Analytics for Accounting logs from Network devices
☆18Mar 27, 2021Updated 4 years ago
Alternatives and similar repositories for network-device-logs
Users that are interested in network-device-logs are comparing it to the libraries listed below
Sorting:
- A tool to facilitate ROP Chain Development for XML Character Sanitization☆20May 9, 2019Updated 6 years ago
- Comprehensive Pivoting Framework☆20Sep 20, 2016Updated 9 years ago
- Adversary Emulation Planner☆42Jan 9, 2026Updated last month
- Maltese - Malware Traffic Emulator☆26Feb 15, 2017Updated 9 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆78Dec 24, 2022Updated 3 years ago
- A template project for creating a shellcode for the Cisco IOS in the C language☆34Sep 21, 2017Updated 8 years ago
- Advanced malware sandbox evasion using C☆21Jan 23, 2026Updated last month
- PoC for CVE-2017-0075☆37Sep 12, 2019Updated 6 years ago
- Signedness-Agnostic Strided-Interval☆38Jun 21, 2019Updated 6 years ago
- Improvised LSB Steganography technique using Pixel Locator Sequence with AES. Implementation for paper https://ieeexplore.ieee.org/abstra…☆11Apr 17, 2021Updated 4 years ago
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- ✨ Brand Indicators for Message Identification or BIMI ( 📢 pronounced: Bih-mee) is an emerging email 📧 specification that enables the us…☆10Mar 6, 2024Updated last year
- Spider and analyze vaadin applications with OWASP ZAP - the app mediates between the two.☆12Nov 24, 2022Updated 3 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆15Oct 31, 2022Updated 3 years ago
- ☆45Nov 5, 2018Updated 7 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- 原型版本☆37Mar 30, 2017Updated 8 years ago
- This is a simple python binding of Stag Fiducial Marker Detection System☆12Mar 7, 2022Updated 3 years ago
- A PHP code transformer to provide protection against injection attacks☆10Jul 11, 2011Updated 14 years ago
- Azure Offensive Library☆17Oct 18, 2025Updated 4 months ago
- Cracking Passwords with Neural Networks☆11Nov 18, 2020Updated 5 years ago
- Enable EFS service as low priv user (PE & BOF)☆21Jul 6, 2025Updated 7 months ago
- Just a git repo for the sleepmask detection rule i found in https://codex-7.gitbook.io/codexs-terminal-window/blue-team/detecting-cobalt-…☆16Jun 4, 2025Updated 8 months ago
- HTB Jail Remote Exploit By Cneeliz - 2017☆15Jan 9, 2018Updated 8 years ago
- Hide the memory of the process in the Linux kernel.☆10Dec 8, 2020Updated 5 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- ☆12Sep 18, 2015Updated 10 years ago
- Security Notes☆11Oct 10, 2018Updated 7 years ago
- Go module that returns supported regions for a service or supported services for a region☆18Dec 12, 2025Updated 2 months ago
- ZAST Express: Your Security Copilot in IDE.☆27Nov 28, 2025Updated 3 months ago
- Low-level HTTP/2 client implementation for experimenting with the protocol.☆11Jul 26, 2020Updated 5 years ago
- TokyoWesterns CTF 4th 2018 shrine☆12Aug 23, 2019Updated 6 years ago
- ☆12Mar 24, 2018Updated 7 years ago
- Quantum Insert Backdoor POC☆11May 21, 2017Updated 8 years ago
- A detailed list of potentially dangerous file extensions☆18Jun 18, 2025Updated 8 months ago
- L'application pour bloquer un paquet, snipping, analyser le réseau☆11Dec 23, 2016Updated 9 years ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- ☆10Oct 2, 2017Updated 8 years ago