How To Get The User Manuals Of Popular Xiaomi Products

3 years ago

1. Introduction Xiaomi is a Chinese electronics company headquartered in Beijing. It was founded by Lei Jun, who is currently…

Umay : IoT Malware Similarity Analysis Platform

3 years ago

Umay project provides IoT malware similarity analysis based on shared codes. It helps to identify other malwares that have shared…

MultiPotato : Another Potato to get SYSTEM via SeImpersonate privileges

3 years ago

MultiPotato is just another Potato to get SYSTEM via SeImpersonate privileges. But this one is different in terms of It…

TrojanSourceFinder : Help Find Trojan Source Vulnerability In Code

3 years ago

TrojanSourceFinder is a Trojan Source vulnerability allows an attacker to make malicious code appear innocent. In general, the attacker tries…

Mariana Trench : Security Focused Static Analysis Tool For Android And Java Applications

3 years ago

Mariana Trench is a security focused static analysis platform targeting Android. This guide will walk you through setting up Mariana…

log4j-Scan : A Fully Automated, Accurate & Extensive Scanner For Finding Vulnerable log4j Hosts

3 years ago

log4j-scan is a fully automated, accurate, and extensive scanner for finding vulnerable log4j hosts. Features Support for lists of URLs.Fuzzing…

Log4J-Detector : Detects Log4J versions on your file-system within any application that are vulnerable to CVE-2021-44228 and CVE-2021-45046

3 years ago

Log4J-Detector is a Scanner that detects vulnerable Log4J versions to help teams assess their exposure to CVE-2021-44228 (CRITICAL), CVE-2021-45046, CVE-2021-45105, and CVE-2021-44832. Can search for…

Jektor : A Windows User-Mode Shellcode Execution Tool That Demonstrates Various Techniques That Malware Uses

3 years ago

Jektor utility focuses on shellcode injection techniques to demonstrate methods that malware may use to execute shellcode on a victim…

Haptyc : Test Generation Framework

3 years ago

Haptyc is a python library which was built to add payload position support and Sniper/Clusterbomb/Batteringram/Pitchfork attack types into Turbo Intruder.…

FiddleZAP : A Simplified Version Of EKFiddle For OWASP ZAP

3 years ago

FiddleZAP is a simplified version of EKFiddle for OWASP ZAP. With ZAP as your web proxy, you are able to flag malicious…