☆28Aug 4, 2024Updated last year
Alternatives and similar repositories for Linux-Defence-Materials
Users that are interested in Linux-Defence-Materials are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of all my personal cheat sheets and guides as I progress through my career in offensive security.☆296May 9, 2026Updated last week
- Companion Worm research☆17Nov 8, 2021Updated 4 years ago
- A simulation of the RFCTF KOTH game.☆10Aug 14, 2020Updated 5 years ago
- Repository focused on advanced Red Team tools and techniques, mainly created with C. It contains projects I have created to understand ma…☆20Mar 23, 2026Updated last month
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆17Aug 14, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆14Dec 28, 2024Updated last year
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- Advanced PoC & Research for CVE-2026-0828 (Safetica) and CVE-2025-7771 (ThrottleStop). Analysis of BYOVD (Bring Your Own Vulnerable Drive…☆40Feb 4, 2026Updated 3 months ago
- ☆20Oct 25, 2024Updated last year
- A Burp Suite extension that converts IP addresses to decimal notation, useful for SSRF bypass and WAF evasion testing. Created by Harshad…☆12Dec 9, 2024Updated last year
- A Dockerized build pipeline for custom Windows x64 shellcode☆54Dec 12, 2025Updated 5 months ago
- Sec-Payloads, It's a collection of multiple types of lists used during security assessments & used for bug bounty hunting or penetration …☆10Nov 17, 2025Updated 6 months ago
- ProxyWatch☆50Apr 25, 2026Updated 3 weeks ago
- Tiny and fast port scanner (Sliver edition)☆30Feb 17, 2026Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- This plant leaf disease detection project was developed using Python, Flask, TensorFlow, and NumPy. The model was trained over 3000+ data…☆12Jul 30, 2023Updated 2 years ago
- kerberos in rust for fun and profit☆73Mar 13, 2026Updated 2 months ago
- This GitHub repository contains benign specimens; however, the techniques demonstrated herein could potentially be exploited for maliciou…☆19Aug 4, 2024Updated last year
- AI-based Ludus range configuration builder☆29May 6, 2025Updated last year
- ☆13Sep 12, 2020Updated 5 years ago
- ☆21Sep 12, 2022Updated 3 years ago
- Helper functions for calculating the authenticode digest for a portable executable file☆21Apr 30, 2020Updated 6 years ago
- ☆63Mar 15, 2026Updated 2 months ago
- Nim implementation for sud0Ru's Credential Dumping from SAM/SECURITY Hives Method (a.k.a. SilentHarvest)☆106Apr 4, 2026Updated last month
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Built a deep learning model using tensorflow and keras in python for grape leaf disease detection. Used OpenCV for image processing☆15Oct 14, 2019Updated 6 years ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Dec 6, 2023Updated 2 years ago
- NTLM HTTP relay tool with SOCKS proxy for browser session hijacking☆158Apr 6, 2026Updated last month
- POC for CVE-2025-54918 and a technical demonstration.☆61Jan 12, 2026Updated 4 months ago
- PoC framework for Sliver compilation☆22Jan 14, 2025Updated last year
- A comprehensive collection of study materials, practice exams, and resources that helped me successfully pass the CISSP exam.☆14Feb 7, 2025Updated last year
- Collected resources for OSWA preparation.☆26Jan 25, 2023Updated 3 years ago
- A PoC UDRL for Cobalt Strike built with Crystal Palace that combines Raphael Mudge's page streaming technique with a modular call gate (D…☆124Jan 21, 2026Updated 4 months ago
- C++ Reflective Assembly Loader☆33Mar 7, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Live ETW-TI event viewer for Windows kernel threat-intelligence telemetry. Research tool for exploring the same signals commercial EDRs r…☆143Apr 15, 2026Updated last month
- This script is used to automatically start/stop ec2 instance to match target ip in aws ip pool to takeover subdomain..☆17Oct 8, 2023Updated 2 years ago
- The Hoa\Http library.☆10Apr 2, 2021Updated 5 years ago
- SC-200: Microsoft Security Operations Analyst, by Packt Publishing☆18Jan 30, 2023Updated 3 years ago
- collection of blogs about malware development and analysis☆74Dec 2, 2025Updated 5 months ago
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- gh0str3con is a All in one cloud based web Recon tool.☆24Jul 8, 2024Updated last year