Appshark : Static Taint Analysis Platform To Scan Vulnerabilities In An Android App

3 years ago

Appshark is a static taint analysis platform to scan vulnerabilities in an Android app. Prerequisites Appshark requires a specific version…

VuCSA : Vulnerable Client-Server Application – Made For Learning/Presenting

3 years ago

Vulnerable client-server application (VuCSA) is made for learning/presenting how to perform penetration tests of non-http thick clients. It is written…

Jscythe : Force Any Node.Js/Electron/V8 Based Process To Execute Arbitrary Javascript Code

3 years ago

Jscythe abuses the node.js inspector mechanism in order to force any node.js/electron/v8 based process to execute arbitrary javascript code, even…

Cicd-Goat : A Deliberately Vulnerable CI/CD Environment

3 years ago

The CI/CD-Goat project allows engineers and security practitioners to learn and practice CI/CD security through a set of 10 challenges,…

Reverse_SSH : SSH Based Reverse Shell

3 years ago

Want to use SSH for reverse shells? Now you can using reverse_SSH. Manage and connect to reverse shells with native…

Ermir : An Evil Java RMI Registry

3 years ago

Ermir is an Evil/Rogue RMI Registry, it exploits unsecure deserialization on any Java code calling standard RMI methods on it…

Threatest : Threatest Is A Go Framework For End-To-End Testing Threat Detection Rules

3 years ago

Threatest is a Go framework for testing threat detection end-to-end. Threatest allows you to detonate an attack technique, and verify…

The Rise of Hyper-Converged Infrastructure

3 years ago

Hyper-converged infrastructure (HCI) claims to simplify IT by merging storage, computation, and typically a virtualization environment in a single system…

Sandman : NTP Based Backdoor For Red Team Engagements In Hardened Networks

3 years ago

Sandman is a backdoor that is meant to work on hardened networks during red team engagements. Sandman works as a…

Whids : Open Source EDR For Windows

3 years ago

Whids is a Open Source EDR For Windows with artifact collection driven by detection. The detection engine is built on…