alfdav / ZinesLinks
Mirror of my favourite hacking Zines for the lulz, nostalgy, and reference
☆54Updated 5 years ago
Alternatives and similar repositories for Zines
Users that are interested in Zines are comparing it to the libraries listed below
Sorting:
- Self replicating and automatically spreading SSH worm that recovers login credentials☆54Updated 2 years ago
- Articles, White Papers, Technical Write-Ups and more authored by members of the GreySec community. Curated by staff, selected for excelle…☆27Updated 4 years ago
- ☆34Updated 7 years ago
- Awesome Operational Security resources☆47Updated 9 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated last year
- fanny.bmp cleaned MALWARE - ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! (incl Metasploit detection Module)☆46Updated 5 months ago
- Polymorphic ELF Virus☆17Updated 3 years ago
- masscan with exclusive excludes☆58Updated 2 years ago
- Configure FireFox with Security and Intelligance features for OSINT and Security Investigations.☆16Updated last year
- This project is a tool for detecting nudity in images, allowing users to analyze both local images and images from URLs. It utilizes the …☆18Updated last year
- A feed of malware samples curated from threat intelligence sources.☆28Updated 2 years ago
- Master of Science in Cybersecurity, Sapienza University of Rome.☆55Updated last year
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆50Updated 5 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆22Updated 3 years ago
- Modular framework to exploit UPS devices☆66Updated 2 years ago
- In-Memory Rootkit For Linux and BSD☆86Updated 4 months ago
- A robust information gathering tool for large scale reconnaissance on Internet Relay Chat servers 🛰️☆51Updated 2 years ago
- Collected and authored guides for personal and operational security.☆65Updated 2 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- GAUSS MALWARE Source [Striking similarities with Duqu, FlameR!, Fanny, StuxNet and more.] Source coming soon! + Binaries + Video show…☆18Updated 3 years ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Updated last year
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Updated 4 years ago
- Network scanning tool designed to detect and report changes in open ports and services over time☆10Updated last month
- Packet crafting, injection and sniffing tool☆70Updated 4 months ago
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆176Updated 7 months ago
- List of sources for cybersecurity news☆39Updated 2 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Updated 3 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆29Updated last year
- ☆16Updated last week