This repository contains tools and documentation for validating hardware configuration of an x86 platform, especially focusing on security requirements. The tools provided can be used to build a bootable USB key with modes for checking platform configuration registers using chipsec tool and inspecting/modifying SecureBoot key list with keytool.efi binary. Detailed documentation on the tested modules and security-related CPU options is available in the provided folders.
FEATURES
ALTERNATIVES
Machine learning project for intuitive threat analysis with a web interface.
Android application for learning about vulnerabilities in modern Android apps and testing pentesting skills.
A tool for quantitative risk analysis of Android applications using machine learning techniques.
House: A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.
AMDH is an Android tool for automating scanning, hardening system settings, detecting malware, and protecting privacy.
An open-source phishing toolkit for businesses and penetration testers.
iOS Reverse Engineering Toolkit for automating common tasks in iOS penetration testing.
A novel genetic algorithm for automating censorship evasion strategies.
PINNED

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.

Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.