Coder Social home page Coder Social logo

powned's Projects

abptts icon abptts

TCP tunneling over HTTP/HTTPS for web application servers

adversarial-robustness-toolbox icon adversarial-robustness-toolbox

Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams

al-khaser icon al-khaser

Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.

amass icon amass

In-depth Attack Surface Mapping and Asset Discovery

andriller icon andriller

📱 Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from Android devices.

androl4b icon androl4b

A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis

androset icon androset

Automated script to convert and push Burp Suite certificate in Android, and modify Android's IP table to redirect all traffic to Burp Suite.

apkstudio icon apkstudio

Open-source, cross platform Qt based IDE for reverse-engineering Android application packages.

attack_data icon attack_data

A repository of curated datasets from various attacks

awesome-iot-hacks icon awesome-iot-hacks

A Collection of Hacks in IoT Space so that we can address them (hopefully).

bad_ducky icon bad_ducky

Rubber Ducky compatible clone based on CJMCU BadUSB HW.

bashfuscator icon bashfuscator

A fully configurable and extendable Bash obfuscation framework. This tool is intended to help both red team and blue team.

batea icon batea

AI-based, context-driven network device ranking

beroot icon beroot

Privilege Escalation Project - Windows / Linux / Mac

bettercap icon bettercap

The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.

bhg icon bhg

Code samples for No Starch Press Black Hat Go

brownie icon brownie

A Python-based development and testing framework for smart contracts targeting the Ethereum Virtual Machine.

brutal icon brutal

Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device ( Payload Teensy )

cape icon cape

Malware Configuration And Payload Extraction

capev2 icon capev2

Malware Configuration And Payload Extraction

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.