针对内网渗透的常见协议(如kerberos,ntlm,smb,ldap,netbios等)进行分析,介绍相关漏洞分析以及漏洞工具分析利用文章集合
- Windows-Red-Team-Cheat-Sheet:红对常用 Windows 命备忘录
- windows10相关漏洞EXP&POC
- WindowsEnum
- WindowsExploits
- WindowsVulnScan:基于主机的漏洞扫描工【类似windows-exp-suggester】
- Windows内网协议学习NTLM篇之漏洞概述
- Windows内网渗透入门
- Windows平台下的监控取证技术
- Windows快捷方式利用技巧
- Windows提权-CVE-2020-0668:Windows Service Tracing本地提权漏洞
- Windows本地提权漏洞:CVE-2021-1732-Exploit
- Windows杀软在线对比辅助
- windows权限提升的多种方式
- Windows注册表取证分析
- Windows系统安全事件日志取证工具:LogonTracer
- Windows调试艺术——PE文件变形(一)
- Winds
- Windscribe VPN
- WindTerm:专业的跨平台 SSH/Sftp/Shell/Telnet/Serial 终端
- Windy
- WinFE
- wINfOG
- WinHex
- WinIPT
- Wink
- WinLite
- winlog:一款基于go的windows信息收集工具,主要收集目标机器rdp端口、mstsc远程连接记录、mstsc密码和安全事件中4624、4625登录事件记录
- WinMin
- WinPacketsEdit:用C#开发的仿 WPE 的封包拦截器,可以抓取指定进程的数据包
- Winpayloads
- winPEAS
- Winpmem
- WinRAR 代码执行漏洞 (CVE-2018-20250)-POC
- WinRb
- winrb/winrm
- WinRM access
- winrmdll:C++ WinRM API via Reflective DLL
- Winshark
- WinterMute:1
- WinUpack
- win提权辅助tool
- Wiping Out CSRF
- WIPO
- wiredpulse/posh-r2
- wireghoul
- WireGuard
- Wireguard: fast, modern, secure VPN tunnel (Blackhat 2018)
- Wireless Ad Hoc and Sensor Networks - IIT Kharagpur
- Wireless LAN Security and Penetration Testing Megaprimer
- Wireless Monitoring, Intrusion Detection & Forensics: Nzyme
- Wireshark
- Wireshark Essentilals
- wirespy
- wirtaw
- wisk/medusa
- witblack
- withshubh
- wiwii
- Wix Inbox Journey: 3 Approaches for Zero Downtime Database Migration
- Wiz Vulnerability Database
- wizche
- wj32
- wJa:java闭源项目的自动化白盒+黑盒测试工具
- wjwoodson
- wkasa
- wkz/ply
- wlayzz
- wlingze
- wmal/kodachi
- Wmap
- wmetcalf
- WMI 的攻击,防御与取证分析技术之攻击篇
- wmiexec-Pro: 新一代的wmiexec.py
- WMIHACKER-仅135端口免杀横向移动
- WMIHACKER: 一种绕过反病毒软件的横向移动命令执行工具
- WMI在渗透测试中的重要性
- WMN_screenshooter
- woanware/usbdeviceforensics
- woj-ciech/SocialPath
- Wolfram Alpha
- Wolfram Alpha Facebook Report
- wolframalpha.com
- wolfvan/some-samples
- Woodland Mansion
- woodruffw
- woopstar
- wooyundota/droidsslunpinning
- WooYun漏洞、知识库收集(超详细版)
- Word Cloud
- Word doc drops Betabot (Uses CVE-2017-11882)
- Word doc drops Hancitor loader
- Word doc uses Lua for follow-on activity
- Word doc w/ embedded Hancitor loader, IP check and C2 activity
- Word document drops Dridex DLL w/ Check-In
- Word document drops Smokeloader
- Word Document uses Packager Shell Object to Execute VBScript, Run Powershell to Download AgentTesla
- Word Document Uses Template Injection that downloads an RTF Document, Exploits CVE-2017-11882 to Drop Nanocore
- Word downloads Formbook EXE
- Word drops Banload banking trojan
- Word drops IcedId
- Word drops Ursnif through MSHTA.exe
- Word Tracker
- WordlistCreator
- Wordpot
- wordpress
- WordPress InfiniteWP - Client Authentication Bypass (Metasploit)
- wordpress/wordpress-coding-standards
- Wordpresscan
- Word文件加密之后
- Workbench
- Workload Identity credentials
- World Aeronautical Database
- World Bank Data
- World Bank Doing Business
- World Bank Enterprise Surveys
- World Bank Investing Across Borders
- World Bank Open Data
- World Cams
- World check KYC screening
- World Digital Library
- World Integrated Trade Solution
- World-Newspapers
- WorldCam
- WorldLingo
- WorldMap Harvard
- WorldNews
- WorldReference.com
- Worldwide OSINT Tools Map
- WorldWideScience.org
- Worty
- WOT
- WP Directory
- WP-plugin-scanner
- Wp-smart-honeypot
- wpf500
- WPScan
- WPScan API integration
- wpscvn:供渗透测试人员、网站所有者测试他们的网站是否有一些易受攻击的插件或主题的工具
- wpsearch
- WPSeku
- WPshop eCommerce
- wr0x00
- wrbug/dumpdex
- wreckuests
- wrighterase
- write simple or complicated modules
- Write-Ups for CTF challenges
- Write-ups for CTFs that occurred in 2013
- Write-ups for CTFs that occurred in 2014
- Write-ups for CTFs that occurred in 2015
- Write-ups for CTFs that occurred in 2016
- Write-ups for CTFs that occurred in 2017
- Writehat
- Writers of the blog
- Writeup
- Writing a packer
- Writing a simple PE packer in detail
- Writing Exploits for Win32 Systems from Scratch
- Writing your first module
- Writing your own module
- ws_connect
- ws_options
- ws_recv_binary
- ws_recv_json
- ws_recv_text
- ws_send_binary
- ws_send_json
- ws_send_text
- wsargent
- WScript Emulator
- WSL2
- wsltools-web扫描辅助python库
- wsm:哥斯拉、冰蝎webshell 管理工具
- wsMemShell:一种全新的内存马
- WStalker
- wstgbot
- wtdcode
- wtf
- WTFBins
- WTO Statistics
- wtwver
- wubingzheng/memleax
- wuhan005
- wux1an
- Wuzz
- WWPack
- www.bellingcat.com/category/resources/how-tos
- www.chainabuse.com
- www.dracos-linux.org
- www.flash.cn 的钓鱼页,中文+英文
- www.github.com
- www.inkscape.org
- www.tar.gz
- www.www.backboxindonesia.or.id
- wwwg/wasmdec
- wxappUnpacker:小程序反编译(支持分包)
- wxHexEditor
- WXYZ Webcams
- wymiotkloaki
- Wynyard Group
- Wysija-Newsletters
- WYSINWYX: What you see is not what you execute
- Wyv3rnSec
- X-C3LL
- X-Content-Type-Options Docs
- X-Explore
- X-Frame-Options Docs
- X-Frame-Options: All about Clickjacking?
- x-way
- X-WebScan:Vulcan2.0|分布式扫描器|漏洞扫描|指纹识别
- X-XSS-Protection Docs
- X360 XEX Decompiling With Ghidra
- X41: Browser Security White Paper
- x4v1l0k
- x509_parse_pem
- x51pwn
- X64_dbg
- x64dbg
- x64dbg plugin SDK
- x64dbg/docs
- x64dbg/x64dbg
- x64dbg/x64dbgpy
- x64Unpack: Hybrid emulation unpacker for 64-bit Windows Environments and detailed analysis results on VMProtect 3.4
- x8-Burp
- x86 Assembly
- x86 disassembly/Windows executable files
- x86 In-Depth 4: Labeling Structs Properly in IDA Pro
- x86.Virtualizer
- xairy
- xambroz
- XamlAnimatedGif
- XAMPP
- XanXSS
- XAPKDetector-全平台的android查壳工具
- xarkes
- xatanu
- xatier
- XAttacker
- xav-jann1
- Xavier RENE-CORAIL
- xBaank
- xbingW
- Xbox Username Checker
- Xception PyTorch
- XCode
- Xcode 10: where did snippets go?
- Xcode 7 Bitcode的工作流程及安全性评估
- Xcode Build Locations
- Xcode Build Settings Reference
- Xcode DerivedData Hashes
- Xcode Instruments for iOS: reversing and abuse
- Xcode SDKs
- XcodeGhost S:变种带来的又一波影响
- XcodeGhost或重出江湖,Google Play大量APP被植入恶意代码
- XComp
- xCrystal
- xcxmiku
- xd20111
- XDA forums
- XDA Post
- xdamman
- Xdebug
- XDef安全峰会2021
- xdgpp
- XDMCP
- XE
- XEDParse
- xen0l
- Xenador77
- xencrypt-一款利用powershell来加密并采用Gzip/DEFLATE来绕过杀软的工具
- Xenorf
- xer0dayz
- xerub/img4lib
- Xerxes:1
- xetorixik
- xforcered
- xfzv
- XhmikosR
- XHProf
- xiangchen96
- xiaokanghub
- XiaoliChan
- Xiaolu Dai @saragluna
- xiaxiang-killer:提权神器,低权限强k安全软件
- Xib3rR4dAr
- Xing
- Xing Groups
- xiofee
- xiphon
- XiphosResearch Exploits
- xIvan0ff
- Xjar_tips:Spring Boot JAR 安全加密运行工具, 同时支持的原生JAR
- xjar:Spring Boot JAR 安全加密运行工具,支持的原生JAR
- xl-py
- XLSX
- xmap:快速网络扫描器, 专为执行互联网范围内的 IPv6 和IPv4 网络研究扫描而设计
- xmaple555
- XML
- XML external entity (XXE) injection
- XML Out-Of-Band Data Retrieval
- XML Schema, DTD, and Entity Attacks
- xml_decode
- xml_named
- XMLExternal Entity漏洞培训模块
- XML实体注入漏洞攻与防
- XML实体注入漏洞的利用与学习
- xmount
- XMR 锁定转账手法
- Xmrchain
- xnLinkFinder:尽可能多的发现指定目标的相关 URL 和参数
- XNUCA 2019 Qualifier - HardJS
- Xnumon
- Xocopy
- XorCopy
- xoreaxeaxeax/movfuscator
- XORER
- Xori:一款针对PE32和Shellcode的自动化反编译与静态分析库
- xoro
- xorPacker
- XORTool
- XPA
- XPack
- xPaw
- xpirt
- XPL-SEARCH
- Xplico
- xplico/xplico
- Xplist
- xploit
- xpn
- XPoCe
- XRay
- xray-weblisten-ui-一款基于GO语言写的Xray 被动扫描管理
- xray高级版破解
- XRP 假充值手法
- xrpintel.com
- xRuffKez
- Xshell
- XShellGhost事件技术回顾报告
- xShock-一款针对Shellshock漏洞的利用工具【例如低版本cgi的默认配置页面进行利用】
- xsleaks wiki
- xsmash
- XSpear
- xspy
- XSRFProbe
- xss
- XSS and MySQL FILE
- XSS Challenges
- XSS Cheat Sheet - 2018 Edition
- XSS in Google Colaboratory + CSP bypass
- XSS Payload Generator
- XSS Payloads
- XSS Polyglot Payloads #1
- XSS Polyglot Payloads #2
- XSS to powershell attack and bypass Antivirus using BeEF + TheFatRat + Metasploit
- XSS via a spoofed React element
- XSS without HTML: Client-Side Template Injection with AngularJS
- XSS without parentheses and semi-colons
- xss_bypass_Uppercase
- XSS-Auditor — the protector of unprotected and the deceiver of protected.
- xss-demo-超级简单版本的XSS练习demo
- xss-filters
- XSS-Freak
- XSS-keylogger
- xss-payload-list:XSS payload
- XSS, Vulnerability Exploitation & Website Hacking
- XSS: Can You XSS This?
- XSS: ProgPHP
- XSS.png
- XSS'OR Encoder/Decoder
- xss2png:把 XSS 写入PNG 图片IDAT区域
- xsschop
- XSSCon
- xsser
- xssor
- XSSpayload交流以及研究
- XSStrike
- XSS常见利用代码及原理
- XSS测试备忘录
- XSURGE attack
- xtekky
- xtexx
- xtherk
- xTVaser
- Xu Hanyu
- xuanxuanblingbling
- xudafeng
- xumeiquer/yara-forensics
- xusheng6
- xuyuan23
- XVilka
- Xvwa
- xwings
- xxDark
- xxdesmus
- XXE
- XXE (XML External Entity Injection) 漏洞实践
- XXE in WeChat Pay Sdk ( WeChat leave a backdoor on merchant websites)
- XXE OOB exploitation at Java 1.7+
- XXE OOB extracting via HTTP+FTP using single opened port
- XXE-DTD Cheat Sheet
- XXE注入:攻击与防御 - XXE Injection: Attack and Prevent
- XXE漏洞分析
- XXE漏洞利用的一些技巧
- XXE漏洞攻防之我见
- xxe漏洞检测及代码执行过程
- XXE漏洞的简单理解和测试
- XXE被提起时我们会想到什么
- Xxxswf
- XY-AASTools-1.7:一款交互的免杀工具
- xyfir/ptorx
- Xyl2k
- Xyntia
- Xyueta
- xyzkab
- y-mehta
- y-oyama
- Y0ba
- y0urself
- Y3y1ng
- Y7n05h
- yaakov-h
- yachudo
- YaCo
- yadominjinta/atilo
- yagiz/bagel
- Yahoo
- Yahoo Answers
- Yahoo Groups
- Yahoo Image Search
- Yahoo Mail
- Yahoo Maps
- Yahoo News
- Yahoo Password Frequency Corpus
- Yahoo Video Search
- Yahoo! Search
- yak gRPC Client GUI - 集成化单兵工具平台
- yallxe
- YamatoSecurity
- YAML
- yaml-payload-for-ruoyi:若依 snakeyaml 反序列化漏洞注入内存马
- Yamli (Arabic Search Engine)
- yampelo/beagle
- Yandex
- Yandex (Russia)
- Yandex Browser
- Yandex Image
- Yandex Translate
- Yandex Wordstat
- Yandex.Images
- yandex.ru
- yankejustin
- YanWQ-monad
- yapht
- YARA
- YARA + Volatility ... the beginning
- YARA rule collection
- YARA scans in WinDbg
- yaraify.abuse.ch
- YaraRET (I): Carving with Radare2 & Yara
- yarGen
- yarikoptic
- yaron-cider
- Yaroslav Moskvin - ELF execution in Linux RAM
- yasinS
- Yasni
- yasoob
- yazeed44
- ydaniv
- ydkhatri/macforensics
- yegor256/volatility
- yegord/snowman
- yelhamer
- yeln4ts
- Yelp - What I Wish I Knew before Going On-Call
- yelp/osxcollector
- yenatch
- Yep
- yeriomin/yalpstore
- Yersinia
- Yes We Hack - How to Exploit GraphQL
- yeswolf
- Yet another awesome list of doxxed EVM wallets
- Yet another awesome Twitter list to follow
- Yet Another On-Chain Data Analysis Tools List
- Yet another sdclt UAC bypass
- yetAnotherObfuscator: 绕过Windows Defender的C#混淆器
- Yeti
- Yeuoly
- YexuanXiao
- yhawke
- yhjun1026
- Yi-1.5-34B-Chat
- Yi-1.5-6B-Chat
- Yi-1.5-9B-Chat
- Yi-34B-Chat
- yichinzhu
- Yiep
- yifili09
- yigblst
- yihong0618
- Yippy
- yjdirscan-御剑目录扫描专业版【仅支持windows】
- ymeheut
- ynvb/die
- Yobi
- Yoda Crypter
- Yoda Protector
- YoeriNijs
- Yogendra0Sharma
- yogeshojha
- yogh.io
- yokoffing
- yolylight
- yomapic.com
- Yomi
- yongyou-nc-rce: 用友nc-反序列化漏洞验证加利用
- YongyouNC-Unserialize-Tools:用友NC反序列化漏洞payload生成
- YonyouNC_Tip:用友NC历史漏洞
- YonyouNc-UNSERIALIZE-scan: 用友NC 反序列化检查工具,批量检测用友NC 反序列化
- yoonthegoon
- yooper
- yosriady/api-development-tools
- yossizap
- YOU
- You Get Signal
- you0708
- YouControl
- YouMayPasser
- youngster-yj
- Your brain on progress
- Your Navigation
- Your OpenSSL CSR command is out of date
- your own fork
- Your website is killing the planet - via Wired
- yoution
- YouTube
- YouTube blog by bitquery
- Youtube channel
- YouTube Data Viewer
- YouTube DataViewer
- YouTube Geofind
- Youtube GeoFinder
- YouTube Metadata
- YouTube Video Series: Getting Started with Detect-It-Easy, Identifying Signs of Packing, Unpacking Vidar Stealer with Time-Travel Debugging
- YouTube Video Series: Investigating NullMixer - Identifying Packing Techniques, Identifying and Unraveling ASPack, and Investigating Network Traffic with Suricata and Evebox
- YouTube Video: A .NET Downloader and an Open Directory - Unraveling the Encrypted Payload That Leads to CryptBot
- YouTube Video: OneNote Malware - Tips and Tricks for Investigating OneNote Malware Used to Deliver AsyncRAT
- YouTube Video: OneNote Malware Trends - Investigating Script Execution that Leads to QuakBot
- YouTube Video: The Basics of Overlays in PE Files w/ DCRat
- YouTube: Getting Started with dnSpyEx - Unraveling a .NET Formbook Dropper
- youtube.com/watch?v=3HddKylkRzM
- ypsilon
- yqcs/fingerscan
- yrluke
- yrp604
- yrp604/rappel
- ysomap:一款适配于各类实际复杂环境的Java反序列化利用框架,可动态配置具备不同执行效果的Java反序列化利用链payload,以应对不同场景下的反序列化利用
- ysoserial:1nhann修改和增加诸多新的反序列化攻击链
- ysoserial:魔改版ysoserial,支持更多更全的利用链+内存马+防御绕过+MSF/CS 上线
- ysoserial.net
- yt-dlp
- ytisf
- ytisf/muninn
- ytisf/thezoo
- Yubico - PGP
- Yubico - Yubikey Personalization
- Yubikey forwarding SSH keys (2019)
- YubiKey Manager
- yugoslavskiy
- Yukihiro36
- yukinoshita47/pentest-tools-auto-installer
- YuShiang Dang
- Yushkevichav
- yutodadil
- YuvrajRaghuvanshiS
- Yuya-Miyoshi
- Yx-2
- yyhhyyyyyy
- YzmCMS 5.4 后台getshell
- Z-CERT
- z0noxz
- z3
- z3nsh3ll
- z3roTo0ne
- Z4nzu
- za
- za @za
- ZabaSearch
- ZabaSearch Phone Lookup
- zacbrown/hiddentreasure-etw-demo
- ZacharyZcR
- zachriggle
- zackslash
- ZAID
- ZakDanger
- ZakiRucker
- Zamanry
- zamotkin
- zamsky
- zan8in
- zandiarash
- Zanran
- zANTI
- ZAP
- Zap WAVE
- zapbot
- Zapfmeister
- zaphodef
- Zapmeta
- zapper.fi
- Zarp
- zb140
- zbetcheckin
- zblurx
- zc00l
- zclaiqcc
- ZDNS
- Zebra
- Zebrafish information network, the knowledgebase for Danio rerio research
- Zedb0T
- zedifen
- Zeecka
- Zeek
- zeek2es
- Zeekr
- ZeeMaps
- zeheyler
- ZehMatt
- Zellic/smart-contract-fiesta
- zema1
- Zen
- Zen Rails Security Checklist
- Zena Forensics
- zenangst
- Zend
- Zendesk - Latency and Availability Error Budgets Done Right at Scale
- ZenithalHourlyRate
- ZentaoSqli:Zentao v16.5 SQL注入漏洞 POC
- Zentral
- zepatrik
- Zer0Dump
- zer0pts CTF 2020 - Can you guess it?
- zer0pts CTF 2020 - MusicBlog
- zer0pts CTF 2020 - phpNantokaAdmin
- zer0yu
- zer1t0
- zerbaliy3v
- ZerGo0
- Zero Downtime Node Patching in a Kubernetes Cluster
- Zero Downtime, Instant Deployment and Rollback
- Zero Knowledge Proofs MOOC, UC Berkeley RDI Center on Decentralization & AI
- Zero Logon
- Zero to Hero - Mobile Application Testing - Android Platform
- ZERO to WEB 3 Data Analyst with DuneAnalytics
- Zero Touch Prod: Towards Safer and More Secure Production Environments
- Zero Trust Architecture in Robotics
- Zero Trust Networks: Building Secure Systems in Untrusted Networks
- Zero-downtime Postgres migrations - the hard parts
- ZeroDays CTF
- Zerodium
- Zerodoor
- zeroeye
- Zerokit
- Zerologon: Unauthenticated domain controller compromise
- ZeroMemoryEx
- zeromev.org
- Zeronights
- ZeroSSL
- Zesty Facebook Search
- ZETAlytics
- Zetoc
- zettablock.com
- Zeus
- Zeus Analysis – Memory Forensics via Volatility
- ZeuS Tracker
- Zeus:1
- Zewed
- zfy0701
- zgrab2:zmap官方开发的zmap 升级版
- ZH
- zhanang19
- zhanghy-sketchzh
- zhe6652
- zhill
- zhuhaow/nekit
- ZhymabekRoman
- Zico 2
- Ziemas
- ZIION VM
- zijin-m
- ZikyHD
- Zillow
- ZilvinasKucinskas
- ZingChart
- Zintro
- Zion:1.1
- ZIP
- ZIP file
- zip2bodyfile
- ZipRecruiter
- ZIRAKrezovic
- Zircolite
- zirikatu
- ZishanAdThandar
- zk-SNARK Groth16 详解
- ZlatanStanojevic
- zll600
- ZLoader with chekc-in
- ZMail
- Zmap
- ZMapv6
- zmb3
- zmbf0r3ns1cs/bf-elk
- zntfdr
- zodiacon/procmonx
- Zoho Mail
- zoller27osu
- zonyitoo
- Zoom CEO 称为配合 FBI 免费版不加密
- Zoom Earth
- ZoomEye
- Zoomeye Tools-一款利用Zoomeye 获取有关当前网页IP地址的各种信息(需要登录)
- ZoomEye资产测绘
- Zoominfo
- Zoom漏洞:超 50 万个 Zoom 账户泄露并在 Dark Web 出售
- Zoopla
- zorox0x
- Zorz
- ZProtect
- zrax/pycdc
- zricethezav
- ZRiddle
- zrquan
- zscan:Zscan是一个开源的内网端口扫描器、爆破工具和其他实用工具的集合体可以称为工具包
- zsh 和 oh my zsh冷启动速度优化
- Zsteg
- zt-podmzle9-5X~qYx8wMaLt9bGWwkSdgQ
- zuesdevil
- Zulu
- zuoyou0
- zuozuovera-Blog
- Zusier
- zwass
- zyantific/idaskins
- zyantific/zydis
- Zydis
- zylideum
- zyrikby
- εxodus
- Дезертир
- Как узнать, какие USB устройства подключались к Linux / HackWare.ru
- Комикс о UXSS в Safari и Chrome
- Криптография с Python
- Особенности Safari в client-side атаках
- Ответы
- Проблема
- ц.укр
- แนะนำ SchemaSpy เครื่องมือทำเอกสาร Database
- ピクセルミー | ドット絵ジェネレーター
- 一个Windbg/cdb极其缓慢的例子
- 一个任意文件读取漏洞记录
- 一个包含php,java,python,C#等各种语言版本的XXE漏洞Demo
- 一个各种方式突破Disable_functions达到命令执行的shell
- 一个简单探测jboss漏洞的工具
- 一例IRC Bot针对Cuckoo沙箱的猥琐对抗分析
- 一封伪造邮件引发的“探索”(涉及钓鱼邮件、SPF和DKIM等)
- 一张快递单到底能泄露多少个人信息
- 一条命令实现无文件兼容性强的反弹后门,收集自强大的前乌云
- 一次XSS突破的探险
- 一次对 Tui Editor XSS 的挖掘与分析
- 一次攻击内网rmi服务的深思
- 一次红队之旅
- 一款lcx在golang下的实现-适合内网代理流量到公网,比如阿里云的机器代理到你的公网机器
- 一款国人根据poison ivy重写的远控
- 一款实用的macOS内核调试工具——LLDBagility
- 一种新的Tomcat内存马 - Upgrade内存马
- 一种绕过UAC的技术介绍
- 一种通用DLL劫持技术研究
- 一篇文章带你深入理解漏洞之 XXE 漏洞
- 一篇文章带你领悟Frida的精髓(基于安卓8.1)
- 一篇文章精通PowerShell Empire 2.3(上)
- 一篇文章精通PowerShell Empire 2.3(下)
- 一道 CTF 题 get 到的新姿势
- 丁爸网
- 万户OA ajax_checkUserNum.jsp SQL注入漏洞
- 万户OA DocumentHistory.jsp SQL注入漏洞
- 万户OA getNextAutoCode.jsp SQL注入漏洞
- 万户OA govdocumentmanager_sendfile_gd.jsp SQL注入漏洞
- 万户OA public/iSignatureHTML.jsp/Service.jsp SQL注入漏洞
- 万户OA selectAmountField.jsp SQL注入漏洞
- 万户OA selectPopTable.jsp SQL注入漏洞
- 上传DOC文件XXE
- 上传Word文件形成存储型XSS路径
- 上海买房
- 不按顺序来的 TCP 包
- 专为程序员编写的英语学习指南 v1.2
- 专利信息服务平台
- 丢掉PSEXEC使用wmi来横向渗透
- 两次前端绕过渗透小结
- 两种姿势批量解密恶意驱动中的上百条字串
- 个人总结的waf绕过注入思路(附带6种常见waf的绕过方法)
- 个人维护的安全知识框架,内容偏向于web
- 中华人民共和国国家邮政局
- 中国大陆内地姓名、身份证号、银行卡号生成器
- 中国汽车网-VIN车辆识别代码查询
- 中国海关企业进出口信用信息公示平台
- 中国港口
- 中国程序员容易发音错误的单词
- 为CHIP-8编写IDA processor module
- 为WinDbg和LLDB编写ClrMD扩展
- 为保护隐私而生,反取证操作系统:kodachi
- 了解SSRF
- 二次元画像詳細検索
- 二维码安全-淘宝例子
- 二维码登陆的常见缺陷剖析
- 云原生入侵检测趋势观察
- 云原生带来的云安全机遇
- 云原生渗透
- 云存储服务的数字取证(上)
- 云存储服务的数字取证(下)
- 云当网-物流可视化-船舶轨迹定位-海运跟踪-空运货物跟踪-码头-集装箱进港查询
- 云端博弈——云安全入侵取证及思考
- 互联网 Java 工程师进阶知识完全扫盲
- 互联网企业数据安全体系建设
- 亚洲空气污染
- 亚马逊提供 Alexa 录音的非人工审听选项
- 产品和服务的隐私设置,以及查看和清除 Microsoft 保存到云的数据的位置
- 京东SRC小课堂系列文章
- 什么是威胁情报
- 什么是数字取证(Digital forensics)? 如何在这个热门领域站稳脚跟?
- 从 0 开始入门 Chrome Ext 安全(一) -- 了解一个 Chrome Ext
- 从 0 开始入门 Chrome Ext 安全(二) -- 安全的 Chrome Ext
- 从 CVE-2018-8495 看 PC 端 url scheme 的安全问题
- 从 Interfaces.d 到 RCE:Mozilla WebThings IoT 网关漏洞挖掘
- 从MySQL出发的反击之路
- 从PowerShell内存中提取取证脚本内容
- 从Solarwinds供应链攻击(金链熊)看APT行动中的隐蔽作战
- 从一次取证到反渗透
- 从一次开发漏洞看shiro的正确使用
- 从内存中加载 SHELLCODE bypass AV查杀
- 从推特中挖掘真相不需要太复杂的工具:一个常用工具的全面指南
- 从活动目录中获取域管理员权限的6种方法
- 从瑞士军刀到变形金刚--XSS攻击面扩展
- 从零学习到 Webshell 免杀手册
- 代理不当日进内网
- 代码审计知识星球精选
- 以AJ-Report为例从0开始学习Java代码审计
- 以OpenRASP为基础-展开来港港RASP的类加载
- 以太坊代币假充值手法
- 以太坊假充值手法
- 任意文件读取的常用字典
- 企业APT攻击取证(windows版本)
- 企业信用信息查询
- 企查查
- 传统翻译
- 伪造人像
- 伪造电子邮件以及制造电子邮件炸弹的攻防探讨
- 你不知道的威胁狩猎技巧:Windows API 与 Sysmon 事件的映射
- 你可能没见过的流量取证
- 你注册过哪些网站?一搜便知
- 你的VPN泄漏IP了吗:仍有20%的VPN服务商未解决WebRTC漏洞问题
- 佰腾网
- 使用 Ghidra 分析 phpStudy 后门
- 使用 Ghidra 对 iOS 应用进行 msgSend 分析
- 使用 IDA Pro 的 REobjc 模块逆向 Objective-C 二进制文件
- 使用 IDA 处理 U-Boot 二进制流文件
- 使用 qemu 和volatility 攻击加密系统
- 使用 sshLooterC 抓取 SSH 密码
- 使用Binary Ninja的MLIL和SSA, 挖掘二进制文件的漏洞. (MLIL: Medium Level IL, 中间层IL)(SSA: Single Static Assignment)
- 使用Binary Ninja调试共享库
- 使用Cutter和Radare2对APT32恶意程序流程图进行反混淆处理
- 使用Ghidra分析phpStudy后门
- 使用Ghidra对iOS应用进行msgSend分析
- 使用Ghidra对WhatsApp VOIP Stack 溢出漏洞的补丁对比分析
- 使用IDA microcode去除ollvm混淆(上)
- 使用IDA microcode去除ollvm混淆(下)
- 使用IDAPython分析Trickbot
- 使用IDAPython对Flame的字符串进行反混淆
- 使用IDAPython自动映射二进制文件替换默认函数名
- 使用IDA和辅助工具比较二进制文件
- 使用IDA处理U-Boot二进制流文件
- 使用IDA自动打开当前目录下的DLL和EXE
- 使用Metasploit绕过UAC的多种方法
- 使用OllyDbg从零开始Cracking 第四十二章-ACProtect V1.09脱壳(寻找OEP,绕过硬件断点的检测,修复Stolen code)
- 使用osquery进行远程取证
- 使用powershell或CMD直接运行命令反弹shell
- 使用Python编写Ghidra脚本示例
- 使用request merging bypass referer(jsonp) 检测
- 使用Sqlmap的你可能踩中了“蜜罐”
- 使用VOLATILITY发现高级恶意软件
- 使用Volatility检测DoublePulsar
- 使用x64dbg 分析 TIM2.0 QQ撤销功能
- 使用x64dbg分析微信并获取所有联系人信息
- 使用x64dbg分析微信聊天函数并实现发信息
- 使用x64dbg分析微信防多开功能
- 使用x64dbg脱壳之开源壳upx
- 使用交互式的报告来展示勒索软件GandCrab最近的攻击活动, 以及攻击流程
- 使用文档
- 俄罗斯军事基地的位置
- 保护隐私
- 信息安全从业者书单推荐
- 信用视界
- 借助Rekall进行内存实时分析
- 偷U盘文件的神器
- 免费在线批量验证邮箱有效性 - EmailCamel.com
- 免费的客户端反向地理编码
- 全球物流查询平台
- 全球鹰实验室技术文章沉淀
- 关于ATT&CK/APT/归因的讨论
- 关于Google ID的OSINT信息挖掘
- 关于JSON CSRF的一些思考
- 关于Python的面试题
- 关于QQ读取Chrome历史记录的澄清
- 关于SSRF漏洞挖掘思路
- 关于ThinkPHP框架的历史漏洞分析集合
- 关于一些SSRF的技巧
- 关于网站强奸剪切板那点事
- 内存取证:查找Metasploit的Meterpreter踪迹
- 内存取证三项CTF赛题详解
- 内存取证分析的实战演练
- 内嵌翻译
- 内网xss蠕虫
- 内网剑客三结义
- 内网安全检查/渗透总结
- 内网常见渗透工具包
- 内网渗透-创建Windows用户(当net net1 等常见命令被过滤时,一个文件执行直接添加一个管理员【需要shell具有管理员权限l】
- 内网渗透思路探索 之新思路的探索与验证
- 内网渗透知识基础及流程
- 内网渗透记录
- 内网漫游之SOCKS代理大结局
- 内网神器Xerosploit-娱乐性质(端口扫描|DoS攻击|HTML代码注入|JavaScript代码注入|下载拦截和替换|嗅探攻击|DNS欺骗|图片替换|Web页面篡改|Drifnet)
- 冰心网络验证V3.1-代码审计到getshell
- 冰蝎v4.0传输协议详解
- 分布式HIDS集群架构设计
- 分析APT报告集合
- 分析取证指南:取证工具推荐
- 创建蜜罐账户检测Kerberoast
- 初级域渗透系列 - 01. 基本介绍&信息获取
- 初级域渗透系列 - 02. 常见攻击方法 - 1
- 初级域渗透系列 03. 常见攻击方法
- 利用 EXCEL 文件进行 XXE 攻击的漏洞分析
- 利用 Exchange SSRF 漏洞和 NTLM 中继沦陷域控
- 利用 intercetor 注入 spring 内存 webshell
- 利用 PHP-FPM 做内存马的方法
- 利用ASP.NET Web API Help Page文件上传
- 利用EXCEL进行XXE攻击
- 利用GDB实现进程注入
- 利用Ghidra分析TP-link M7350 4G随身WiFi的RCE漏洞
- 利用Ghidra分析恶意软件Emotet
- 利用GHIDRA逆向Tytera MD380的固件
- 利用JSONP跨域获取信息
- 利用LeechAgent对远程物理内存进行取证分析
- 利用metasploit绕过UAC的5种方式
- 利用OllyDbg跟踪分析Process Hollowing
- 利用Python实现DGA域名检测
- 利用URL文件实现DLL劫持
- 利用Volatility查找系统中的恶意DLL
- 利用Volatility进行Windows内存取证分析(一):初体验
- 利用Volatility进行Windows内存取证分析(二):内核对象、内核池学习小记
- 利用Volatility进行入侵痕迹分析
- 利用Web应用中隐藏的文件夹和文件获取敏感信息
- 利用Wireshark任意获取QQ好友IP实施精准定位
- 利用分块传输吊打所有WAF
- 利用恶意页面攻击本地Xdebug
- 利用缓解技术:数据执行保护(DEP)
- 制作Visual Stuio Code的恶意插件
- 前端安全系列(一):如何防止XSS攻击?
- 前端防御从入门到弃坑--CSP变迁
- 力洋汽车信息查询
- 加强调查取证,夯实威胁情报基础
- 动态二进制修改(Dynamic Binary Instrumentation)入门:Pin、DynamoRIO、Frida
- 动态二进制插桩的原理和基本实现过程(一)
- 动手打造Bypass UAC自动化测试小工具,可绕过最新版Win10
- 北京买房
- 北京买房图鉴
- 半自动化挖掘request实现多种中间件回显
- 华为HG532路由器钓鱼RCE
- 卖二手设备一定要注意,你的信息可能并没被删除
- 博客
- 卡巴斯基修复四年老漏洞 注入 HTML 源码的唯一标识符会泄露用户隐私
- 反作弊游戏如何破解,看看《黑色沙漠》逆向分析过程:使用 IDAPython 和 FLIRT 签名恢复 IAT
- 反取证、密码学、逆向工程软件…… 10大最好的网络安全Reddit都在这儿
- 反取证技术:内核模式下的进程隐蔽
- 反弹Shell剖析
- 反弹Shell原理及检测技术研究
- 发现中国
- 取证分析之发现Windows恶意程序执行痕迹
- 取证相关工具和文章: awesome-forensics
- 另一个bypass PHP的disable_functions
- 可以自定义规则的密码字典生成器,支持图形界面
- 可能是目前最全面的开源模糊测试字典集合了
- 可视化全球互联网性能
- 台风路径实时发布系统
- 史上最全的zoom漏洞和修复方案介绍
- 各种反弹shell的语句集合页面
- 各种姿势jsp webshell
- 名人课堂-高级数字取证与数据逆向工程
- 名刀电报搜索
- 启信宝
- 国外14亿数据
- 国外详细的CTF分析总结文章(2014-2017年)
- 国家企业信用信息公示系统
- 国家水上交通信息服务平台
- 图形化漏洞利用Demo-JavaFX版:ExpDemo-JavaFX
- 圣诞老人的ELFs:在没有execve的情况下运行Linux可执行文件
- 在64位系统中使用ROP+Return-to-dl-resolve来绕过ASLR+DEP
- 在HTTP协议层面绕过WAF
- 在PyCharm中编写IDAPython脚本时自动提示
- 在windows环境下使用Volatility或PE Capture捕捉执行代码(PE/DLL/驱动恶意文件)
- 在最难搜索的地方:解剖 Instagram 用户
- 在百度网盘上看到上万条车主个人信息,企业、政府高官信息、各种数据
- 在线二进制分析
- 在线扫描-网站基础信息获取|旁站|端口扫描|信息泄露
- 在线身份证号码生成器
- 在细节中捕捉恶魔 :提升Cuckoo沙箱捕获恶意Office样本行为的能力
- 域渗透-Windows hash dump之secretsdump.py
- 域渗透——Kerberoasting
- 域渗透——利用dnscmd在DNS服务器上实现远程加载Dll
- 域渗透——利用SYSVOL还原组策略中保存的密码
- 域渗透——获得域控服务器的NTDS.dit文件
- 域渗透之使用CrackMapExec拿到我们想要的东西
- 基于bro的计算机入侵取证实战分析
- 基于Frida进行通信数据“解密”
- 基于Ghidra和Neo4j的RPC分析技术
- 基于mysql下的几种写shell方法
- 基于区块链的加密货币安全审计指南/Blockchain-Based Cryptocurrency Security Audit Guide
- 基于机器学习的Web管理后台识别方法探索
- 基础事件响应中的Volatility工作流程
- 多数据源IP地址查询
- 多维度对抗Windows AppLocker
- 多进程批量网站备份文件扫描
- 大模型翻译
- 天地图
- 天眼查
- 奉新行 车辆识别码(VIN)查询
- 如何为WinDbg编写ClrMD插件
- 如何为老照片添加 Exif 日期数据? - 小众软件
- 如何以管理员身份绕过AppLocker
- 如何使用 IDAPython 寻找漏洞
- 如何使用ADSI接口和反射型DLL枚举活动目录
- 如何使用Fuzzing挖掘ImageMagick的漏洞
- 如何使用IDAPython挖掘漏洞
- 如何使用QEMU和Volatility攻击全盘加密的系统
- 如何利用DLL注入绕过Win10勒索软件保护
- 如何在32位系统中使用ROP+Return-to-dl来绕过ASLR+DEP
- 如何在Electra越狱的设备上使用LLDB调试应用程序
- 如何在Windows上重现macOS上的取证技巧
- 如何实现自己的ollydbg调试器 (1) 界面的实现
- 如何对已损坏的SQLite数据库取证分析?
- 如何对经前端加密后的数据进行爆破
- 如何对苹果设备进行云取证
- 如何开发用于漏洞研究的Ghidra插件,Part 1
- 如何挖掘Uber网站的XXE注入漏洞
- 如何滥用Access Tokens UIAccess绕过UAC
- 如何看待 QQ 扫描读取所有浏览器的历史记录?
- 如何知道有人正在线人肉你?6个简单的方法
- 如何绕过高版本JDK的限制进行JNDI注入利用
- 如何获取、挖掘、分析各种来源的调查数据完整指南:解码秘密(4)- 确保真实和确保道德的技巧
- 如何规避Sysmon DNS监控
- 如何评价安全工作的好坏
- 如何逃逸Sysmon工具对DNS的监控
- 如何通过内存取证技术追踪Metasploit Meterpreter
- 如何防止恶意的第三方DLL注入到进程
- 如果只知道一个电话号码,你能挖出多少有效信息?
- 威胁猎杀与主动取证
- 安全PPT大全
- 安全学术圈2018年度总结
- 安全工具
- 安全思维导图集合
- 安全手册:这里是你需要的几乎所有安全上网工具;以及为什么建议不要使用以美国为基地的网络服务
- 安全智能应用的一些迷思
- 安全测试工具集:在学习和渗透测试过程中自己写的一些小脚本、小工具和一些常用字典、木马
- 安全相关思维导图整理收集
- 安卓APP测试之HOOK大法-Frida篇
- 安恒信息《渗透攻击红队百科全书》
- 官方文档
- 官网
- 宜配网VIN查询
- 实现一款 shellcodeLoader
- 实验
- 容器与云的碰撞——一次对 MinIO 的测试
- 容易被忽略的Anti-APT产品-网络取证工具NFT
- 宽字节注入深度讲解
- 密碼重設保護
- 对Apple Watch的取证分析(续)
- 对AWVS一次简单分析
- 对国外某内网渗透的一次小结
- 对安全即时通讯软件的流量分析攻击
- 对密码已保存在 Windwos 系统上的部分程序进行解析,包括:Navicat,TeamViewer,FileZilla,WinSCP,Xmangager系列产品(Xshell,Xftp)
- 对开发人员有用的定律、理论、原则和模式
- 对恶意树莓派设备的取证分析
- 对朝鲜指控书
- 对登录中账号密码进行加密之后再传输的爆破的思路和方式
- 对过WAF的一些认知
- 寻找时间的踪迹:侦探挑战游戏
- 将powershell脚本直接注入到进程中执行来绕过对powershell.exe的限制
- 小米系列路由器远程命令执行漏洞(CVE-2019-18370,CVE-2019-18371)
- 小米被指记录用户的 Web 和手机使用数据
- 巅峰极客2020 - MeowWorld
- 工具| sqlmap payload修改之路
- 工具| sqlmap payload修改之路(下)
- 工具推荐:22款最流行的计算机取证工具【2017年更新版】
- 工具推荐:逆向破解利器OllyDbg
- 已知邮箱,求手机号码?
- 广告个性化
- 广告个性化/谷歌眼中的你
- 应用授权
- 开源数字调查/取证工具 – Sleuth Kit v4.0.0 Beta1
- 开源网络取证工具Xplico
- 开源远控和恶意远控分析报告: awesome-rat
- 引用外部脚本的隐患及防御
- 张欧:数字银行可信网络实践
- 弦哥从新加坡HITB黑客大会进口过来的黑魔法命令
- 弹性安全网络 - 构建下一代安全的互联网
- 强制通过VPN上网,VPN断线就断网
- 强网杯“彩蛋”——Shiro 1.2.4(SHIRO-550)漏洞之发散性思考
- 当Skype翻译器功能处于活动状态时 微软承包商可以获知对话内容
- 彭博:Facebook雇人记录用户语音通话以改善AI技术
- 微信Netting-QRLJacking分析利用-扫我二维码获取你的账号权限
- 微信企业版群组机器人
- 微信公众号文章URL的种类与结构
- 微软:暂不会停止对 Skype 和 Cortana 对话的人工审查
- 微软被指使用廉价合同工完成Cortana语音收听工作
- 快递100
- 快递查询
- 思科Webex桌面会议App提权漏洞, 可导致RCE
- 恶意MySQL Server读取MySQL Client端文件
- 惠普打印机被发现偷偷回传数据:隐藏极深
- 慢雾 AML 分析报告
- 慢雾(SlowMist)智能合约审计技能树/SlowMist Learning Roadmap for Becoming a Smart Contract Auditor
- 慢雾区块链安全科普
- 慢雾安全技术研究合集
- 我们来谈一谈IDS签名
- 我的Web应用安全模糊测试之路
- 我的世界观
- 戴尔预装的SupportAssist组件存在DLL劫持漏洞,全球超过1亿台设备面临网络攻击风险
- 手工shellcode注入PE文件
- 手机号码定位
- 执法部门找Google查用户信息需缴费,明码标价童叟无欺
- 扭曲攻击漏洞解析
- 技术讨论 | 构建一个小巧的来电显示迷惑工具
- 投稿文章:Bypass Applocker + 免杀执行任意 shellcode [ csc + installUtil ]
- 报告样例
- 拾取坐标系统
- 探寻Java文件上传流量层面waf绕过姿势系列二
- 探秘Hex-Rays microcode
- 探索先进自动化漏洞挖掘技术中的不足
- 探讨 Poseidon 延展性攻击
- 插件
- 揭秘以太坊 Vanity 生成器 Profanity 私钥破解漏洞
- 搜配网 - VIN码识别_车架号识别_专业汽车配件数据库_车型配件精准查询
- 携带恶意PE文件的壁纸类应用出现在Google Play
- 擦除AWVS一些标志
- 支fu宝可以查婚姻状况望周知
- 支持到32_0_0_223_Adobe{过}{滤}FlashPlayer去区域限制
- 收集模块
- 收集模块说明
- 收集的所有开源工具: sec-tool-list
- 攻击性网络安全资源: awesome-cyber-security
- 攻击者从台湾科技公司窃取证书用于Plead恶意软件活动
- 攻破黑市之拿下吃鸡DNF等游戏钓鱼站群
- 敏信Java代码审计-层层推进
- 教你使用Cutter和Radare2对APT32恶意程序流程图进行反混淆处理
- 教你如何使用QBDI动态二进制检测框架
- 敞开的地狱之门:Kerberos协议的滥用
- 数字取证工具包-SIFT
- 数字取证技术 :Windows内存信息提取
- 数字取证技术——NTFS更改日志
- 数字取证调查中如何获取网络连接的时间戳?
- 数据取证:NTFS change journal
- 数据结构和算法必知必会的50个代码实现
- 文章
- 新型DDOS攻击分析取证
- 新型任意文件读取漏洞的研究
- 新开始:webshell的检测
- 无效HTTP请求绕过Lighttpd重写规则
- 无线电设备查询
- 旧版
- 易源数据-车架号VIN查询车辆信息
- 是迫于压力还是心甘情愿?年底之前,苹果将完成和执法机构的取证工作对接
- 智能汽车安全攻防大揭秘
- 智能锁具攻防系列一初探
- 最佳网络取证工具Top 7
- 最近使用过的设备
- 有没有想过一个问题,适用于移动设备的取证方法能否照搬到台式计算机上?
- 服务器开放debug安全内容
- 服务器端包含注入SSI分析总结
- 服务隐藏与排查 | Windows 应急响应
- 本地DNS攻击原理与实例
- 机器学习在二进制代码相似性分析中的应用
- 杀软检测及其Hook点list
- 杂谈Java内存Webshell的攻与防
- 权查查
- 来自微信外挂的安全风险
- 杭州买房
- 极速数据-VIN车辆识别代码查询API接口_免费数据接口
- 林林总总的Host Header Attack
- 查杀Java web filter型内存马
- 查看完整版
- 查看自己的IP地址
- 查错网
- 欺骗IDA F5参数识别
- 比特币 RBF 假充值手法
- 污点传递理论在Webshell检测中的应用 - PHP篇
- 泛微10前台上传 getshell
- 泛微OA ReceiveTodoRequestByXml XML实体注入漏洞
- 注入系列——DLL注入
- 洗钱工具“手机充值卡”卡号卡密灰色行业套现洗白链
- 活动控件
- 活动记录
- 流量转发工具-pingtunnel是把tcp/udp/sock5流量伪装成icmp流量进行转发的工具
- 浅析反向代理
- 浅析白盒审计中的字符编码及SQL注入
- 浅谈CORS可能产生的漏洞
- 浅谈Fastjson RCE漏洞的绕过史
- 浅谈RASP
- 浅谈XSS—字符编码和浏览器解析原理
- 浅谈XXE漏洞攻击与防御
- 浅谈中间件漏洞与防护
- 浅谈动态爬虫与去重
- 浅谈动态爬虫与去重(续)
- 浅谈数据安全
- 浅谈电子数字取证技术
- 浅谈网络攻击的“归因”
- 浅谈跨域11
- 浅谈跨站脚本攻击与防御
- 浏览器指纹
- 浏览器指纹真的有效吗?
- 浏览器的隐身模式有多隐身?
- 海管家
- 涉及漏洞、代码审计、内网渗透相关的笔记仓库
- 润桐RainPat专利检索
- 深信服后台RCE
- 深入 Exchange Server 在网络渗透下的利用方法
- 深入浅出——基于DynamoRIO的strace和ltrace
- 深入理解XSS编码--浏览器解析原理
- 深度剖析:手机指纹的马奇诺防线
- 混淆IDA F5的一个小技巧-x64
- 混淆IDA F5的一个小技巧-x86
- 渗透Hacking Team过程
- 渗透利器Cobalt Strike - 第2篇 APT级的全面免杀与企业纵深防御体系的对抗
- 渗透技巧——”隐藏”注册表的更多测试
- 渗透技巧——Token窃取与利用
- 渗透技巧——Windows日志的删除与绕过
- 渗透技巧——Windows系统的帐户隐藏
- 渗透技巧——Windows系统远程桌面的多用户登录
- 渗透技巧——从Admin权限切换到System权限
- 渗透技巧——从github下载文件的多种方法
- 渗透技巧——利用Masterkey离线导出Chrome浏览器中保存的密码
- 渗透技巧——程序的降权启动
- 渗透技巧——获得Windows系统的远程桌面连接历史记录
- 渗透技巧之隐藏自己的工具
- 渗透标准
- 渗透测试、电子取证系统 – Bugtraq-I
- 渗透测试中常见的小TIPS总结和整理
- 渗透测试中的冷却启动攻击和其他取证技术
- 渗透测试实战第三版
- 渗透测试技巧之一个XSS引发的漏洞利用与思考
- 渗透测试技巧之内网穿透方式与思路总结
- 渗透神器系列 搜索引擎
- 渗透记录1
- 渗透记录2
- 漫谈同源策略攻防
- 灰袍2017
- 点我
- 烽火实验室 blog
- 爬虫基础篇[Web 漏洞扫描器]
- 特权提升技术总结之Windows文件服务内核篇(主要是在webshell命令行执行各种命令搜集信息)
- 独辟蹊径:如何通过URL文件实现DLL劫持
- 猪哥的读书笔记-主要包括内网安全攻防-渗透测试指南&专注 APT 攻击与防御 - Micro8
- 生成Redis恶意模块so文件配合主从复制RCE达到命令执行
- 生成ViewState的程序实现
- 用DNS数据进行威胁发现
- 用IDAPython解密Gootkit中的字符串
- 用idawasm IDA Pro逆向WebAssembly模块
- 用olldbg破解,分析ocx控件
- 用于监控USB设备连接事件的取证工具
- 用友GRP-u8 注入+天融信TopApp-LB 负载均衡系统sql注入
- 用友U8 Cloud QuerySoapServlet SQL注入漏洞
- 用户浏览器被互联网大厂私自[托管]?仔细一查,这事并不简单
- 电子取证之Linux PCI分析
- 电子取证实例:基于文件系统的磁盘数据取证分析
- 电子取证实例:基于磁盘的数据取证
- 电子取证技术之实战Volatility工具
- 电报群组大全
- 白名单下载恶意代码
- 白名单下载恶意代码的一个技巧
- 白鹿社工字典生成器,灵活与易用兼顾。
- 百卓Smart管理平台 autheditpwd.php SQL注入漏洞
- 百卓Smart管理平台 licence.php 文件上传漏洞
- 百卓Smart管理平台 uploadfile.php 文件上传漏洞
- 百卓Smart管理平台 useratte/layer_swich_conf.php 任意文件删除漏洞
- 百度地图
- 盘点 ZKP 主流实现方案技术特点
- 看准网
- 看我如何通过邮箱获取IP定位
- 知名安全软件AVAST被爆收集用户各种隐私信息并公开出售给其他公司
- 知风
- 短网址安全浅谈
- 破密行動: 以不尋常的角度破解 IDA Pro 偽隨機數
- 碎遮SZhe_Scan Web漏洞扫描器,基于python Flask框架,对输入的域名/IP进行全面的信息搜集,漏洞扫描,可自主添加POC
- 社会工程学密码生成器,是一个利用个人信息生成密码的工具
- 神奇的Content-Type——在JSON中玩转XXE攻击
- 离线OCR
- 离线导出Chrome浏览器中保存的密码
- 租房要点,适用于北上广深杭
- 移动设备取证、恶意软件分析和安全测试套件—Santoku
- 移动设备数字取证过程概述(上)
- 移动设备数字取证过程概述(下)
- 笔记
- 第一次启动 Google Chrome 会发生什么?
- 简单聊聊网络空间测绘纵横之道
- 算法/深度学习/NLP面试笔记
- 算法手记
- 系统安全攻防战:DLL注入技术详解
- 红队与理论:Credential Relay 与 EPA
- 织梦dedecms全版本漏洞扫描
- 终极在线隐私指南
- 经纬度在线查询
- 结合直接系统调用和sRDI来绕过AV / EDR
- 绕过DKIM验证,伪造钓鱼邮件
- 继苹果谷歌后:微软被曝监听用户Skype和Cortana录音
- 缓冲区溢出实战教程系列(三):利用OllyDbg了解程序运行机制
- 编写 Volatility 插件,轻松识别内存中的 DoublePulsar SMB implant
- 编程的重要性之 sqlmap 源码
- 编译原理在安全领域的应用
- 网撸黑话+技巧大全 | 岂安低调分享
- 网络审计之Wireshark基础, Part2
- 网络层绕过 IDS/IPS 的一些探索
- 网络犯罪调查与电子数据取证
- 网络相关的安全资源: awesome-network-stuff
- 网页快照网
- 美团云原生之容器安全实践
- 老司机带你过常规WAF
- 老文一次艰难的渗透纪实
- 老牌工具 PsExec 一个琐碎的细节
- 职友集
- 聚合数据- VIN码查询数据接口_免费API接口调用
- 胖客户端渗透测试的工具与技巧 - Part 4: 静态分析、内存取证与逆向分析
- 脏牛Linux提权漏洞
- 腾讯2017年度网络黑产威胁源研究报告
- 腾讯官方声称扫描浏览器历史数据是防止恶意登陆
- 自动化Host碰撞工具,帮助红队快速扩展网络边界,获取更多目标点
- 自動刪除你的 Google 網路和應用程式活動紀錄設定教學
- 自定义 Bark 服务
- 興趣和廣告資料
- 船员证书查询
- 船讯网
- 船问网-船舶档案,船舶在线揽货交易,运费托盘全程垫付
- 花式窃取NetNTLM哈希的方法
- 苹果回应Siri录音用户谈话内容:使用了1%的用户录音
- 著名开源网络取证工具Xplico远程未授权RCE漏洞
- 蓝信
- 蓝凌EKP sys/webservice/elecPsealUseWebService 文件读取漏洞
- 蓝凌智慧协同平台 fl_define_edit.aspx SQL注入漏洞
- 虚拟化简介
- 虚拟猫咪
- 行政许可结果公开系统
- 规则实验室
- 解密weblogic AES或DES加密方法
- 解析U盘病毒传播之文件欺骗
- 计算机取证在企业安全中的实际应用
- 让网络空间测绘技术不再那么飘忽不定
- 记一次挖掘存储型XSS漏洞过程
- 记一次服务器被入侵的调查取证
- 记一次横向渗透
- 记录一些网络空间测绘/搜索引擎相关的资料
- 论如何反击用AWVS的黑客
- 论高级威胁的本质和攻击力量化研究
- 详解Linux权限提升的攻击与防护
- 详解Windows注册表分析取证
- 详解反弹shell多维检测技术
- 语言安全
- 请求方法问题
- 诸神之眼nmap定制化之NSE进阶
- 诸神之眼nmap定制化之初识NSE
- 调查取证之Volatility框架的使用
- 调查取证之图像还原
- 调查取证之文字还原
- 谈谈Json格式下的CSRF攻击
- 谷歌崩溃报告究竟收集了哪些信息 个人信息如何处置
- 谷歌承认通过语音助手收集用户谈话内容:仅用于开发
- 货车位置、货车定位软件
- 货车位置实时查询
- 货车定位,集卡跟踪-海管家
- 资讯400多个流行站点记录用户键击 或导致个人敏感信息泄露
- 走进计算机取证分析的神秘世界
- 跨国定位手机の奥义
- 跨站的艺术:XSS Fuzzing 的技巧
- 车信会 VIN查询
- 软件无线电和开源基站在漏洞挖掘中的应用 PART 4:基带安全的一些探索和学习资源整合
- 这里
- 远控免杀从入门到实践之白名单(113个)
- 远程定位追踪联网车辆以及利用思路分析
- 远程提取凭证
- 远见搜索
- 逃避手段再开花——从一个能逃避AppLocker和AMSI检测的Office文档讲起
- 逆向分析——使用IDA动态调试WanaCrypt0r中的tasksche.exe
- 逆向分析神器BinNavi开源了
- 逆向资源: awesome-reverse-engineering
- 递归式寻找域名和api
- 通达OA RCE漏洞
- 通达oa11.9前台getshell漏洞分析
- 通过DNS rebinding绕过同源策略攻击Transmission分析
- 通过dnslog探测fastjson的几种方法
- 通过RDP反向攻击mstsc
- 通过regsrv32.exe绕过Applocker应用程序白名单的多种方法
- 通过Shodan和favicon icon发现真实IP地址
- 通过两个IDAPython插件支持A12 PAC指令和iOS12 kernelcache 重定位
- 通过将JavaScript隐藏在PNG图片中,绕过CSP
- 通过模拟可信目录绕过UAC的利用分析
- 通过编写 CS 的信标文件(BOF)来进行shellcode 注入、执行等操作
- 通过编码绕过一些cms对于xxe的检测
- 道哥的黑板报
- 邮件伪造技术与检测
- 郑瀚-Blog
- 重新思考凭证盗窃
- 针对 win 的入侵日志简单处理
- 针对RMI服务的九重攻击 - 上
- 针对RMI服务的九重攻击 - 下
- 针对取证的GNU/Linux发行版: PALADIN
- 针对国内一大厂的后渗透 – 持续
- 针对国外一款超火约会软件Tinder的取证分析
- 针对爱尔兰DDoS攻击的取证分析
- 钉钉群组机器人
- 银行卡quickpass闪付芯片通过EVM/PBOC读取隐私信息
- 门神WAF众测总结
- 阿里云安全白皮书
- 除非手动删除,不然 Alexa 上的语音资料会被亚马逊一直保留
- 隐私大爆炸,你得学几招保护自己
- 隔屏有耳调查|亚马逊智能音箱有千人监听团队,曾听到性侵案
- 隱私工具 - 加密安全對抗全球大規模監控
- 零信任下代理工具
- 零组资料文库-(需要邀请注册)
- 青岛港区 货物跟踪 - i跟踪
- 非正经硬盘脱密方式
- 面试必备基础知识
- 靶场
- 飞书群组机器人
- 香香的xss小记录(一)
- 高德地图
- 高级域渗透技术之传递哈希已死-LocalAccountTokenFilterPolicy万岁
- 鱼叉攻击
- 黑夜的猎杀-盲打XXE
- 🖥️ Local Inference
- 🛠️ Configuration
- 🦄🔒 Awesome list of secrets in environment variables 🖥️
- 🧪 Download dev/beta
- 1
- 8.0
- 8.4
- 192
- 624
- 712
- 1999
- 2000
- 2001
- 2002
- 2003
- 2004
- 2005
- 2006
- 2007
- 2008
- 2009
- 2010
- 2011
- 2012
- 2013
- 2014
- 2015
- 2016
- 2017
- 2018
- 2019
- 2020
- 2021
- 2022
- 2023
- 2024
- 2025
- 3125
- 4383
- 10110111
- 16077407
- 2976151305