Files for the course Offensive Computer Security 2014 (FSU)
☆12May 20, 2015Updated 10 years ago
Alternatives and similar repositories for Offensive_Computer_Security
Users that are interested in Offensive_Computer_Security are comparing it to the libraries listed below
Sorting:
- Experimental kernel-level remote shell based on ICMP content☆15Aug 26, 2020Updated 5 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Aug 25, 2017Updated 8 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Oct 30, 2019Updated 6 years ago
- ☁️ My Cloud Projects, Docs/Write-ups☆11Jul 8, 2023Updated 2 years ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- A live streaming, video hosting and real-time chat application inspired by Twitch☆10Jan 19, 2023Updated 3 years ago
- Smart Bus Tracker Android App Solution - You can simply enter your starting location and destination,then the app will show you the table…☆10Oct 31, 2019Updated 6 years ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 5 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Networking and attacking scripts.☆10Apr 20, 2017Updated 8 years ago
- Carpooling Service where people can share rides with other people travelling on the same route☆12Jan 8, 2019Updated 7 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- ☆15Sep 4, 2024Updated last year
- Flink state cache☆11Sep 24, 2020Updated 5 years ago
- Security tools to use on assessments.☆40May 9, 2016Updated 9 years ago
- DEFCON-RUSSIA WEB☆12Mar 30, 2021Updated 4 years ago
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 7 months ago
- An Excel to help with your Jyotish calculations☆13Nov 27, 2025Updated 3 months ago
- It's only hitting vulnerable path in termdd.sys!!! NOT DOS☆12May 19, 2019Updated 6 years ago
- ☆12Jan 12, 2023Updated 3 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- Making me more antisocial and weird.☆10Oct 6, 2020Updated 5 years ago
- Himawari Frontend: WebRTC Voice Chat that just works☆11Dec 9, 2022Updated 3 years ago
- ☆14Sep 24, 2012Updated 13 years ago
- Interactive C Programming Self-Learning Course☆24Oct 6, 2025Updated 4 months ago
- NTLMRelay for MS Exchange☆11Nov 13, 2018Updated 7 years ago
- Real time monitoring solution☆10Sep 30, 2017Updated 8 years ago
- Allows you to update the Dynamic DNS easily☆15Feb 27, 2020Updated 6 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- Example of Kerberoasting Honeypot☆18Sep 11, 2025Updated 5 months ago
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- ☆11Aug 19, 2017Updated 8 years ago
- free5GC official site☆14Updated this week
- Our interviewing prep resources.☆10Jan 12, 2016Updated 10 years ago
- Script to setup a phishing server on the cloud☆13Apr 30, 2021Updated 4 years ago
- Server-side SDK to provide a simple REST API for distribution of security information.☆16May 11, 2016Updated 9 years ago
- ☆10Jun 22, 2025Updated 8 months ago