There are no reviews yet. Be the first to send feedback to the community and the maintainers!
BurpExtension-WhatsApp-Decryption-CheckPoint
This tool was created during our research at Checkpoint Software Technologies on Whatsapp Protocol (This repository will be updated after BlackHat 2019)OllyDbg-v1.10-With-Best-Plugins-And-Immunity-Debugger-theme-
Make OllyDbg v1.10 Look like Immunity Debugger & Best PluginsOwasp-TOP-10-Training-Panel
This repository contains the source code of the web panel I have used in my book series of books: Cyber and Penetration Testing – Web Penetration Testing.From-Zero-to-Hero-in-Web-Security-Research-DefCon-29-Workshop
From Zero to Hero in Web Security Research - Def Con 29 WorkshopFrom-Zero-to-Hero-in-Blockchain-Security-DefCon30-Workshop
Blockchain technology has to be one of the biggest technology innovations of the past few years. The top emerging blockchain development trends are crypto coins, NFT, Defi, and even metaverse. Nowadays, Companies are adopting blockchain technology and moving to the decentralized world. Especially smart contract technologies, which open them to a new cyberattack in a new crypto world. While technology evolves cybercriminals evolve along and we constantly hear about the theft of millions of dollars at security breaches in smart contracts everywhere.Google_Maps_Snake_Hack
A research done by Yaara Shriki and Roman Zaikin on Google maps April Fool Prank.ITsafe_Mobile_Penetration
Training Apps For Mobile Penetration BookRaspberryPiVM
This repository contains a raspberry pi VM that can be executed by using QemuOwasp-TOP-10-Training-Panel-Node
This repository contains the source code of the OWASP TOP 10 NodeJS Panel I have usedsmartDiff
smart function that will highlight the difference between 2 stringsPEImage
Store and Retrieve PE inside Image using pixel colors as bitsowasp-il-ctf
solutions to OWASP IL CTFminesweeper_debugger_loop
solving the game minesweeper by using debugger loop in C and Pythondefcon_a3_sensitive_data_exposure
Rather than directly attacking crypto, attackers steal keys, or steal clear text data off the server, Developers sometimes forget test cases or other files on production servers.Love Open Source and this site? Check out how you can help us