A host-based IDS and network monitoring system (My graduation project)
☆27Jul 6, 2021Updated 4 years ago
Alternatives and similar repositories for EagleEye
Users that are interested in EagleEye are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A python3 script that uses cl1p website to send and receive secret messages☆31Oct 1, 2020Updated 5 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆25Jan 31, 2019Updated 7 years ago
- Random scripts I write to automate non-hacking stuff☆24Mar 24, 2019Updated 7 years ago
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login…☆13Sep 27, 2016Updated 9 years ago
- This Tool can help enginners and biggener in network, the tool help you to find of any ip with subnet mask that can calucate them and sho…☆14Dec 3, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆17Aug 20, 2023Updated 2 years ago
- Inject scripted keystrokes and mouse movements into remote desktop sessions, including VMware View, Amazon Workspaces, and Microsoft RDP.…☆17Jul 25, 2014Updated 11 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 6 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆17Dec 23, 2021Updated 4 years ago
- Some scripts useful for red team activities☆13Jan 18, 2020Updated 6 years ago
- It's like Wine, but as a fungible token, and it ages.☆12Feb 28, 2021Updated 5 years ago
- A collection of tools I wrote for bug bounty or hacking and don't mind publishing it☆124Oct 14, 2024Updated last year
- Various Crypter Project☆10Feb 26, 2014Updated 12 years ago
- ☆11Dec 13, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Github repository with Write Up, AutoPwn, Tools, Videos of CTF's from HackTheBox and TryHackMe☆19Aug 13, 2022Updated 3 years ago
- Ascii Design is an ascii-art program based on figlet engine.☆20Jun 13, 2022Updated 3 years ago
- Python backdoor that uses http post/get requests to communicate☆43Aug 24, 2016Updated 9 years ago
- Simple Ransoware to attack Windows 🌟☆25Apr 19, 2023Updated 3 years ago
- A curated list of awesome big data frameworks, ressources and other awesomeness.☆17Oct 4, 2021Updated 4 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Oct 26, 2020Updated 5 years ago
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- OWASP Juice Shop: Probably the most modern and sophisticated insecure web application☆23Nov 22, 2019Updated 6 years ago
- CyberSpy is a repository with innate and third party services that can be used for doxing, profiling & identity searching.☆11Jul 8, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A Handshake Mining GUI for the Goldshell HS1 ASIC☆20Nov 25, 2020Updated 5 years ago
- WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.☆14Feb 20, 2022Updated 4 years ago
- 3D printed mini circular table saw.☆11Jul 19, 2014Updated 11 years ago
- Hacking systems with the automation of PasteJacking attacks.☆399Oct 14, 2024Updated last year
- A web front-end for password cracking and analytics☆16Jan 6, 2019Updated 7 years ago
- Network/host scanner and information gatherer☆25Oct 21, 2023Updated 2 years ago
- Basic python script for detect airdroid users in lan☆49Sep 30, 2020Updated 5 years ago
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆31Nov 29, 2022Updated 3 years ago
- Anubis Malware Samples☆20Dec 19, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Oct 21, 2023Updated 2 years ago
- ☆15Jul 30, 2022Updated 3 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Apr 25, 2017Updated 9 years ago
- MEMEX Weapons Pilot for the illegal weapons domain.☆15May 20, 2016Updated 9 years ago
- Fuxsociety Mr Robot 2.1☆28May 15, 2023Updated 2 years ago
- Sponsored By Mr ROBOT☆14Nov 15, 2020Updated 5 years ago
- A collection of useful scripts to prepare a new windows installation for use☆21Jun 18, 2024Updated last year