☆25Aug 5, 2021Updated 4 years ago
Alternatives and similar repositories for Network-Traffic-Analyzer
Users that are interested in Network-Traffic-Analyzer are comparing it to the libraries listed below
Sorting:
- Everything (examples, docs, references, ...) to start developing problems for the cmgr framework☆18Oct 10, 2025Updated 5 months ago
- Program for Grabbing/Writing Wifi passwords☆15Feb 25, 2019Updated 7 years ago
- Fully automated dev environment setup with dotfiles☆11Apr 7, 2025Updated 11 months ago
- PHP 8 Sandbox Escape☆68Feb 28, 2026Updated 3 weeks ago
- Proof-of-concept code for understanding the allow-jit entitlement on macOS☆31Feb 19, 2026Updated last month
- This home-lab provides individuals with hands-on experience in setting up, configuring, and utilizing Suricata to enhance network securit…☆30Apr 10, 2024Updated last year
- CTF Challenge for CSAW Finals 2021☆13Nov 17, 2021Updated 4 years ago
- AI-powered reverse-engineering of Rosetta (2 for Linux). Disclaimer: due to the user agreement, I will not touch the code. All is done by…☆57Mar 14, 2026Updated last week
- Многоканальный автополив на Arduino☆22Sep 9, 2021Updated 4 years ago
- Improve safety, security, and privacy of AI systems at build, deploy and run stages.☆32Jan 27, 2026Updated last month
- An RF stack for building exfiltration systems.☆18Oct 24, 2018Updated 7 years ago
- HoneyPot Orchestration☆11Aug 3, 2023Updated 2 years ago
- Simple Terraform Scripts to setup a WireGuard server on various cloud providers.☆23Apr 29, 2025Updated 10 months ago
- 🤖 A list of malicious domains on Discord using the Discord Guardian Action.☆16Sep 29, 2024Updated last year
- Create a private Discord CTI "Dashboard" using various Discord bots It,'s a simple and effective way to stay informed and up-to-date on t…☆20Feb 16, 2023Updated 3 years ago
- Simple and cheap RFID/NFC scanner project☆32Nov 4, 2018Updated 7 years ago
- forked from https://git.lysator.liu.se/nettle/nettle.git☆20Sep 30, 2020Updated 5 years ago
- Optimizer for Malware Detection. Api Calls Sequence of Benign Files are provided.☆15Sep 7, 2023Updated 2 years ago
- Replicated Parkour System w/ 400+ animations which uses a custom movement component to translate and rotate the character across, on top/…☆42Dec 16, 2024Updated last year
- AWS Lambda C Runtime☆22Jun 20, 2023Updated 2 years ago
- My personal shellcode loader☆32Mar 9, 2023Updated 3 years ago
- Multikey on Arduino board.☆74Jan 29, 2021Updated 5 years ago
- A plugin for CTFd which adds functions for exporting/importing challenges from/to portable formats (currently YAML)☆27Jul 15, 2025Updated 8 months ago
- Welcome to the CEHv11 Study Material Repository! This repository contains a comprehensive collection of study materials for the Certified…☆56Mar 19, 2023Updated 3 years ago
- Linux Process Injection via Seccomp Notifier☆84Dec 9, 2025Updated 3 months ago
- A Study in Obfuscation: Analyzing the effect of various techniques to bypass AV engines☆45Oct 27, 2022Updated 3 years ago
- Python based c2 server with a basic beacon server to route the traffic from dummy server to prevent attacker's ip from getting exposed☆25Jul 23, 2019Updated 6 years ago
- notes while reviewing computer networking by taking online course "the bits and bytes of computer network" on Coursera from Google☆25Jun 7, 2020Updated 5 years ago
- Set up AWS infrastructure with terragrunt and terraform in multiple accounts and regions startup kit.☆27Feb 26, 2026Updated 3 weeks ago
- Crappy Golang code to list local listening ports and their associated processes.☆34Apr 22, 2023Updated 2 years ago
- CEH Practical☆55Aug 14, 2023Updated 2 years ago
- A Proof of Concept for Clickjacking Attacks☆70Jan 30, 2021Updated 5 years ago
- BYOVD: Use 360 WFP driver to block EDR/XDR network connection.☆104Feb 10, 2026Updated last month
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 3 months ago
- API Hammering with C++20☆51Jul 21, 2022Updated 3 years ago
- CS2 internal cheat (Aimbot + ESP) written C++ for Windows.☆35Jul 10, 2024Updated last year
- Exploit Create Android Ransomware In Termux (NO ROOT)☆118Feb 4, 2025Updated last year
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆73Apr 13, 2025Updated 11 months ago
- PoC for detecting and dumping code injection (built and extended on UnRunPE)☆58Oct 23, 2018Updated 7 years ago