Linux and Windows Hardening Points
☆12Mar 6, 2018Updated 8 years ago
Alternatives and similar repositories for LWHP
Users that are interested in LWHP are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆23May 20, 2016Updated 9 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- MBR manipulation tool☆18Jan 13, 2014Updated 12 years ago
- ☆42May 10, 2016Updated 9 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A better SSL cipher checker using gnutls☆28May 17, 2017Updated 8 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- Just a place to share some things I've written while participating in Hack The Box.☆18Jun 5, 2020Updated 5 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- ☆13Oct 29, 2014Updated 11 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Jun 4, 2013Updated 12 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 12 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- An utility to query and change NVRAM contents from the command line.☆19May 10, 2016Updated 9 years ago
- ☆32Jun 3, 2019Updated 6 years ago
- Security tools to use on assessments.☆40May 9, 2016Updated 9 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- A Machine Readable Cryptocurrency arbitrage bot☆46Dec 29, 2017Updated 8 years ago
- XMLRPC server for password cracking☆33Jan 20, 2015Updated 11 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- LibreSSL with a backdoor in RSA key generation☆17Jun 26, 2016Updated 9 years ago
- ☆23Jan 18, 2021Updated 5 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- Find a useable IP address to use☆30Jul 4, 2014Updated 11 years ago
- Prometheus Firewall Analyzer☆48May 1, 2015Updated 10 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Jan 16, 2018Updated 8 years ago
- Battalion is a tool used to automate reconnaissance and assist both pentesters and internal security/admin teams.☆43Jan 13, 2026Updated 2 months ago
- Micro$oft Windows Hacking Pack☆525Mar 6, 2018Updated 8 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Nov 5, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Packaging audit toolkit using vulners.com vulnerability database☆20Apr 9, 2018Updated 8 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- Custom scripts used during the scenario☆21Apr 5, 2021Updated 5 years ago
- Easy to use command line security scanner☆58Feb 27, 2016Updated 10 years ago
- Python script to extract and bruteforce OpenNMS password hashes in users.xml☆18Jun 21, 2017Updated 8 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago