Files for the course Offensive Computer Security 2014 (FSU)
☆12May 20, 2015Updated 10 years ago
Alternatives and similar repositories for Offensive_Computer_Security
Users that are interested in Offensive_Computer_Security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Experimental kernel-level remote shell based on ICMP content☆15Aug 26, 2020Updated 5 years ago
- The aim of the project is to develop intentionally vulnerable source code in various languages.☆16Mar 3, 2026Updated last month
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Oct 10, 2018Updated 7 years ago
- Tools that I've created/used during CTP-OSCE☆10Jun 17, 2019Updated 6 years ago
- Automatically exported from code.google.com/p/windbgshark☆12Nov 3, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Vulnserver exploits☆15May 1, 2020Updated 5 years ago
- ☆16Jan 10, 2017Updated 9 years ago
- -notes and scripts for online course OffIOT☆12Jan 19, 2026Updated 2 months ago
- Modules created by Nettitude for Metasploit☆11Jun 20, 2018Updated 7 years ago
- ☆12Feb 8, 2021Updated 5 years ago
- OSCP Scripts☆14Jan 21, 2016Updated 10 years ago
- miscellaneous stuff☆21Mar 31, 2015Updated 11 years ago
- Plugins and signatures☆13Jun 11, 2019Updated 6 years ago
- A terminal environment tools for python.☆50Nov 1, 2015Updated 10 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Networking and attacking scripts.☆10Apr 20, 2017Updated 8 years ago
- OWASP practice lab, just a few copy/pastes away. Fully stacked and ready to go with Docker☆21Oct 13, 2018Updated 7 years ago
- Tool for dictionary attack with fail2ban bypass.☆10May 17, 2018Updated 7 years ago
- Server-side SDK to provide a simple REST API for distribution of security information.☆17May 11, 2016Updated 9 years ago
- Force link all static lib symbols into .exe target, for full code coverage measure on windows.☆15Jun 14, 2015Updated 10 years ago
- A collection of open source and commercial tools that aid in red team operations.☆10Jun 12, 2019Updated 6 years ago
- A XPath injection demonstration application☆21Nov 14, 2020Updated 5 years ago
- A live streaming, video hosting and real-time chat application inspired by Twitch☆10Jan 19, 2023Updated 3 years ago
- 12-week Geekwise course on web application security and hardening.☆17Mar 19, 2020Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Will try to put here slides from now on when I give a talk☆24Oct 11, 2021Updated 4 years ago
- A collection of OSCE preparation resources.☆24Oct 30, 2019Updated 6 years ago
- free5GC official site☆14Mar 30, 2026Updated last week
- Vulnerable Windows Application for Pentesters from the house of DarkRelay Security Labs. The project is along the lines of DVWA, AWSGoat …☆14Dec 28, 2023Updated 2 years ago
- 🔥 Discover trending videos from Reddit and curated YouTube channels – Soon using Next.js. See `dev` branch☆15Updated this week
- Rockyou for web fuzzing☆15Jan 28, 2022Updated 4 years ago
- Public version of dopescope code☆14Jan 31, 2017Updated 9 years ago
- ☆15Jun 29, 2016Updated 9 years ago
- Windows PDB symbol server☆23Nov 29, 2017Updated 8 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆11Oct 28, 2016Updated 9 years ago
- set of scripts used for Performance Tuning, Capacity Planning and Sizing☆11Mar 5, 2022Updated 4 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Aug 25, 2017Updated 8 years ago
- Fuzzapi is a tool used for REST API pentesting and uses Fuzzapi gem☆15May 30, 2022Updated 3 years ago
- [depreciated] Terminal dashboard for bug bounty hunters that use HackerOne and Bugcrowd☆194Apr 1, 2016Updated 10 years ago
- Grafana Authentication Proxy☆22Feb 18, 2015Updated 11 years ago
- Just a list of development tools that I find useful☆11Feb 17, 2018Updated 8 years ago