生成各种形式混淆但有效的IP地址
☆22Aug 12, 2018Updated 7 years ago
Alternatives and similar repositories for IP-Obfuscator
Users that are interested in IP-Obfuscator are comparing it to the libraries listed below
Sorting:
- The notes are the supplement to papers and handouts of CS 259D☆21May 4, 2018Updated 7 years ago
- Adversarial attack on a CNN trained on MNIST dataset using Targeted I-FGSM and Targeted MI-FGM☆11Feb 17, 2018Updated 8 years ago
- A collection of C# tools for various purposes (kerberoasting, tickets, mimikatz, privesc, domain enumeration and more)☆80Aug 12, 2019Updated 6 years ago
- Python GDB RDP client (replaces gdb for QEMU tcp debug)☆12Apr 22, 2022Updated 3 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- This is a simple 4x4 Sudoku game I created in Python for my class.☆12Oct 29, 2018Updated 7 years ago
- 参考《利用分块传输吊打所有WAF》修改的requests的Adapter☆98Jan 31, 2019Updated 7 years ago
- Docker + CVE-2015-2925 = escaping from --volume☆11Jun 30, 2015Updated 10 years ago
- The sec3 audit reports and publications☆11Feb 2, 2026Updated last month
- Ransonware simples, criptografa arquivos e volta ao normal com a chave fornecida☆10Jan 28, 2021Updated 5 years ago
- A benchmark for Java gadget chain detecting algorithms.☆15Jun 20, 2025Updated 8 months ago
- ☆11Jan 6, 2020Updated 6 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- This is the gandcrab v5.0.3 javascript dropper☆10Apr 29, 2020Updated 5 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- ☆14May 20, 2019Updated 6 years ago
- A tool to leverage Virus Total's API key with advanced queries to download malware(s) and report(s).☆11Apr 24, 2013Updated 12 years ago
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- Discord bot using the cryptography toolkit of SkeletonKey☆12Nov 18, 2024Updated last year
- RSA加密应用常见缺陷的原理与实践☆190Feb 5, 2022Updated 4 years ago
- Automatically scan jar packages by using ast to find fastjson gadgets. In particular, this project is limited to mining Gadgets that may …☆49Mar 8, 2022Updated 3 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- Script and resources to execute shell commands using access to a PostgreSQL service☆13Oct 24, 2024Updated last year
- ☆11Dec 26, 2022Updated 3 years ago
- Encrypt/Decrypt Directories or Files using PowerShell, AES-256 encryption☆14Sep 18, 2017Updated 8 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- Labs for Software Vulnerabilities: Exploitation and Mitigation university course.☆11Jul 5, 2019Updated 6 years ago
- CC模拟器☆13Mar 21, 2017Updated 8 years ago
- 😴 关于不让我弟一直玩游戏,定时要求他休息才写的小玩意。☆10Sep 4, 2021Updated 4 years ago
- ☆10Dec 8, 2022Updated 3 years ago
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- A shell where you whitelist commands and only those commands can be executed. Either via ssh, as an interactive shell or launched with co…☆25Jul 2, 2013Updated 12 years ago
- Updates the Emerging Threats open ruleset for Suricata☆10Sep 20, 2015Updated 10 years ago
- virus collection☆14Apr 13, 2021Updated 4 years ago
- Build docker container for @MaskRay's pcap-search☆12Oct 19, 2018Updated 7 years ago
- Run your own private blog!☆12Sep 5, 2023Updated 2 years ago
- ☆12Aug 8, 2019Updated 6 years ago
- XSS hunter 收集Webview 页面上存在的反射,储存型XSS ,方便应急APP 和前端页面在发布时遇到XSS 安全问题..☆42Oct 9, 2016Updated 9 years ago
- A curated list of audit rules which extract from Source Code Auditing tools.☆15Feb 19, 2020Updated 6 years ago