CTF PWN解题赛中,PWN题流量监控系统,可快速排查攻击来源、攻击过程,迅速定位可疑相似流量。
☆15Nov 27, 2022Updated 3 years ago
Alternatives and similar repositories for skyaf
Users that are interested in skyaf are comparing it to the libraries listed below
Sorting:
- This is a simple network firewall for pwn challenges of ctf awd competition, light and simple code.There is no dependence, the log format…☆209Nov 10, 2023Updated 2 years ago
- AWD批量攻击脚本(Web/Pwn通用),通过bash编写,远程信息采用参数传入exp,通过多进程方式实现同时攻打,阻塞超时自动结束进程。☆139Oct 27, 2022Updated 3 years ago
- ☆12Aug 22, 2022Updated 3 years ago
- the rhg robot for ichunqiu 2018☆22Jan 17, 2019Updated 7 years ago
- ☆56Aug 30, 2022Updated 3 years ago
- This tool allows local LLM usage that can automate tasks without human interventention. The agent can call itself recursively and work on…☆20May 5, 2025Updated 9 months ago
- A gdb plugin for linux kernel.☆28Jul 14, 2023Updated 2 years ago
- CTF中Pwn的快速利用模板(包含awd pwn)☆28Oct 15, 2021Updated 4 years ago
- A python library for making API calls to Bonsai BRAIN.☆15Oct 6, 2022Updated 3 years ago
- 每天一个技术点☆10Sep 10, 2023Updated 2 years ago
- headless-ida-mcp-server☆30Apr 4, 2025Updated 11 months ago
- Python SIR-x model implementation☆10Dec 8, 2022Updated 3 years ago
- Tool for image-based control RDP (Remote Desktop Protocol). Manipulations, automations and testing via Python and Apache Guacamole☆14Nov 16, 2022Updated 3 years ago
- Templates for deploying pwn challenge in ctf☆51Mar 24, 2023Updated 2 years ago
- Fault-Tolerant Pure Functional Programming Language For JVM☆10Apr 6, 2022Updated 3 years ago
- A Xposed module to show a notification when using camera/microphone.☆10Feb 22, 2016Updated 10 years ago
- fofa+xray vul scan golang☆10Sep 19, 2021Updated 4 years ago
- Too many☆14Oct 3, 2025Updated 5 months ago
- ☆12Jan 17, 2025Updated last year
- Exploit basado en vulnerabilidades criticas Bluetooth (CVE-2023-45866, CVE-2024-21306)☆12Dec 15, 2024Updated last year
- ☆10Jul 19, 2016Updated 9 years ago
- An example of graph embeddings for wikipedia page recommendations☆11Aug 26, 2021Updated 4 years ago
- Prediction of Virality and Popularity of YouTube Videos ~ Machine Learning Algorithms Analysis☆10May 28, 2017Updated 8 years ago
- 社工必备工具箱 Social engineering tools for SNS websites☆13Feb 19, 2017Updated 9 years ago
- ☆14Feb 25, 2026Updated last week
- 基于单FOFA资产搜索引擎账号部署的多人协作查询B/S模式,后端部署后通过前端网页交互查询数据和导出数据☆12Aug 1, 2025Updated 7 months ago
- Exploit for HEVD☆10Sep 11, 2019Updated 6 years ago
- MCP Server for Snyk Security Scanning☆15Feb 23, 2025Updated last year
- AWD 自动化攻击框架☆10Jun 21, 2019Updated 6 years ago
- Deepextract : extracts details about activities, services, and broadcast receivers, including their intent actions, custom URL schemes an…☆11Aug 14, 2024Updated last year
- Rerousces related to time-travel debugging (TTD)☆31Jan 6, 2026Updated last month
- 黑客神器,谁用谁知道!☆10Jul 10, 2019Updated 6 years ago
- 📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems su…☆15Apr 13, 2024Updated last year
- 🎯 告别信息过载,只看真正关心的新闻 - 多平台热点聚合工具,一键监控今日头条、百度热搜、微博、抖音、知乎、B站等35个平台,智能关键词筛选,自动生成热点分析报告。支持企业微信、飞书、钉钉、Telegram推送,1分钟部署完毕, 支持 docker 部署。⭐ 让算法为你服…☆23Updated this week
- Tool developed to fuzz the GATT layer of the Bluetooth Low Energy protocol based on defined attack scenarios.☆65Oct 25, 2024Updated last year
- Book Notes on "Design and Implementation of a 64-bit Operating System"☆14Jun 12, 2024Updated last year
- Python implementations of some algorithms from the CLRS textbook☆10Dec 8, 2019Updated 6 years ago
- A little tool to play with Windows security☆12Jan 21, 2026Updated last month
- A set of Blender scripts to make your VRoid model UE4 compliant.☆14Jan 3, 2021Updated 5 years ago