Exploitation Framework for Embedded Devices
-
Updated
Jun 12, 2020 - Python
Exploitation Framework for Embedded Devices
SpiderFoot automates OSINT collection so that you can focus on analysis.
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
A collection of open source and commercial tools that aid in red team operations.
An Information Security Reference That Doesn't Suck
A collected list of awesome security talks
A curated list of awesome infosec courses and training resources.
巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
The --maxtime CLI flag should control the total execution time. However, the timer is reset for each new job added to the list by recursion detection that gets enabled by --recursion.
Additionally, add a new CLI flag --maxtime-job that counts towards the maximum execution time for each job, and if it hits, cancel the job and move forward to the next one.
This was reported OOB by @damia
Many users of Cameradar are not english-speakers but Chinese and Russian speakers. I saw already that @wxylssy started translating the README to Simplified Chinese on his fork.
It would be nice to have official translations to help new users that are not english-speakers understand the project, so @wxylssy if you'd like to contribute you are more than wel
Is subdomains hosted at discourse is vulnerable to takeover or not?
Hide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️
Calling all pentesters and/or people like myself who find infosec pretty neat!
Do you have any cool Shodan.io queries that you've come across — cool, funny, interesting, scary, facepalm-inducing, or otherwise? Some examples of IOT gems we've already found are electronic billboards with banks advertising free donuts, gas station pumps around the country, X-ray machines, 3D p
A proposed standard that allows websites to define security policies.
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Malcom - Malware Communications Analyzer
Subdomain Takeover tool written in Go
Our mysql database requires allowCleartextPasswords=1, is it possible to add a flag to enable this or maybe allow custom options to be passed to the dsn creation?
Package uwsgi from Ubuntu repo is advised in production usage, but it is too old and won't work. File yeti_uwsgi.service has -w switch which is absent in this package.
Pip version works, probably it's sufficient to add uwsgi to requirements.txt
| Question | Answer |
|---|---|
| OS version | Ubuntu 16.04 LTS |
A curated list of awesome social engineering resources.
Add a description, image, and links to the infosec topic page so that developers can more easily learn about it.
To associate your repository with the infosec topic, visit your repo's landing page and select "manage topics."
Multiples wiki issues.
Typos
Bad links
first-stepsdoesn't exist anymore.Images