This is a list of Computer and Network Security Axioms
☆30May 1, 2020Updated 5 years ago
Alternatives and similar repositories for SecurityAxioms
Users that are interested in SecurityAxioms are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple website to display the LAN status based on a nmap scan☆58Jan 5, 2023Updated 3 years ago
- TN3270 MitM proxy and so much more☆14Jun 4, 2018Updated 7 years ago
- ☆20Dec 4, 2025Updated 4 months ago
- Mobile Application Vulnerability Detection☆12May 19, 2017Updated 8 years ago
- 8ball☆17Sep 7, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- CLI tool for setting up and maintaining a nodeschool chapters and other things.☆17Apr 21, 2016Updated 9 years ago
- Extract GUIDs from .NET assemblies☆21Jun 15, 2016Updated 9 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- A little experiment in unit test-based object discovery☆20Oct 14, 2016Updated 9 years ago
- Explain and validate SQL queries as you type them into Datasette☆12Feb 28, 2024Updated 2 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- OwOwning with the Windows API Examples and Code. DEFCON Furs 2020 presentation.☆13Jan 18, 2024Updated 2 years ago
- Various snippets created during malware analysis☆22Apr 29, 2018Updated 7 years ago
- Rapid deployment of Windows environment (files, registry keys, mutex etc) to facilitate malware analysis☆40Mar 8, 2015Updated 11 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A Rust doubly-linked intrusive list with Miri tests☆12May 4, 2024Updated last year
- Reticulum Network hosted in the Chicagoland area☆15Jan 26, 2026Updated 2 months ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- A VM for CTF binary exploitation challenges☆20Mar 11, 2020Updated 6 years ago
- autossh-init - AutoSSH init script☆38Nov 9, 2013Updated 12 years ago
- Bro Snippets☆21Nov 7, 2014Updated 11 years ago
- clustering algorithm implementation☆13Updated this week
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25May 3, 2018Updated 7 years ago
- 寻找可注入进程☆13Jul 16, 2020Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A collection of YARA signatures that I have found around the web.☆11Apr 29, 2016Updated 9 years ago
- knxnet is a python library to create and decode KNXnet/IP datagram for Tunnelling.☆13Apr 7, 2017Updated 9 years ago
- Bro things..☆15Oct 23, 2015Updated 10 years ago
- ☆10Aug 13, 2024Updated last year
- This repo contains workshop material delivered at #nullcon2020☆16Mar 6, 2020Updated 6 years ago
- inject shellcode into remote process via message hook☆15Oct 28, 2020Updated 5 years ago
- finals-2014☆20Nov 15, 2016Updated 9 years ago
- ☆11Jun 21, 2020Updated 5 years ago
- Ansible playbook to install cuckoo sandbox.☆11Mar 8, 2019Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- CLI tool for creating charts☆46Feb 15, 2026Updated 2 months ago
- Tools for hunting security threats☆12Feb 4, 2020Updated 6 years ago
- Kill Chain Matrix -->>☆38Jun 17, 2019Updated 6 years ago
- ☆15Mar 15, 2026Updated last month
- ☆102Jul 18, 2019Updated 6 years ago
- A public database for software and firmware hashes☆215Nov 12, 2016Updated 9 years ago
- Proof of concept to test POODLE over TLS☆11Mar 13, 2015Updated 11 years ago