Explore 173 curated tools and resources
A command-line program for finding secrets and sensitive information in textual data and Git history.
A deserialization payload generator for .NET formatters
A collection of tools for extracting and analyzing information from .git repositories
A tool for generating .NET serialized gadgets for triggering .NET assembly load/execution.
A company that helps organizations create security-aware teams and produce bug-free software.
An article in Phrack Magazine discussing the creation of shellcode for StrongARM/Linux architecture.
A collection of Yara rules for identifying malicious PEs with unique or suspicious PDB paths.
Copy executables with execute, but no read permission on Unix systems.
YaraHunter scans container images, running Docker containers, and filesystems to find indicators of malware.
A non-commercial wargame site offering pwn challenges related to system exploitation with different difficulty levels.
Generates a YARA rule to match basic blocks of the current function in IDA Pro
HxD is a freeware hex editor and disk editor with advanced features for editing files, memory, and disks.
A tool that scans a corpus of malware and builds a YARA rule to detect similar code sections.
A Python library for loading and executing Beacon Object Files (BOFs) in-memory.
Tool to disable vulnerable features in Windows and popular applications for enhanced security.
AMDH is an Android tool for automating scanning, hardening system settings, detecting malware, and protecting privacy.
A tool for triaging crash files with various output formats and debugging engine options.
Repository of YARA rules for identifying and classifying malware.
Collection of Return-Oriented Programming challenges for practicing exploitation skills.
Stealing Signatures and Making One Invalid Signature at a Time.