-
Police Data Accessibility Project
- Washington State
-
08:37
(UTC -08:00) - https://alecakin.com/about/
- in/wakin
Penetration Testing
CLI tool for saving a faithful copy of a complete web page in a single HTML file (based on SingleFile)
🗃 Open source self-hosted web archiving. Takes URLs/browser history/bookmarks/Pocket/Pinboard/etc., saves HTML, JS, PDFs, media, and more...
A collection of android security related resources
Scripted Local Linux Enumeration & Privilege Escalation Checks
Reverse engineering and pentesting for Android applications
A lightweight test input generator for Android. Similar to Monkey, but with more intelligence and cool features!
A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
🐿️ A collection of projects focused on connectivity that enable building cross-device experiences.
Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence.
ClusterFuzzLite - Simple continuous fuzzing that runs in CI.
syzkaller is an unsupervised coverage-guided kernel fuzzer
Python library to carry out DFIR analysis on the Cloud
Security Crawl Maze is a comprehensive testbed for web security crawlers. It contains pages representing many ways in which one can link resources from a valid HTML document.
A temporary email right from your terminal written in POSIX sh
The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.
A machine learning tool that ranks strings based on their relevance for malware analysis.
Parse and stringify URL query strings
FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.
Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabling collaboration to tackle trending vulnerabilities on the …
Find specific users in active directory via their username and logon IP address
Modular command-line tool to parse, create and manipulate JWT tokens for hackers