bytew0lf Goto Github PK
Name: Bytewolf
Type: User
Bio: @kingbytewolf
Twitter: kingbytewolf
Location: Planet Earth
Name: Bytewolf
Type: User
Bio: @kingbytewolf
Twitter: kingbytewolf
Location: Planet Earth
Resources to help you keep secrets (API keys, database credentials, certificates, ...) out of source code and remediate the issue in case of a leaked API key. Made available by GitGuardian.
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
A collection of handy Bash One-Liners and terminal tricks for data processing and Linux system maintenance.
DEPRECATED: Monitor Mode and Firmware patching framework for the Raspberry Pi 3, development moved to: https://github.com/seemoo-lab/nexmon
The Swiss Army knife for 802.11, BLE and Ethernet networks reconnaissance and MITM attacks.
Panorama of IoT cyber security regulations across the world
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
OASIS CSAF TC: Supporting version control for Work Product artifacts developed by members of TC, including prose specifications and secondary artifacts like meeting minutes and productivity code
CVRF Generator
Small program to import the CVE JSON feeds from NIST into a MongoDB
An organized list of resources including tools, blog-posts and how-to tutorials compiled and created by SCSP community members.
Scans for .NET Deserialization Bugs in .NET Assemblies
Free Security and Hacking eBooks
Top 100 Hacking & Security E-Books (Free Download)
Hardentools is a utility that disables a number of risky Windows features.
Investigate malicious Windows logon by visualizing and analyzing Windows event log
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Technically-oriented PDF Collection (Papers, Specs, Decks, Manuals, etc)
The PE-Inspector can be used to gather information about any PE-File in Windows. It works with both 32bit and 64bit files.
Penetration tests guide based on OWASP including test cases, resources and examples.
Custom pentesting tools
🔒 A curated checklist of 100+ tips for protecting digital security and privacy in 2020
Information Repository for Plexus Unix computers like the Plexus P/20
Run PowerShell with rundll32. Bypass software restrictions.
A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware.
Curated list of public penetration test reports released by several consulting firms and academic security groups
Exploitation Framework for Embedded Devices
Some Scripts for different purposes
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
A fake SSH server that lets everyone in and logs their activity
A declarative, efficient, and flexible JavaScript library for building user interfaces.
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google ❤️ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.