Skip to content
View sushi2k's full-sized avatar

Block or report sushi2k

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Documenting your Threat Models with HCL

Go 454 23 Updated Dec 26, 2025

The OWASP Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes technical processes for verifying the OWA…

Python 12,646 2,629 Updated Jan 6, 2026

Invictus Threat Intelligence: IOCs and TTPs from blogs, research and more

31 Updated Nov 26, 2025

iOS and macOS Decompiler

Java 2,604 86 Updated Aug 26, 2025

AI tool to deobfuscate and find any potential vulnerabilities in android apps.

Python 300 39 Updated Nov 6, 2025

Your gateway to OWASP. Discover, engage, and help shape the future!

Python 295 398 Updated Jan 10, 2026

Integration and automation API for Corellium

JavaScript 76 18 Updated Jul 2, 2025

An Intentionally Vulnerable Android App

Kotlin 7 19 Updated Jul 31, 2024

A description of the electronics of the artwork decision tree, 2024

C++ 1 Updated Jan 25, 2024

Run Capture the Flags and Security Trainings with OWASP WrongSecrets

JavaScript 54 18 Updated Jan 10, 2026

OWASP Foundation Web Respository

HTML 338 87 Updated Jan 10, 2026

game of active directory

PowerShell 7,301 1,018 Updated Jul 16, 2025

A collection of Semgrep rules derived from the OWASP MASTG specifically for Android applications.

Java 314 31 Updated Nov 12, 2025

OWASP Foundation Web Respository

HTML 2 2 Updated Oct 9, 2025

An Open Letter to the OWASP Board

107 79 Updated Aug 7, 2023

Vulnerability scanner written in Go which uses the data provided by https://osv.dev

Go 8,330 512 Updated Jan 9, 2026

Vulnerable app with examples showing how to not use secrets

Java 1,384 516 Updated Jan 10, 2026

A repo to house files for our blogposts on blog.nviso.eu

C++ 74 18 Updated Mar 13, 2025

List of vendors that do not allow IMDSv2 enforcement

143 10 Updated May 3, 2024

DIY Alexa

Jupyter Notebook 599 201 Updated Dec 7, 2023

The Swiss Army Container for Cloud Native Security. Container with all the list of useful tools/commands while hacking and securing Containers, Kubernetes Clusters, and Cloud Native workloads.

Dockerfile 284 65 Updated Apr 10, 2023

mobsfscan is a static analysis tool that can find insecure code patterns in your Android and iOS source code. Supports Java, Kotlin, Swift, and Objective C Code. mobsfscan uses MobSF static analysi…

Python 729 119 Updated Jan 31, 2025

Rules engine for cloud security, cost optimization, and governance, DSL in yaml for policies to query, filter, and take actions on resources

Python 5,899 1,585 Updated Jan 8, 2026

rvictl for Linux and Windows: capture packets sent/received by iOS devices

Python 209 30 Updated Mar 26, 2024

A graphical programming interface that helps newbies get into embedded programming. It's based on Google's Blockly and turns blocks into arduino-compatible code.

JavaScript 91 18 Updated Jun 21, 2023

University lecture on "IT Security" as Open Educational Resources material

375 153 Updated Aug 18, 2023

OWASP dependency-check is a software composition analysis utility that detects publicly disclosed vulnerabilities in application dependencies.

Java 7,380 1,390 Updated Jan 9, 2026
Next