-
Updated
Sep 30, 2020
{{ message }}
hacker, ready for more of our story !
PHP Security Check List [ EN ]
Subdomain takeover vulnerability checker
HTTP Request Smuggling over HTTP/2 Cleartext (h2c)
hashcat rules generated from over 840 million compromised passwords
Metasploit Cheat Sheet
Fuzzing results for various interpreters.
A curated list of awesome baseband research resources
A curated list of awesome Cisco exploitation resources
Unstripped iOS kernel extensions and more. More coming soon.
FeedHenry Mobile Security
Security advisories published by Enable Security
From IoT Pentesting to IoT Security
A proxy for security researchers outside India to access Indian government websites without resorting to shady VPNs.
Continuous Security Integration - Security Framework for CI/CD Pipelines and Beyond...
Kernel Fuzzer for Apple's XNU, mainly meant for the iOS operating system
A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.
Baneberry repo, an intentionally vulnerable raspberry pi image with logs configured for shipping for SIEM analysis and learning about Linux logging.
白帽SEO是一种精神!
Fetch and parse a website's security.txt file.
This is a script for collecting MSSQL security information daily for reporting and security remeditation,
Add a description, image, and links to the security-research topic page so that developers can more easily learn about it.
To associate your repository with the security-research topic, visit your repo's landing page and select "manage topics."
#196 introduced a double up of each entry that wasn't caught in review. In order to prevent repeat cases of this, or minor double ups, a Github actions entry should be created that checks for any double ups of the program name at the time when a new pull request is created, and if so, fail the case.