- jtsec Beyond IT Security
- Granada, España
- https://www.linkedin.com/in/jacobocasado/
- https://obscure.land
Highlights
- Pro
Stars
- All languages
- Assembly
- Batchfile
- Boo
- C
- C#
- C++
- CMake
- CSS
- CoffeeScript
- Dart
- Dockerfile
- Go
- HCL
- HTML
- Haskell
- Inno Setup
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- LLVM
- Logos
- Lua
- MDX
- Makefile
- Nim
- Nix
- Objective-C
- Objective-C++
- OpenEdge ABL
- PHP
- Pascal
- PowerShell
- Python
- QML
- Reason
- Rich Text Format
- Roff
- Ruby
- Rust
- Scala
- Shell
- Smali
- Smarty
- Solidity
- Swift
- TypeScript
- VBA
- Vue
- YARA
An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respective owners. I'm just maintaining it.
This Magisk module helps you bypass SafetyNet and Play Integrity on rooted Android devices by modifying system properties and applying device-specific fixes. It aims to improve privacy and grant ac…
OneWordlistToListThemAll is a huge mix of password wordlists, proven to be pretty useful to provide some quick hits when cracking several hashes
Havoc C2 BOF — WFP kernel-space SYSTEM escalation + command execution with indirect syscalls, patchless AMSI/ETW bypass, and return address spoofing
Claude Code plugin providing skills for x64dbg debugger automation
Android library to intercept ELF .init_array/.fini_array execution with pre/post callbacks. All ABIs, Android 5.0+.
DOG is a post-exploitation toolkit that uses your existing kernel read/write primitive to locate, classify, and chain kernel gadgets.
Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android
A lightweight, powerful framework for multi-agent workflows
A Dynamic Binary Instrumentation framework based on LLVM.
Android RASP project, Protect APK from any vulnerabilities.
AI-powered penetration testing using autonomous agents — directly in your terminal.
AV/EDR Lab environment setup references to help in Malware development
Collection of different rootkit functionality, each driver representing a different rootkit component
A unique technique to execute binaries from a password protected zip
Vulnerability detection framework by Binarly's REsearch team
High-efficiency tool for detecting 1-day vulnerabilities with unmatched accuracy. Rapid, reliable version & code based software security analysis.
Burp Suite extension that adds built-in MCP tooling, AI-assisted analysis, privacy controls, passive and active scanning and more
An explanation on unredacting iOS's <private> os_log privacy mechanism