-
Cascadia Information Security
- Portland, OR
- http://shadyproject.net
- @shadyproject
Stars
A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle, Javascript and more
Exploit code for CVE-2023-42914 / pwn2own Vancouver 2023
Blacklists and whitelists built by open code, so you know what goes into them.
Linux ultimate self-hosted network security guide ║ Linux 终极自托管网络安全指南 ║ Guía definitiva de seguridad de red autohospedada de Linux ║ लिनक्स परम स्व-होस्टेड नेटवर्क सुरक्षा गाइड ║ Окончательное руко…
Bjorn is a powerful network scanning and offensive security tool for the Raspberry Pi with a 2.13-inch e-Paper HAT. It discovers network targets, identifies open ports, exposed services, and potent…
A tool to explore USB-C on Apple devices using the Tamarin C Hardware.
Decrypt an encrypted local iOS backup on Windows or MacOS
Includes an improved translation, rebalanced gameplay, and other quality of life improvements.
Malware visualization in 2D using t-SNE
📈 A curated list of awesome data visualization libraries and resources.
A curated list of hacking environments where you can train your cyber skills legally and safely
hardCIDR is a Linux Bash script, but also functions under macOS. Your mileage may vary on other distros. The script with no specified options will query ARIN and a pool of BGP route servers. The ro…
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.
securelyfitz / ResistorLabels
Forked from Finomnis/ResistorLabelsThis script generates Labels for Resistor zip bags
A Rust implementation of the SGP4 satellite propagation algorithm
macOS native desktop Software Defined Radio app
library for turning a RTL2832 based DVB dongle into a Software DefinedReceiver; mirror from https://gitea.osmocom.org/sdr/rtl-sdr
Extract files from any kind of container formats
OFRAK: unpack, modify, and repack binaries.
Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker on your journey.