☆16Dec 2, 2019Updated 6 years ago
Alternatives and similar repositories for scripts
Users that are interested in scripts are comparing it to the libraries listed below
Sorting:
- A collection of OSCE preparation resources.☆24Oct 30, 2019Updated 6 years ago
- ☆19Mar 23, 2021Updated 4 years ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆30May 7, 2024Updated last year
- Detonate malware on VMs and get logs & detection status☆84Jan 29, 2026Updated last month
- QuoteDB - A Vulnerable TCP Server to practice Win32 exploitation☆79Dec 21, 2023Updated 2 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- A collection of presentations and other contributions I have made to conferences.☆36Sep 9, 2024Updated last year
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- ☆15Sep 4, 2024Updated last year
- A disassembler for 8080 byte code running as a static browser based application with no server components☆14Apr 23, 2024Updated last year
- Ben Eaters SAP-1 Architecture Implemented by Me.☆13May 17, 2023Updated 2 years ago
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 8 years ago
- ZX81 for MiSTer☆12Dec 9, 2025Updated 2 months ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 5 years ago
- PC based on 65816☆16Jul 9, 2022Updated 3 years ago
- Short Python script for parsing Defender VDM signature files.☆10Sep 22, 2024Updated last year
- Python3 Module to interact with the SonicWall® SonicOS API☆14Jan 6, 2025Updated last year
- Example ASM code following SLAE course and exam assignments.☆37May 23, 2017Updated 8 years ago
- Nmap NSE script for enumerate indices, plugins and cluster nodes on an elasticsearch target☆42Apr 17, 2021Updated 4 years ago
- Files compiled from the Logica breach investigation materials☆45Aug 14, 2018Updated 7 years ago
- Encryption using 2 Factor Authentication through an external drive with Python☆12Jun 7, 2020Updated 5 years ago
- NTLMRelay for MS Exchange☆11Nov 13, 2018Updated 7 years ago
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 8 months ago
- Shell intended for forwarding-only ssh connection via jumphost☆11Jun 27, 2018Updated 7 years ago
- PinterCoding University. Author : Gun Gun Febrianza☆11Jun 27, 2020Updated 5 years ago
- ☆12Jan 12, 2023Updated 3 years ago
- ☆11Aug 19, 2017Updated 8 years ago
- Interactive C Programming Self-Learning Course☆24Oct 6, 2025Updated 5 months ago
- Minimal OS written in Jack.☆12Nov 24, 2022Updated 3 years ago
- arduino code for Air hockey robot☆11Aug 20, 2020Updated 5 years ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago
- Are you able to use open source intelligence to solve this challenge?☆11Apr 14, 2019Updated 6 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 8 months ago
- Mongoose OS based code to call links whenever the ESP is powered up☆11Jun 16, 2017Updated 8 years ago
- Move and Rotate a GameObject fully in Unity3D using Arduino with MPU6050☆13Nov 10, 2023Updated 2 years ago
- Resolve Skype accounts by phone number with API interface☆13Jul 16, 2023Updated 2 years ago
- A space invaders arcade cabinet frontend for the 21st century 8080 microprocessor☆10Mar 14, 2023Updated 2 years ago
- Mindmap/CheatSheet for eLearnSecurity-PTPv5☆10Jun 18, 2020Updated 5 years ago