☆25Aug 5, 2021Updated 4 years ago
Alternatives and similar repositories for Network-Traffic-Analyzer
Users that are interested in Network-Traffic-Analyzer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- a small wiper malware programmed in c#☆64Nov 17, 2022Updated 3 years ago
- Automated DLL Hijacking Discovery, Validation, and Confirmation. Turning local misconfigurations into weaponized, confirmed attack paths.☆254Mar 26, 2026Updated 2 weeks ago
- Packet sniffer using scapy☆26Mar 21, 2020Updated 6 years ago
- VNCBruteForce - Brute Force attacks VNC with Hydra.☆23Jul 15, 2021Updated 4 years ago
- Fully automated dev environment setup with dotfiles☆11Updated this week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Proof-of-concept code for understanding the allow-jit entitlement on macOS☆31Feb 19, 2026Updated last month
- Hi everyone,☆61Jul 15, 2023Updated 2 years ago
- CTF Challenge for CSAW Finals 2021☆13Nov 17, 2021Updated 4 years ago
- AI-powered reverse-engineering of Rosetta (2 for Linux). Disclaimer: due to the user agreement, I will not touch the code. All is done by…☆59Mar 14, 2026Updated 3 weeks ago
- Home Lab creation project with Active Directory☆22May 13, 2025Updated 10 months ago
- An RF stack for building exfiltration systems.☆18Oct 24, 2018Updated 7 years ago
- HoneyPot Orchestration☆11Aug 3, 2023Updated 2 years ago
- Simple Terraform Scripts to setup a WireGuard server on various cloud providers.☆23Apr 29, 2025Updated 11 months ago
- 🤖 A list of malicious domains on Discord using the Discord Guardian Action.☆16Sep 29, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- King-of-the-Hill game for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆15Aug 9, 2023Updated 2 years ago
- Create a private Discord CTI "Dashboard" using various Discord bots It,'s a simple and effective way to stay informed and up-to-date on t…☆20Feb 16, 2023Updated 3 years ago
- forked from https://git.lysator.liu.se/nettle/nettle.git☆20Sep 30, 2020Updated 5 years ago
- MongoDB CVE-2025-14847 Heap Memory Leak Scanner | OP_COMPRESSED zlib Vulnerability | Bug Bounty & Red Team Tool☆35Dec 28, 2025Updated 3 months ago
- AWS Lambda C Runtime☆22Jun 20, 2023Updated 2 years ago
- My personal shellcode loader☆32Mar 9, 2023Updated 3 years ago
- A plugin for CTFd which adds functions for exporting/importing challenges from/to portable formats (currently YAML)☆27Jul 15, 2025Updated 8 months ago
- A collection of crypters, binders, mailers etc for M$ Windows☆24Apr 27, 2018Updated 7 years ago
- My Malware Blog☆21Feb 4, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Welcome to the CEHv11 Study Material Repository! This repository contains a comprehensive collection of study materials for the Certified…☆57Mar 19, 2023Updated 3 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆37May 9, 2015Updated 10 years ago
- Linux Process Injection via Seccomp Notifier☆84Dec 9, 2025Updated 4 months ago
- A Study in Obfuscation: Analyzing the effect of various techniques to bypass AV engines☆45Oct 27, 2022Updated 3 years ago
- A simple boilerplate for an admission controller in Go.☆28Nov 28, 2022Updated 3 years ago
- Python based c2 server with a basic beacon server to route the traffic from dummy server to prevent attacker's ip from getting exposed☆25Jul 23, 2019Updated 6 years ago
- CEH Practical☆55Aug 14, 2023Updated 2 years ago
- A Proof of Concept for Clickjacking Attacks☆70Jan 30, 2021Updated 5 years ago
- Remove WPP calls from hexrays decompiled code☆54Jan 31, 2026Updated 2 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- BYOVD: Use 360 WFP driver to block EDR/XDR network connection.☆114Feb 10, 2026Updated 2 months ago
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 3 months ago
- API Hammering with C++20☆51Jul 21, 2022Updated 3 years ago
- PoC for popping a system shell against the LnvMSRIO.sys driver☆120Oct 6, 2025Updated 6 months ago
- A 64 bit executable junk code engine for polymorphic malware.☆77Jun 16, 2025Updated 9 months ago
- Reverse Engineering All-In-One. Quick refreshers into the world of reverse engineering.☆39Jan 7, 2021Updated 5 years ago
- Exploit Create Android Ransomware In Termux (NO ROOT)☆119Feb 4, 2025Updated last year