RakhithJK / Cyber-Security_CollectionLinks
☆53Updated 5 years ago
Alternatives and similar repositories for Cyber-Security_Collection
Users that are interested in Cyber-Security_Collection are comparing it to the libraries listed below
Sorting:
- 🐳 VMs are bloat. Dockerise your VAPT environment☆79Updated 6 months ago
- ☆53Updated 4 years ago
- ☆18Updated 4 years ago
- With the help of this automated script, you will never lose track of recently released CVEs.☆53Updated 3 years ago
- Linux Kernel Local Privilege Escalation Vulnerability CVE-2022-0847.☆58Updated 3 years ago
- A FreeSWITCH specific scanning and exploitation toolkit for CVE-2021-37624 and CVE-2021-41157.☆28Updated 3 years ago
- Volatility Explorer Suit☆65Updated 2 years ago
- Slides and other material from various conference presentations.☆46Updated last month
- Simple WebSocket fuzzer☆32Updated 2 years ago
- Collected && Written N day Vulns for study purpose only☆105Updated 4 months ago
- A Python3 module to assist in fuzzing web applications☆57Updated last year
- Resources to help get started with IoT Pentesting☆169Updated 6 years ago
- 2020年发布到阿尔法实验室微信公众号的所有安全资讯汇总☆40Updated 4 years ago
- PoC exploit code for CVE-2021-26855☆17Updated 4 years ago
- ☆29Updated 5 years ago
- Linux kernel exploits for local privilege escalation☆80Updated 7 years ago
- All Security Resource Collections Repos That I Published.☆126Updated 5 years ago
- Vulnerable Client-Server Application (VuCSA) is made for learning how to perform penetration tests of non-http thick clients. It is writt…☆98Updated 2 years ago
- SADDNS: Side Channel Based DNS Cache Poisoning Attack☆61Updated 4 years ago
- DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)☆100Updated 4 years ago
- This repo contains the lazyFuzzer and the Report on the output from the same☆17Updated 6 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆71Updated 4 years ago
- ☆16Updated 3 years ago
- Foxit PDF Reader Remote Code Execution Exploit☆120Updated last year
- Linux Bluetooth - Run arbitrary management commands as an unprivileged user☆85Updated 2 years ago
- A Netcat-style backdoor for pentesting and pentest exercises☆51Updated 4 years ago
- GUI for Volatility forensics tool written in PyQT5☆60Updated 4 years ago
- Clone me and get your own authentic Parsia-Clone today.☆46Updated last week
- try to determine if a host is vulnerable to SpringShell CVE‐2022‐22965 and CVE‐2022‐22963☆23Updated 3 years ago
- Collection of reverse shells☆56Updated 5 years ago