An iptables firewall configuration template.
☆80May 1, 2022Updated 3 years ago
Alternatives and similar repositories for iptables
Users that are interested in iptables are comparing it to the libraries listed below
Sorting:
- This tool will harvest valid DNS subdomains from a given domain.☆75May 1, 2022Updated 3 years ago
- Official Black Hat Arsenal Security Tools Repository☆160May 1, 2022Updated 3 years ago
- Does a dictionary lookup on common, valuable hostnames for a given domain.☆26May 1, 2022Updated 3 years ago
- A Ruby script that takes in IPs and returns Country, State, and City☆42May 1, 2022Updated 3 years ago
- A collection of CTF solution types, i.e. not solutions to specific CTF challenges, but the general categories that those solutions fall u…☆57May 1, 2022Updated 3 years ago
- My various configuration files for zsh, vim, tmux, etc.☆25May 1, 2022Updated 3 years ago
- A simple script for translating IP addresses to GeoLocations☆51May 1, 2022Updated 3 years ago
- My Nginx configuration files, for all to use and improve upon.☆109May 1, 2022Updated 3 years ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Apr 21, 2025Updated 10 months ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 5 years ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Jun 25, 2018Updated 7 years ago
- A composite score for one's GitHub quality.☆22May 1, 2022Updated 3 years ago
- Perform Thread Hijacking Shellcode Injection without OpenProcess and OpenThread mapping all the free handles in memory☆16Jul 16, 2024Updated last year
- Free tools for mobile testing.☆38May 1, 2022Updated 3 years ago
- Very hard chess testset☆15Oct 22, 2016Updated 9 years ago
- Toolkit of Projects to attack and evade Event Trace for Windows☆26Aug 28, 2025Updated 6 months ago
- How to bypass AMSI (Antimalware Scan Interface) in PowerShell/C++ by dynamically patching the AmsiScanBuffer function.☆25Apr 21, 2025Updated 10 months ago
- A malicous Golang Package☆15Apr 21, 2025Updated 10 months ago
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16May 5, 2016Updated 9 years ago
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35May 7, 2015Updated 10 years ago
- Packet captures from various CCIE routing and switching learning labs.☆20Mar 9, 2019Updated 6 years ago
- Framework for Man-In-The-Middle attacks☆15Feb 19, 2018Updated 8 years ago
- StatusPage Notification to Mattermost☆15Aug 3, 2025Updated 6 months ago
- A quick and dirty PCAP parser that helps you identify who your applications are sending sensitive data to without encryption.☆119Jan 31, 2024Updated 2 years ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆26Apr 21, 2025Updated 10 months ago
- ☆19Mar 25, 2015Updated 10 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23May 1, 2022Updated 3 years ago
- BTLEmap's Bluetooth Low Energy framework that powers the app☆23Dec 8, 2021Updated 4 years ago
- A repository for personal tracking.☆17May 1, 2022Updated 3 years ago
- Bypassing File Upload Restriction using Magic Bytes☆22Jul 4, 2022Updated 3 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Dec 27, 2021Updated 4 years ago
- WH RAT V2 2022☆25Jan 19, 2024Updated 2 years ago
- A log parsing engine written in Java for high performance. Additionally, logger is also highly configurable.☆15Aug 13, 2018Updated 7 years ago
- Template for OTC Infrastructure Charts☆12Oct 16, 2025Updated 4 months ago
- Simple DNS log Server,easy to ACME DNS challenge☆23Mar 5, 2023Updated 2 years ago
- ATHI — An AI Threat Modeling Framework for Policymakers☆60Aug 21, 2023Updated 2 years ago
- A network data locater using credentials obtained during penetration tests☆32Oct 30, 2013Updated 12 years ago
- Tool that assists in migrating firewall rules from Cisco to Checkpoint. Will optimize rules for you (rationalization, reuse merging, etc.…☆22Nov 10, 2020Updated 5 years ago
- Parent Process ID Spoofing, coded in CGo.☆24Apr 21, 2025Updated 10 months ago