ispoleet / Network-SecurityLinks
A collection of some interesting network security projects
☆61Updated 7 years ago
Alternatives and similar repositories for Network-Security
Users that are interested in Network-Security are comparing it to the libraries listed below
Sorting:
- Kernel Hacking study materials collection☆108Updated 9 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆80Updated 8 years ago
- A bunch of my exploit development helper tools, collected in one place.☆145Updated 3 years ago
- An example rootkit that gives a userland process root permissions☆78Updated 6 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆83Updated 6 years ago
- ☆57Updated 7 years ago
- A gentle introduction to binary exploitation☆42Updated 5 years ago
- Simple windows backdoor command shell.☆20Updated 8 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- A collection of darkc0de old scripts (for education purposes only)☆86Updated 9 years ago
- ☆40Updated 7 years ago
- 0-ring rootkit revealer for Linux☆29Updated 6 years ago
- Source codes of malwares, stress tests etc. for computer.☆38Updated 6 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Updated 5 years ago
- Assignments for the SecurityTube Linux Assembly Expert Certification (SLAE)☆22Updated 7 years ago
- An educational Linux Kernel Rootkit☆33Updated 4 years ago
- Reverse shell and rootkit☆19Updated 8 years ago
- A way to backdoor every process☆68Updated 8 years ago
- ☆26Updated 7 years ago
- Python implementation of pattern_create and pattern_offset from Metasploit Framework☆18Updated 6 years ago
- Linux Rootkits (4.x Kernel)☆87Updated 4 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆24Updated 5 years ago
- Security tools, scanners, exploit code☆31Updated 8 years ago
- Python3 Metasploit automation library☆23Updated 3 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆47Updated 5 years ago
- Rootkit Detector for UNIX☆61Updated 2 years ago
- ☆34Updated 10 years ago
- Incarcero is a tool that creates Virtual Machines (VMs) preconfigured with malware analysis tools and security settings tailored for malw…☆91Updated 2 years ago
- A simple C keylogger for Linux☆70Updated 5 years ago
- A simple exploit to execute system command on codiad☆65Updated 7 years ago