☆25Aug 5, 2021Updated 4 years ago
Alternatives and similar repositories for Network-Traffic-Analyzer
Users that are interested in Network-Traffic-Analyzer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- a small wiper malware programmed in c#☆67Nov 17, 2022Updated 3 years ago
- cnn_1D for kdd99☆21Nov 7, 2018Updated 7 years ago
- VNCBruteForce - Brute Force attacks VNC with Hydra.☆22Jul 15, 2021Updated 4 years ago
- Fully automated dev environment setup with dotfiles☆11Apr 7, 2026Updated last month
- Proof-of-concept code for understanding the allow-jit entitlement on macOS☆31Feb 19, 2026Updated 3 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Hi everyone,☆61Jul 15, 2023Updated 2 years ago
- CTF Challenge for CSAW Finals 2021☆13Nov 17, 2021Updated 4 years ago
- AI-powered reverse-engineering of Rosetta (2 for Linux). Disclaimer: due to the user agreement, I will not touch the code. All is done by…☆62Mar 14, 2026Updated 2 months ago
- PHP 8 Sandbox Escape☆87Feb 28, 2026Updated 2 months ago
- Home Lab creation project with Active Directory☆26May 13, 2025Updated last year
- An RF stack for building exfiltration systems.☆17Oct 24, 2018Updated 7 years ago
- 🤖 A list of malicious domains on Discord using the Discord Guardian Action.☆16Sep 29, 2024Updated last year
- King-of-the-Hill game for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆15Aug 9, 2023Updated 2 years ago
- forked from https://git.lysator.liu.se/nettle/nettle.git☆20Sep 30, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- MongoDB CVE-2025-14847 Heap Memory Leak Scanner | OP_COMPRESSED zlib Vulnerability | Bug Bounty & Red Team Tool☆36Dec 28, 2025Updated 4 months ago
- hostagram osint tool Instagram | hostagram☆132Updated this week
- Optimizer for Malware Detection. Api Calls Sequence of Benign Files are provided.☆15Sep 7, 2023Updated 2 years ago
- My personal shellcode loader☆31Mar 9, 2023Updated 3 years ago
- A plugin for CTFd which adds functions for exporting/importing challenges from/to portable formats (currently YAML)☆27Jul 15, 2025Updated 10 months ago
- My Malware Blog☆21Feb 4, 2024Updated 2 years ago
- A Study in Obfuscation: Analyzing the effect of various techniques to bypass AV engines☆45Oct 27, 2022Updated 3 years ago
- A simple boilerplate for an admission controller in Go.☆28Nov 28, 2022Updated 3 years ago
- Python based c2 server with a basic beacon server to route the traffic from dummy server to prevent attacker's ip from getting exposed☆25Jul 23, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- notes while reviewing computer networking by taking online course "the bits and bytes of computer network" on Coursera from Google☆27Jun 7, 2020Updated 5 years ago
- Set up AWS infrastructure with terragrunt and terraform in multiple accounts and regions startup kit.☆28Feb 26, 2026Updated 2 months ago
- Crappy Golang code to list local listening ports and their associated processes.☆34Apr 22, 2023Updated 3 years ago
- CEH Practical☆54Aug 14, 2023Updated 2 years ago
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 5 months ago
- API Hammering with C++20☆52Jul 21, 2022Updated 3 years ago
- ☆35Aug 20, 2018Updated 7 years ago
- A 64 bit executable junk code engine for polymorphic malware.☆78Jun 16, 2025Updated 11 months ago
- Reverse Engineering All-In-One. Quick refreshers into the world of reverse engineering.☆40Jan 7, 2021Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Exploit Create Android Ransomware In Termux (NO ROOT)☆121Feb 4, 2025Updated last year
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆83Dec 21, 2022Updated 3 years ago
- ☆126Updated this week
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆80Apr 13, 2025Updated last year
- Modified Emscripten compiler with LLVM-level obfuscation☆65Apr 20, 2024Updated 2 years ago
- ☆101Jan 21, 2025Updated last year
- Small C application designed to detect LD_PRELOAD malware via the libdl library functions.☆56May 23, 2016Updated 9 years ago