Weakpass
A comprehensive collection of wordlists for bruteforcing and password cracking, covering various hashing algorithms and sizes.
Version 2 of the Graphical Realism Framework for Industrial Control Simulation (GRFICS) is organized as 5 VirtualBox VMs (a 3D simulation, a soft PLC, an HMI, a pfsense firewall, and a workstation) communicating with each other on host-only virtual networks. For more details, refer to the workshop paper at https://www.usenix.org/conference/ase18/presentation/formby. A video series on VM setup and example attacks is available on the Fortiphyd YouTube channel at https://www.youtube.com/playlist?list=PL2RSrzaDx0R670yPlYPqM51guk3bQjFG5. A commercial version with more scenarios and features is offered by Fortiphyd Logic at https://www.fortiphyd.com/training.
A comprehensive collection of wordlists for bruteforcing and password cracking, covering various hashing algorithms and sizes.
Semi-tethered jailbreak for iPhone 5s to iPhone X, running iOS 12.0 and up, using the 'checkm8' bootrom exploit.
A novel genetic algorithm for automating censorship evasion strategies.
A set of tools for securing JavaScript projects against software supply chain attacks.
Introspy-Android is a blackbox tool for understanding Android app behavior and identifying security issues at runtime.
A comprehensive checklist for securing Android apps