☆24Aug 4, 2024Updated last year
Alternatives and similar repositories for Linux-Defence-Materials
Users that are interested in Linux-Defence-Materials are comparing it to the libraries listed below
Sorting:
- Companion Worm research☆16Nov 8, 2021Updated 4 years ago
- A collection of all my personal cheat sheets and guides as I progress through my career in offensive security.☆282Oct 8, 2025Updated 4 months ago
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆33Dec 12, 2025Updated 2 months ago
- ☆14Dec 28, 2024Updated last year
- ☆19Sep 12, 2022Updated 3 years ago
- ☆58Jun 28, 2025Updated 8 months ago
- This plant leaf disease detection project was developed using Python, Flask, TensorFlow, and NumPy. The model was trained over 3000+ data…☆10Jul 30, 2023Updated 2 years ago
- NTAPI hook bypass with (semi) legit stack trace☆19May 9, 2023Updated 2 years ago
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.☆10Apr 8, 2024Updated last year
- Fancy Themes For Plasma Desktop☆11Dec 11, 2025Updated 2 months ago
- Telegram scraper for Maltego, allows from an Alias entity to find all forwarded accounts☆11Apr 25, 2023Updated 2 years ago
- Simulates Attacks of AB16 on Argon2i☆11Aug 4, 2016Updated 9 years ago
- Track previous changes on specific AD accounts (users, computers) and Groups (online DC), even if event logs were wiped/not collected (e.…☆16Feb 25, 2025Updated last year
- Detect VM and Hypervisor☆10Jun 16, 2021Updated 4 years ago
- A football/soccer content management system, that can show fixtures, team details and some stats☆11Jan 22, 2026Updated last month
- OSCP preparation☆12Sep 18, 2025Updated 5 months ago
- Leonardo-Arduino script and python keylogger for BAD-USB aka Poor Man's RUBBER-DUCKY☆12Aug 14, 2020Updated 5 years ago
- wtftp.py is a tool to attack Microsoft Deployment Toolkit (MDT) and Windows Deployment Services (WDS).☆30Jan 22, 2026Updated last month
- ☆13Feb 25, 2023Updated 3 years ago
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- code and manual for the defcon shoot 23 badge☆10Aug 10, 2015Updated 10 years ago
- ☆16Jun 15, 2025Updated 8 months ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- Aggressor Notification Scripts for cobaltstrike via slack & discord☆14Nov 27, 2025Updated 3 months ago
- Threat Hijacking Simple Implementation☆18Feb 24, 2025Updated last year
- Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum…☆17Jun 12, 2025Updated 8 months ago
- Ansible playbook for configuring Kali Linux to personal preferences☆10Oct 5, 2022Updated 3 years ago
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- A Burp Suite extension that converts IP addresses to decimal notation, useful for SSRF bypass and WAF evasion testing. Created by Harshad…☆11Dec 9, 2024Updated last year
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- A simulation of the RFCTF KOTH game.☆10Aug 14, 2020Updated 5 years ago
- custom bloodhound queries and knowledge base☆12Apr 16, 2024Updated last year
- Some security by obscurity using port-jumping.☆14Aug 21, 2025Updated 6 months ago
- ☆12Oct 19, 2024Updated last year
- ☆12Apr 5, 2025Updated 10 months ago
- Collection of antivirus bypass techniques☆13Nov 20, 2023Updated 2 years ago
- C2 redirector as a web API☆10May 22, 2021Updated 4 years ago
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆15Apr 8, 2025Updated 10 months ago
- ☆10Nov 11, 2020Updated 5 years ago