filinpavel / whitehatLinks
☆21Updated 6 years ago
Alternatives and similar repositories for whitehat
Users that are interested in whitehat are comparing it to the libraries listed below
Sorting:
- Microsoft Office / COM Object DLL Planting☆15Updated 9 years ago
- (Unofficial) Python API for cybercrime-tracker.net☆38Updated 7 years ago
- lkm rootkit☆15Updated 11 years ago
- Repository for penetration testing tools☆36Updated 5 years ago
- Information Security News☆62Updated 2 years ago
- LD_PRELOAD rootkit☆24Updated 11 years ago
- All tools you needed during penetration testing.☆18Updated 8 years ago
- CTF Writeups☆16Updated 8 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago
- LD_PRELOAD rootkit utils☆16Updated 10 years ago
- Customizable lazy exploit pattern utility.☆13Updated 3 years ago
- w3af packaging for Kali distribution☆26Updated 10 years ago
- The Horrific Omnipotent Rootkit☆23Updated 8 years ago
- An experimental rootkit for Android☆26Updated 12 years ago
- A Unix rootkit☆16Updated 5 years ago
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Updated 12 years ago
- simple rootkit for computer security class☆14Updated 13 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Updated 10 years ago
- Open Standard Vulnerability & Compliance Scanner☆46Updated 10 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 10 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 5 years ago
- My metasploit modules☆11Updated 10 years ago
- Repository for the OWASP/WASC Distributed Web Honeypots Project -☆35Updated 10 years ago
- ☆15Updated 9 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆26Updated 7 years ago
- Application for random attack on Green Petya's key☆25Updated 8 years ago
- A configurable XPath/XML injection testbed☆33Updated 12 years ago
- A List of InfoSec Resources☆10Updated 11 years ago
- This is a very simple Keylogger, it doesn't hide itself and is a college project building towards developing a rootkit.☆23Updated 11 years ago
- Automated Cyber Offense☆88Updated 6 years ago