Giter Club home page Giter Club logo

ritavratask's Projects

aa-tools icon aa-tools

Artifact analysis tools by JPCERT/CC Analysis Center

abd icon abd

Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories

amass icon amass

In-depth Attack Surface Mapping and Asset Discovery

bass icon bass

BASS - BASS Automated Signature Synthesizer

evilginx2 icon evilginx2

Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication

flare-floss icon flare-floss

FireEye Labs Obfuscated String Solver - Automatically extract obfuscated strings from malware.

ftpshadowmove icon ftpshadowmove

Una prueba de concepto de FTPShadowMove (DISCLAIMER: spaghetti code), modificando la PoC original de X-C3LL: https://adepts.of0x.cc/shadowmove-hijack-socket/

mis-yara icon mis-yara

En este repositorio voy a ir dejando alguna YARA que haga by myself o por alguna charlilla

mobile-security-framework-mobsf icon mobile-security-framework-mobsf

Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.

sigma_ukraine_russia_cyberwar icon sigma_ukraine_russia_cyberwar

This is an intent to create detection rules regarding all the malware families that are been deployed in the russian-ukranian cyberconflict.

tinycheck icon tinycheck

TinyCheck allows you to easily capture network communications from a smartphone or any device which can be associated to a Wi-Fi access point in order to quickly analyze them. This can be used to check if any suspect or malicious communication is outgoing from a smartphone, by using heuristics or specific Indicators of Compromise (IoCs). In order to make it working, you need a computer with a Debian-like operating system and two Wi-Fi interfaces. The best choice is to use a Raspberry Pi (2+) a Wi-Fi dongle and a small touch screen. This tiny configuration (for less than $50) allows you to tap any Wi-Fi device, anywhere.

toolkit icon toolkit

The essential toolkit for reversing, malware analysis, and cracking

tsunami-security-scanner icon tsunami-security-scanner

Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence.

vulnsearch icon vulnsearch

A deep look at some recon methodologies and web-application vulnerabilities of my interest where I will merge all my notes gathered from books, videos, articles and own experience with bug bounty hunting / web and network hacking

xss-scanner icon xss-scanner

XSS scanner that detects Cross-Site Scripting vulnerabilities in website by injecting malicious scripts

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.