AUCyberClub / axionView external linksLinks
A toolkit for CTFs
☆14May 4, 2018Updated 7 years ago
Alternatives and similar repositories for axion
Users that are interested in axion are comparing it to the libraries listed below
Sorting:
- Slides that are used in the courses of AUCC☆20Oct 14, 2024Updated last year
- DHCP Snooping app - great for finding rogue DHCP servers☆35Jan 25, 2018Updated 8 years ago
- C++ Script to Create "Obfuscated Native ShellCode Launcher" #Obfuscator #Shellcode #Generator☆13Apr 3, 2021Updated 4 years ago
- Scan usom blocked url list inside your ip masks.☆21Feb 21, 2018Updated 7 years ago
- uses keywords from alert logs to send SMS☆24Nov 20, 2015Updated 10 years ago
- The Brandefense cyber threat intelligence team is always researching new threats and writing research reports. Our latest Threat Reports …☆23Oct 1, 2025Updated 4 months ago
- ☆29Nov 4, 2020Updated 5 years ago
- ☆32May 9, 2021Updated 4 years ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- Bilgi Güvenliği A.Ş'nin düzenlemiş olduğu Siber Güvenlik Kış Kampı 2017 notlarım.☆21Aug 29, 2017Updated 8 years ago
- Vue JS ile Periyodik Tablo(Düzenli Çizelge)☆31Nov 20, 2018Updated 7 years ago
- A collection of hashcat-hcstat files☆33Feb 13, 2018Updated 8 years ago
- Git folder digger, I'm sure it's worthwhile stuff.☆38Jan 10, 2021Updated 5 years ago
- Cyber Jawara 2020 Final - Jeopardy CTF problemset☆33Jul 22, 2022Updated 3 years ago
- this project can extract contact email address from many site.☆12Sep 26, 2021Updated 4 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- a markov based rule generator for hashcat/mdxfind/jtr☆24Dec 8, 2025Updated 2 months ago
- Network Security Monitoring Console☆22Feb 3, 2010Updated 16 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 2 months ago
- This is a stealthier version of Keylogger-lkm, it introduces hiding techniques and also a command entering option.☆13Jan 27, 2023Updated 3 years ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Apr 21, 2025Updated 9 months ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- ☆13Jul 26, 2025Updated 6 months ago
- BASH + VIM = Cryptolocker☆11Jul 31, 2018Updated 7 years ago
- ☆11Dec 8, 2023Updated 2 years ago
- Linux kernel-mode and user-space with wine/MinGW/Windows compability hacking library.☆12Sep 15, 2022Updated 3 years ago
- VAMPY - Minimal tool for RAM dumping.☆10Jul 1, 2017Updated 8 years ago
- ☆16Apr 24, 2023Updated 2 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- EWDK C++ toolchain for bazel☆11Feb 1, 2026Updated 2 weeks ago
- Exploit code developed/reproduced by me☆90Jan 25, 2023Updated 3 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- ekşi sözlük sitesindeki bakınızlardan ve bakınızların kullanıldığı başlıklardan oluşan açık kaynak kodlu bir proje☆10Oct 24, 2020Updated 5 years ago
- set of bash scripts to get a list of bad reputation IP addresses☆11Dec 17, 2015Updated 10 years ago