Source code of http://howihacked.info
☆16Jan 28, 2016Updated 10 years ago
Alternatives and similar repositories for howihacked
Users that are interested in howihacked are comparing it to the libraries listed below
Sorting:
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- 一个xss利用平台☆18Jun 1, 2014Updated 11 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Aug 25, 2017Updated 8 years ago
- VE - the File Manager within Vim!☆43Jan 19, 2022Updated 4 years ago
- Jump to random Vim documentation.☆44Feb 3, 2017Updated 9 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Aug 21, 2019Updated 6 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- penetration testing framework that can use socks4/socks5 proxy.☆53Sep 6, 2014Updated 11 years ago
- Collection of Auditd Examples and Presentations☆88Oct 16, 2020Updated 5 years ago
- ☆12Dec 14, 2016Updated 9 years ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 6 years ago
- A WeChat (and Weixin) chatbot skeleton in Python with queue/delayed messages support.☆12Jan 12, 2026Updated last month
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- Tool to identify domains containing Pinyin language☆12Oct 18, 2014Updated 11 years ago
- 基于Linux c开发的插件式扫描器(Python/lua)☆35Feb 27, 2016Updated 10 years ago
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 8 months ago
- Data visualization of NFT accounts☆11Jun 28, 2021Updated 4 years ago
- Security tools to use on assessments.☆40May 9, 2016Updated 9 years ago
- ☆11Aug 19, 2017Updated 8 years ago
- auth client for yuque oauth app☆10Jul 13, 2023Updated 2 years ago
- complete command-line (: / etc.) from the current file☆13Oct 19, 2010Updated 15 years ago
- Example of Kerberoasting Honeypot☆18Sep 11, 2025Updated 5 months ago
- shoco is a compressor for small text strings. [Not maintained].☆10Sep 4, 2019Updated 6 years ago
- Generate realistic raw datasets with optional DQ issues☆10Jan 22, 2025Updated last year
- Radix sorting in Go☆10Feb 4, 2019Updated 7 years ago
- A simple low-interaction port monitoring honeypot.☆19Jun 14, 2020Updated 5 years ago
- A websocket proxy☆13Nov 13, 2017Updated 8 years ago
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago
- Reference list of email processing resources; focus on preservation and PII handling☆14Apr 20, 2022Updated 3 years ago
- Generate a table of contents from the comments of a file☆13Jan 24, 2026Updated last month
- ☆35Feb 20, 2018Updated 8 years ago
- Script to setup a phishing server on the cloud☆13Apr 30, 2021Updated 4 years ago
- Daemon that periodically reads MySQL statistics and writes to statsd. Fork of (now gone) github.com/samlambert/mysql-statsd☆16Aug 13, 2014Updated 11 years ago
- ☆10Jun 22, 2025Updated 8 months ago
- ☆10Jan 4, 2015Updated 11 years ago
- A list of backdoor samples I find online.☆13Dec 16, 2019Updated 6 years ago