Notes about information security and linux system administration.
☆17Jul 28, 2016Updated 9 years ago
Alternatives and similar repositories for notes
Users that are interested in notes are comparing it to the libraries listed below
Sorting:
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- Public Advisories for Security Vulnerabilities.☆25Mar 14, 2015Updated 10 years ago
- A cross-vendor network device configuration distribution tool☆37Jul 18, 2019Updated 6 years ago
- Tools for analyzing hexagon code☆39Jun 22, 2016Updated 9 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- public exploits☆35May 11, 2023Updated 2 years ago
- CPU miner for Litecoin and Bitcoin☆16Mar 27, 2014Updated 11 years ago
- ☆15Feb 21, 2023Updated 3 years ago
- Find your router's default password☆14Apr 7, 2015Updated 10 years ago
- A proof of concept for Joomla's CVE-2015-8562 vulnerability (Object Injection RCE)☆10May 3, 2024Updated last year
- LSDB to Networkx, rendered with pyGraphViz, dumps YAML☆12Jan 1, 2021Updated 5 years ago
- Papers about known hacking, security, hardware, software, computer, network and other ressources.☆79Sep 29, 2019Updated 6 years ago
- Mainframe TN3270 unencrypted TSO session user ID and password sniffer☆51Jun 6, 2023Updated 2 years ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆42Jan 21, 2017Updated 9 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- Parse Bluetooth Low Energy peripheral advertising packets☆14Nov 7, 2021Updated 4 years ago
- ☆16Jan 24, 2026Updated last month
- Ansible Playbooks with Cumulus NCLU (net commands)☆11Aug 22, 2017Updated 8 years ago
- Mediates between original client and server.☆10Oct 10, 2016Updated 9 years ago
- nilnesserr = nilness + nilerr☆10Apr 4, 2025Updated 10 months ago
- In-development tools contributed by the community☆11Feb 6, 2025Updated last year
- Dynamically configure Juniper network devices using metadata from Netbox. Mirror of https://gerrit.wikimedia.org/g/operations/software/ho…☆14Jan 12, 2026Updated last month
- Sample of a Malicious baseband signed by Apple☆10May 12, 2022Updated 3 years ago
- Flask app web interface for Juniper JSNAPy (Junos Snapshot Administrator)☆11Jul 6, 2022Updated 3 years ago
- ☆11Dec 3, 2014Updated 11 years ago
- Amarisoft LTE - 4G Selective Jammer Core☆13Nov 24, 2019Updated 6 years ago
- Provides the gameplay logic.☆11Oct 15, 2016Updated 9 years ago
- Translates the DSD/DSF file into WAV file written in C for learning,☆11Feb 21, 2019Updated 7 years ago
- MS17-010☆12Oct 25, 2017Updated 8 years ago
- NethServer system basic behavior implementation☆11May 2, 2024Updated last year
- Using AnyCable and Hanami to build an app to process Twilio Media streams☆13Nov 12, 2024Updated last year
- Class to help with adding logging function in smali output from 3rd party Android apps.☆10May 20, 2014Updated 11 years ago
- A CAPTCHA recognition demo in tensorflow.☆11Jun 13, 2017Updated 8 years ago
- TSDuck analyser values exported as metrics in Prometheus☆12Apr 12, 2023Updated 2 years ago
- Discrete signal processing tool for side chanel data leakage attacks and analysis. Air-gapped keylogger PoC.☆11Oct 31, 2023Updated 2 years ago
- Netbox plugin that accepts and process incomming webhooks☆15Oct 1, 2024Updated last year
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- ☆16Sep 6, 2017Updated 8 years ago
- Running TaintDroid from the command line and analyze output☆17Mar 28, 2012Updated 13 years ago