wuba |
Antenna: 漏洞辅助验证存在与可利用性平台 |
https://github.com/wuba/Antenna |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
TypeScript,Java,Python,JavaScript,Dart,Objective-C |
0 |
0 |
wavestone-cdt |
EDR 检测机制以及用 EDRSandblast 工具逃逸 EDR 的检测 |
https://github.com/wavestone-cdt/EDRSandblast/tree/DefCon30Release |
https://github.com/wavestone-cdt?tab=followers |
Projects from the auditors and consultants from Wavestones Cybersecurity & Digital Trust practice |
None |
Wavestone |
14 |
0 |
0 |
0 |
0 |
Python,C |
0 |
0 |
therealdreg |
用于实现基于 Bochs 的 Linux 内核调试的工具 |
https://github.com/therealdreg/bochs_linux_kernel_debugging |
https://github.com/therealdreg?tab=followers |
Senior Malware Researcher, OS Internals, C/C++, x86 x64 ASM, reversing, forensics, hardware hacking, AVR, ARM Cortex |
Spain |
rootkit.es |
60 |
0 |
68 |
0 |
0 |
Python,C,C++ |
0 |
0 |
shmilylty |
netspy-快速探测内网可达网段工具 |
https://github.com/shmilylty/netspy |
https://github.com/shmilylty?tab=followers |
Developer, pentester and bug hunter. |
localhost |
None |
84 |
0 |
2500 |
0 |
0 |
Python,Go,Vue |
0 |
0 |
matanolabs |
Matano - 基于 Apache Iceberg 等项目搭建的 PB 级 Security Lake 数据平台 |
https://github.com/matanolabs/matano |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Rust |
0 |
0 |
markakd |
DirtyCred - 利用 Kernel Credentials Swap 实现提权的利用方法 |
https://github.com/markakd/dirtycred |
https://github.com/Markakd?tab=followers |
PhD at Northwestern University |
None |
None |
12 |
0 |
350 |
0 |
0 |
Python,C,LLVM |
0 |
0 |
loov |
Go 语言汇编和源码查看工具 |
https://github.com/loov/lensm |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Go,HTML |
0 |
0 |
ihebski |
渗透测试实战笔记 |
https://github.com/ihebski/A-Red-Teamer-diaries |
https://github.com/ihebski?tab=followers |
Security Operations Engineer (⌐■_■) , Pentester , Bughunter |
Error: Unable to resolve |
None |
62 |
0 |
644 |
0 |
0 |
Python,HTML,Jupyter |
0 |
0 |
google-research |
Google 发起从训练模型中逆向还原出训练数据集的安全挑战 |
https://github.com/google-research/lm-extraction-benchmark |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,Haskell,Jupyter,C++ |
0 |
0 |
gmh5225 |
游戏安全方向的资料整理 |
https://github.com/gmh5225/awesome-game-security |
https://github.com/gmh5225?tab=followers |
Im waiting for the new world to come |
New World |
Metaverse |
3500 |
0 |
1300 |
0 |
0 |
Rebol,C,TypeScript,Java,Python,Kotlin,JavaScript,Papyrus,C++,C#,HTML,Go,Rust |
0 |
0 |
fullstorydev |
grpcurl - 与 gRPC 服务交互的类 curl 命令行工具 |
https://github.com/fullstorydev/grpcurl |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
TypeScript,Java,Python,JavaScript,Go,Swift |
0 |
0 |
fingerprintjs |
设备指纹框架 FingerprintJS 的 Android 版本 |
https://github.com/fingerprintjs/fingerprintjs-android |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Kotlin,TypeScript,Swift,JavaScript,Dart |
0 |
0 |
evilsocket |
jscythe - 滥用 node.js inspector 机制实现任意 JS 代码执行 |
https://github.com/evilsocket/jscythe |
https://github.com/evilsocket?tab=followers |
|
Italy |
None |
147 |
0 |
20 |
0 |
0 |
Go,Python,JavaScript,Rust |
0 |
0 |
edwardz246003 |
COMRACE Detecting Data Race Vulnerabilities in COM Objects |
https://github.com/edwardz246003/presentations/blob/main/Usenix%20Security%202022/%E3%80%90Usenix%202022%20slides%E3%80%91COMRACE%20Detecting%20Data%20Race%20Vulnerabilities%20in%20COM%20Objects.pdf |
https://github.com/edwardz246003?tab=followers |
@edwardzpeng |
None |
None |
3 |
0 |
6 |
0 |
0 |
Python |
0 |
0 |
d4rckh |
gorilla - 用于生成密码字段的工具 |
https://github.com/d4rckh/gorilla |
https://github.com/d4rckh?tab=followers |
young man from romania with security as a hobby |
Romania |
None |
87 |
0 |
342 |
0 |
0 |
Rust,Nim |
0 |
0 |
binarly-io |
FwHunt Scanner - 在 UEFI 固件中扫描漏洞的工具 |
https://github.com/binarly-io/fwhunt-scan |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,Go,JavaScript,C++ |
0 |
0 |
TheOfficialFloW |
研究员 theflow0 公开了 PS5/PS4 BD-JB Exploits 的源码 |
https://github.com/TheOfficialFloW/bd-jb |
https://github.com/TheOfficialFloW?tab=followers |
Information Security Engineer |
Zurich |
None |
36 |
0 |
48 |
0 |
0 |
C |
0 |
0 |
SinaKarvandi |
从头构建一个 Hypervisor |
https://github.com/SinaKarvandi/Hypervisor-From-Scratch |
https://github.com/HyperDbg |
Windows Internals Enthusiast. Interested in low-level programming. I work on @HyperDbg debugger. |
None |
None |
14 |
0 |
20 |
0 |
0 |
C#,C,JavaScript,C++ |
0 |
0 |
P1sec |
QCSuper - 与基于高通芯片手机通信的工具,支持抓取 2G/3G/4G无线帧数据 |
https://github.com/P1sec/QCSuper |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,Java,Rust |
0 |
0 |
Muirey03 |
iOS 15.6 昨天修复的 APFS CVE-2022-32832 漏洞的 PoC |
https://github.com/Muirey03/CVE-2022-32832 |
https://github.com/Muirey03?tab=followers |
|
None |
@Elementalsthegame |
56 |
0 |
16 |
0 |
0 |
Objective-C,C |
0 |
0 |
MWR-CyberSec |
PXEThief - 利用 Windows 的终端部署功能 SCCM 导出密码 |
https://github.com/MWR-CyberSec/PXEThief |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Python,C,PowerShell |
0 |
0 |
Kudaes |
Elevator - UAC Bypass by abusing RPC and debug objects |
https://github.com/Kudaes/Elevator |
https://github.com/Kudaes?tab=followers |
nt authority\kurosh |
Madrid |
None |
9 |
0 |
276 |
0 |
0 |
C#,C++,Rust |
0 |
0 |
Esonhugh |
云安全入门材料 |
https://github.com/Esonhugh/Attack_Code |
https://github.com/Esonhugh?tab=followers |
Esonhugh is computer noob. Su-Team member/Red Team?/cloud security?/(in)dependent security researcher/pentester?/evasion lover?/focus on TTP/INTP |
in Cloud |
Eson Network |
66 |
0 |
742 |
0 |
0 |
Python,Go,Ruby |
0 |
0 |
BlackINT3 |
OpenArk - Windows 平台开源 anti-rootkit 工具 |
https://github.com/BlackINT3/OpenArk |
https://github.com/BlackINT3?tab=followers |
Focus in crafting 2022 |
None |
None |
8 |
0 |
39 |
0 |
0 |
C++ |
0 |
0 |
0xrawsec |
为 Windows 开发的开源版本 EDR |
https://github.com/0xrawsec/whids |
None |
None |
None |
None |
0 |
0 |
0 |
0 |
0 |
Go,Python,HTML,PowerShell,Rust |
0 |
0 |
0vercl0k |
Paracosme - Pwn2Own 比赛研究员利用 zero-click RCE 漏洞攻破 ICONICS Genesis64 工控软件的细节 |
https://github.com/0vercl0k/paracosme |
https://github.com/0vercl0k?tab=followers |
|
US/FR |
None |
35 |
0 |
4 |
0 |
0 |
Python,C,JavaScript,Rich,C++ |
0 |
0 |