ispoleet / Network-Security
A collection of some interesting network security projects
☆57Updated 6 years ago
Alternatives and similar repositories for Network-Security:
Users that are interested in Network-Security are comparing it to the libraries listed below
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆28Updated last year
- Papers about known hacking, security, hardware, software, computer, network and other ressources.☆76Updated 5 years ago
- Reverse shell and rootkit☆19Updated 7 years ago
- A simple ELF Virus that can execute malacious code, infect other ELF files, and execute the host file's code normally.☆41Updated 6 years ago
- Some of the vulnerabilities that were found by Cybellum platform☆32Updated 6 years ago
- intrusion detection☆23Updated 7 years ago
- Evading Snort Intrusion Detection System.☆76Updated 3 years ago
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆96Updated 4 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆14Updated 4 years ago
- A Python malware analysis library.☆50Updated last year
- Write-Ups for CTF challenges☆11Updated 8 years ago
- Live Dangerous Linux Malware Samples!☆21Updated 4 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆84Updated 5 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆23Updated 4 years ago
- A simple attack against gcc and Python via kernel module, with highly detailed comments.☆21Updated 10 years ago
- Writeups/solutions☆94Updated 4 years ago
- An educational Linux Kernel Rootkit☆31Updated 3 years ago
- SpooKey is a keylogger written in C++ that uses kernel-level APIs to capture keystrokes (Linux only. Windows is a work in progress)☆32Updated 5 years ago
- Python implementation of pattern_create and pattern_offset from Metasploit Framework☆18Updated 5 years ago
- A linux rootkit works on kernel 4.0.X or higher☆36Updated 8 years ago
- Open Standard Vulnerability & Compliance Scanner☆43Updated 9 years ago
- Downloads VirusShare hashes (https://virusshare.com/hashes.4n6) and searches them for specified MD5 hashes☆69Updated 4 years ago
- A Python based Intrusion Detection and Prevention System. Uses Scapy to sniff packets at a specific interface, extract the remote IPs, sc…☆9Updated 7 years ago
- Linux Rootkits (4.x Kernel)☆82Updated 3 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆33Updated 8 years ago
- PoC about CVE-2019-0708 (RDP; Windows 7, Windows Server 2003, Windows Server 2008)☆39Updated 5 years ago
- Software Security course☆21Updated 9 years ago
- SSH, FTP and Telnet honeypots based on Twisted☆86Updated 5 years ago
- DHCP attack tool☆19Updated 4 months ago
- Challenge files which are deployed in the container for the user☆24Updated 8 months ago