☆28Aug 4, 2024Updated last year
Alternatives and similar repositories for Linux-Defence-Materials
Users that are interested in Linux-Defence-Materials are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Companion Worm research☆17Nov 8, 2021Updated 4 years ago
- Advanced PoC & Research for CVE-2026-0828 (Safetica) and CVE-2025-7771 (ThrottleStop). Analysis of BYOVD (Bring Your Own Vulnerable Drive…☆33Feb 4, 2026Updated 2 months ago
- A simulation of the RFCTF KOTH game.☆10Aug 14, 2020Updated 5 years ago
- Repository focused on advanced Red Team tools and techniques, mainly created with C. It contains projects I have created to understand ma…☆21Mar 23, 2026Updated 2 weeks ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆17Aug 14, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆14Dec 28, 2024Updated last year
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- ☆20Oct 25, 2024Updated last year
- A Burp Suite extension that converts IP addresses to decimal notation, useful for SSRF bypass and WAF evasion testing. Created by Harshad…☆11Dec 9, 2024Updated last year
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆33Dec 12, 2025Updated 3 months ago
- A Dockerized build pipeline for custom Windows x64 shellcode☆53Dec 12, 2025Updated 4 months ago
- Sec-Payloads, It's a collection of multiple types of lists used during security assessments & used for bug bounty hunting or penetration …☆10Nov 17, 2025Updated 4 months ago
- Nim implementation for sud0Ru's Credential Dumping from SAM/SECURITY Hives Method (a.k.a. SilentHarvest)☆72Apr 4, 2026Updated last week
- ProxyWatch☆47Apr 3, 2026Updated last week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- tricks I discovered while playing king of the hill☆17Jun 28, 2023Updated 2 years ago
- CurlWright is a Cloudflare bypass tool that leverages Playwright to execute curl commands with full browser capabilities, allowing you to…☆33Mar 9, 2026Updated last month
- Tiny and fast port scanner (Sliver edition)☆28Feb 17, 2026Updated last month
- C# implementation of Shellcode delivery techniques using PInvoke and DInvoke variations for API calling.☆37Dec 20, 2021Updated 4 years ago
- This plant leaf disease detection project was developed using Python, Flask, TensorFlow, and NumPy. The model was trained over 3000+ data…☆12Jul 30, 2023Updated 2 years ago
- kerberos in rust for fun and profit☆69Mar 13, 2026Updated 3 weeks ago
- This GitHub repository contains benign specimens; however, the techniques demonstrated herein could potentially be exploited for maliciou…☆19Aug 4, 2024Updated last year
- NTLM HTTP relay tool with SOCKS proxy for browser session hijacking☆108Updated this week
- AI-based Ludus range configuration builder☆29May 6, 2025Updated 11 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆14Sep 12, 2020Updated 5 years ago
- ☆21Sep 12, 2022Updated 3 years ago
- Helper functions for calculating the authenticode digest for a portable executable file☆21Apr 30, 2020Updated 5 years ago
- ☆63Mar 15, 2026Updated 3 weeks ago
- Built a deep learning model using tensorflow and keras in python for grape leaf disease detection. Used OpenCV for image processing☆15Oct 14, 2019Updated 6 years ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Dec 6, 2023Updated 2 years ago
- POC for CVE-2025-54918 and a technical demonstration.☆56Jan 12, 2026Updated 2 months ago
- PoC framework for Sliver compilation☆22Jan 14, 2025Updated last year
- SC-200: Microsoft Security Operations Analyst, by Packt Publishing☆17Jan 30, 2023Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A comprehensive collection of study materials, practice exams, and resources that helped me successfully pass the CISSP exam.☆15Feb 7, 2025Updated last year
- Collected resources for OSWA preparation.☆26Jan 25, 2023Updated 3 years ago
- C++ Reflective Assembly Loader☆32Mar 7, 2025Updated last year
- This script is used to automatically start/stop ec2 instance to match target ip in aws ip pool to takeover subdomain..☆17Oct 8, 2023Updated 2 years ago
- The Hoa\Http library.☆10Apr 2, 2021Updated 5 years ago
- collection of blogs about malware development and analysis☆74Dec 2, 2025Updated 4 months ago
- Open-source Claude Code plugins for multi-agent software delivery. Plan-first SDLC workflow, code review, LLM quality judges, and self-le…☆83Apr 3, 2026Updated last week