Skip to content
View sushi2k's full-sized avatar

Block or report sushi2k

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Documenting your Threat Models with HCL

Go 453 23 Updated Dec 26, 2025

The OWASP Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes technical processes for verifying the OWA…

Python 12,654 2,634 Updated Jan 12, 2026

Invictus Threat Intelligence: IOCs and TTPs from blogs, research and more

30 Updated Nov 26, 2025

iOS and macOS Decompiler

Java 2,614 86 Updated Aug 26, 2025

AI tool to deobfuscate and find any potential vulnerabilities in android apps.

Python 301 39 Updated Nov 6, 2025

Your gateway to OWASP. Discover, engage, and help shape the future!

Python 302 411 Updated Jan 12, 2026

Integration and automation API for Corellium

JavaScript 76 18 Updated Jul 2, 2025

An Intentionally Vulnerable Android App

Kotlin 7 19 Updated Jul 31, 2024

A description of the electronics of the artwork decision tree, 2024

C++ 1 Updated Jan 25, 2024

Run Capture the Flags and Security Trainings with OWASP WrongSecrets

JavaScript 54 18 Updated Jan 10, 2026

OWASP Foundation Web Respository

HTML 338 88 Updated Jan 12, 2026

game of active directory

PowerShell 7,316 1,017 Updated Jul 16, 2025

A collection of Semgrep rules derived from the OWASP MASTG specifically for Android applications.

Java 315 31 Updated Nov 12, 2025

OWASP Foundation Web Respository

HTML 2 2 Updated Oct 9, 2025

An Open Letter to the OWASP Board

107 79 Updated Aug 7, 2023

Vulnerability scanner written in Go which uses the data provided by https://osv.dev

Go 8,341 513 Updated Jan 12, 2026

Vulnerable app with examples showing how to not use secrets

Java 1,385 521 Updated Jan 12, 2026

A repo to house files for our blogposts on blog.nviso.eu

C++ 74 18 Updated Mar 13, 2025

List of vendors that do not allow IMDSv2 enforcement

143 10 Updated May 3, 2024

DIY Alexa

Jupyter Notebook 599 201 Updated Dec 7, 2023

The Swiss Army Container for Cloud Native Security. Container with all the list of useful tools/commands while hacking and securing Containers, Kubernetes Clusters, and Cloud Native workloads.

Dockerfile 285 65 Updated Apr 10, 2023

mobsfscan is a static analysis tool that can find insecure code patterns in your Android and iOS source code. Supports Java, Kotlin, Swift, and Objective C Code. mobsfscan uses MobSF static analysi…

Python 729 119 Updated Jan 31, 2025

Rules engine for cloud security, cost optimization, and governance, DSL in yaml for policies to query, filter, and take actions on resources

Python 5,902 1,585 Updated Jan 8, 2026

rvictl for Linux and Windows: capture packets sent/received by iOS devices

Python 210 30 Updated Mar 26, 2024

A graphical programming interface that helps newbies get into embedded programming. It's based on Google's Blockly and turns blocks into arduino-compatible code.

JavaScript 91 18 Updated Jun 21, 2023

University lecture on "IT Security" as Open Educational Resources material

376 153 Updated Aug 18, 2023

OWASP dependency-check is a software composition analysis utility that detects publicly disclosed vulnerabilities in application dependencies.

Java 7,386 1,392 Updated Jan 12, 2026
Next