Source code for 'Foundations of Security' by Christoph Kern, Anita Kesavan, and Neil Daswani
☆12Mar 29, 2017Updated 9 years ago
Alternatives and similar repositories for foundations-of-security
Users that are interested in foundations-of-security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- OverTheWire Wargames write-ups☆25Jun 13, 2017Updated 8 years ago
- ☆14Sep 24, 2012Updated 13 years ago
- Fake SMB and SAMR data☆11Oct 27, 2019Updated 6 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Jun 19, 2018Updated 7 years ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Search bing with python☆12Sep 25, 2014Updated 11 years ago
- ☆11Feb 21, 2016Updated 10 years ago
- all things awesome security☆14Jan 11, 2016Updated 10 years ago
- Cowrie SSH/Telnet Honeypot☆12Sep 3, 2018Updated 7 years ago
- A python script for easy static analysis and automatic signature generation of malware.☆12Sep 30, 2013Updated 12 years ago
- Mastering Malware Analysis, published by Packt☆41Jan 18, 2023Updated 3 years ago
- Reconnaissance test in Kubernetes clusters☆21Oct 19, 2018Updated 7 years ago
- introduction to distributed scanning using vultr☆10Apr 29, 2017Updated 8 years ago
- Why hunt when you can seine?☆21May 12, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Code Repository for Python for Beginners with Examples, published by Packt☆10Oct 28, 2022Updated 3 years ago
- This is a repository for the public blog with Labs indicators of compromise and code☆18Jan 8, 2020Updated 6 years ago
- Generates keyboard sequences according to a given layout and creates dictionary files for bruteforcing☆14Jan 29, 2014Updated 12 years ago
- ☁️ My Cloud Projects, Docs/Write-ups☆11Jul 8, 2023Updated 2 years ago
- miscellaneous sploit scripts/hacks☆18Feb 3, 2025Updated last year
- Simple example windows batch file "compiler". (Post-compilation embedded resource)☆21Feb 1, 2012Updated 14 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆72Oct 19, 2017Updated 8 years ago
- ☆13Nov 1, 2017Updated 8 years ago
- Static feature extraction framework for executable file. In malware analysis we need get all possible information for executable files. I…☆13Jun 4, 2017Updated 8 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Help summarize a PCAP file☆33Dec 27, 2011Updated 14 years ago
- Automatically exported from code.google.com/p/fuzzdb☆14Jun 23, 2015Updated 10 years ago
- A GC link parser for both linkfiles and jumplists.☆18Oct 28, 2016Updated 9 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Aug 19, 2015Updated 10 years ago
- Software exploitation training material☆16Jun 8, 2017Updated 8 years ago
- Bash script to auto install Squid Proxy on both Centos & Ubuntu☆12Sep 19, 2018Updated 7 years ago
- Django with Data Science [Video], published by Packt☆12Dec 15, 2025Updated 3 months ago
- Published by Packt☆11Jan 18, 2021Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Automate Network sessions enumeration of connected users in the domain, to facilitate AD Reconnaissance for Adversary simulation & Red Te…☆21Oct 30, 2020Updated 5 years ago
- 6-day intensive course on frontend, backend with Python/Django, deployment, interfaces, machine learning and startup engineering itself (…☆15Feb 22, 2014Updated 12 years ago
- Hacking Wordlist collections for password cracking are attached in the below files☆16Apr 5, 2018Updated 7 years ago
- automated-arancino is a lightweight analysis framework to automate malware experiments.☆16Apr 17, 2017Updated 8 years ago
- BuddyPress is an open source WordPress plugin to build a community site. In releases of BuddyPress from 5.0.0 before 7.2.1 it's possible …☆19May 31, 2021Updated 4 years ago
- ☆11Jan 30, 2023Updated 3 years ago
- Process Hacker 2 hiding from external applications☆19Jun 2, 2015Updated 10 years ago