- Croatia
-
09:40
(UTC +01:00) - https://www.sekuripy.hr
- @stamparm
- in/miroslav-stampar-phd-94670439
Highlights
Stars
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
CTF framework and exploit development library
A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data
Cowrie SSH/Telnet Honeypot https://docs.cowrie.org/
PEDA - Python Exploit Development Assistance for GDB
Automated All-in-One OS Command Injection Exploitation Tool
GRR Rapid Response: remote live forensics for incident response
« usbkill » is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.
This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format on x86, x64, ARM, ARM64, PowerPC, SPARC, MIPS, RISC-V 64, a…
Missing data visualization module for Python.
Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.
Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors
Pixel graphics in terminal with unicode braille characters
Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key Exchange, Authentication methods along with example challenge…
Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems
fast, simple packet creation / parsing, with definitions for the basic TCP/IP protocols
Python Decoders for Common Remote Access Trojans
IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.
IPython magic command to profile and view your python code as a heat map.
A python2 script for sweeping a network to find windows systems compromised with the DOUBLEPULSAR implant.




