@GDSSecurity

Gotham Digital Science

Windows-Exploit-Suggester

This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.

Updated Sep 20, 2016

Python 45 20

SSH-Weak-DH

Updated Sep 19, 2016

mbedtls-fuzz

Updated Sep 9, 2016

Python 0 1

sentrygun-server

forked from s0lst1c3/sentrygun-server

Updated Aug 25, 2016

Python 1 4

sentrygun

forked from s0lst1c3/sentrygun

Rogue AP killer

Updated Aug 25, 2016

PSAttack

forked from jaredhaight/PSAttack

A portable console aimed at making pentesting with PowerShell a little easier.

Updated Aug 25, 2016

Python 33 23

Jetleak-Testing-Script

Script to test if a server is vulnerable to the JetLeak vulnerability

Updated Jul 1, 2016

Java 7 9

Anti-CSRF-Library

This library was co-developed with a leading financial institution in order to build a single solution for Cross-Site Request Forgery (CSRF) prevention that is flexible enough to deploy firm-wide within diverse Java/J2EE web application environments.

Updated Jun 14, 2016

Docker-Secure-Deployment-Guidelines

Deployment checklist for securely deploying Docker

Updated May 2, 2016

XSLT 2 6

Convert2FPR

Utility for converting Findbugs, ESLint and PMD XML results into HP Fortify FPRs

Updated Apr 8, 2016

Python 124 31

EvilAbigail

Automated Linux evil maid attack

Updated Dec 22, 2015

Java 2 2

JSSE_Fortify_SCA_Rules

Custom Fortify SCA rules to detect common JSSE certification validation flaws

Updated Nov 18, 2015

Nmap-Scripts

Updated Nov 18, 2015

Python 70 36

xxe-recursive-download

Updated Nov 18, 2015

GDS-PMD-Security-Rules

Custom security ruleset for the popular Java static analysis tool PMD.

Updated Nov 18, 2015

DotNET-MVC-Enumerator

Updated Nov 18, 2015

Python 6 4

PaddingOracleDemos

Updated Nov 18, 2015

Objective-C 18 6

OSX-Continuity-Dialer-POC

Updated Nov 18, 2015

MAM-Security-Checklist

Checklist intended to be used as a baseline for assessing, designing, and testing the security of a MAM (Application Wrapping) solution

Updated Sep 2, 2015

Whitepapers

A collection of publicly released whitepapers

Updated Jun 1, 2015