ahmedabdulwhhab / SDN-RYU-Mininet-PathView external linksLinks
Mix of files
☆14Jul 22, 2023Updated 2 years ago
Alternatives and similar repositories for SDN-RYU-Mininet-Path
Users that are interested in SDN-RYU-Mininet-Path are comparing it to the libraries listed below
Sorting:
- ☆12Jan 12, 2023Updated 3 years ago
- Polynomial arithmetic over GF2☆12Oct 30, 2018Updated 7 years ago
- An implementation of the NTRU encryption and decryption algorithm in Python 3☆16Sep 29, 2024Updated last year
- A web API for various cyber threat intelligence frameworks, including MITRE ATT&CK, CWE, ATLAS...☆19Feb 9, 2026Updated last week
- 🇻🇳 [VNCERT/CC] Digital Forensics Lab 🇻🇳☆21Dec 26, 2024Updated last year
- Files and writeups for challenges I authored in BalsnCTF 2022.☆26Sep 5, 2022Updated 3 years ago
- Source code for the DEF CON 30 CTF Finals.☆55Oct 12, 2022Updated 3 years ago
- Solutions and writeups for the Flare-On 11 (2024) reverse engineering challenge☆71Dec 26, 2024Updated last year
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆82Jun 25, 2025Updated 7 months ago
- Challenges and writeups from SamsungCTF☆100Aug 25, 2023Updated 2 years ago
- A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, …☆141Feb 6, 2026Updated last week
- Archive Alchemist is a tool for creating specially crafted archives to test extraction vulnerabilities.☆226Jul 24, 2025Updated 6 months ago
- This is a companion to the Security Engineer Questions☆205Nov 27, 2023Updated 2 years ago
- Many-Time Pad Interactive☆176Feb 9, 2024Updated 2 years ago
- Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or eve…☆277Dec 20, 2025Updated last month
- A curated list of resources dedicated to reinforcement learning applied to cyber security.☆1,003Feb 6, 2026Updated last week
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆301Updated this week
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆434May 22, 2025Updated 8 months ago
- RunPE implementation with multiple evasive techniques (1)☆380Sep 22, 2023Updated 2 years ago
- PowerShell tools to help defenders hunt smarter, hunt harder.☆457Oct 29, 2025Updated 3 months ago
- An List of my Powershell scripts, commands and Blogs for windows Red Teaming.☆483Feb 23, 2025Updated 11 months ago
- ☆475Jan 29, 2025Updated last year
- Python Script to access ATT&CK content available in STIX via a public TAXII server☆569Dec 19, 2025Updated last month
- PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.☆620Sep 26, 2023Updated 2 years ago
- 🎓 Because Education should be free. Contributions welcome! 🕵️☆2,734Aug 9, 2025Updated 6 months ago
- Cybersecurity oriented awesome list☆3,044Feb 8, 2026Updated last week
- Live Feed of C2 servers, tools, and botnets☆745Feb 9, 2026Updated last week
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆741Jul 22, 2023Updated 2 years ago
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆768Feb 8, 2026Updated last week
- Sticky notes for pentesting, bug bounty, CTF.☆776Jul 28, 2025Updated 6 months ago
- This is a repository of resource about Malware techniques☆821Apr 8, 2023Updated 2 years ago
- Useful resources for SOC Analyst and SOC Analyst candidates.☆885Aug 28, 2023Updated 2 years ago
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,036Jan 11, 2026Updated last month
- Tools and Techniques for Blue Team / Incident Response☆3,925Mar 27, 2025Updated 10 months ago
- Machine Learning for Cyber Security☆8,104Aug 19, 2024Updated last year
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆992Oct 7, 2022Updated 3 years ago
- My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+☆1,098Apr 19, 2023Updated 2 years ago
- Every Security Engineer Interview Question From Glassdoor.com☆1,253Mar 2, 2024Updated last year
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,313Jan 22, 2025Updated last year