A collection of some interesting network security projects
☆61Aug 9, 2018Updated 7 years ago
Alternatives and similar repositories for Network-Security
Users that are interested in Network-Security are comparing it to the libraries listed below
Sorting:
- A quick String < - > HEX tool for Windows with Drag & Drop and File saving☆11Dec 4, 2018Updated 7 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 5 years ago
- exploit for dirtycow☆14Dec 21, 2022Updated 3 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Jun 12, 2019Updated 6 years ago
- HTTP/HTTPS/DNS inspector (windows driver)☆27Feb 20, 2019Updated 7 years ago
- ☆15Jul 11, 2019Updated 6 years ago
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- ☆20Feb 27, 2022Updated 4 years ago
- Automatically parse Malleable C2 profiled into CrossC2 rebinding library source code☆21Feb 13, 2023Updated 3 years ago
- Linux Kernel TLS/DTLS Module Tool☆22Jul 31, 2017Updated 8 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16May 5, 2016Updated 9 years ago
- Linux assembly programs☆18Updated this week
- 用于快速探测未授权MongoDB数据库结构,取第一条内容,并统计数据数量。A tool for unauthorized MongoDB database , take the first content, and the number of statistical da…☆26Dec 5, 2016Updated 9 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Write ups for DRDO CTF☆10Jan 13, 2018Updated 8 years ago
- Training resources for LFCS certification (Linux Foundation Certified System Administrator)☆13Jul 26, 2015Updated 10 years ago
- A mildly competent autogenerated telegram api wrapper☆10Mar 2, 2026Updated 3 weeks ago
- LDAP library for auditing MS AD☆13Nov 28, 2023Updated 2 years ago
- CIS Benchmark for Server Hardening RHEL Ubuntu☆13Apr 6, 2018Updated 7 years ago
- Fully automated SSL Secure Site activation☆20Jan 4, 2019Updated 7 years ago
- Rusty Mimikatz - All credits to: github.com/ThottySploity/mimiRust (Original author deleted account so I uploaded for community use)☆21Nov 24, 2022Updated 3 years ago
- This version touches disk for registry persistence.☆27Oct 6, 2015Updated 10 years ago
- Malicious shortcut file builder for spear-phishing and red-team engagement.☆17Sep 11, 2023Updated 2 years ago
- Puppet module to apply CIS rules. *for Standalone Mode*☆10Jul 3, 2019Updated 6 years ago
- Python library created while solving the Matasano Cryptopals challenges☆17Jun 17, 2021Updated 4 years ago
- Backdoor for Windows systems (client and server) writen in C (client) and ASM (server) using reverse connection☆19Jul 6, 2014Updated 11 years ago
- nginx interface for push message to kafka☆16Oct 27, 2014Updated 11 years ago
- Alina POS Source Code + Rootkit☆23Nov 3, 2015Updated 10 years ago
- Perforce as Filesystem in Userspace (FUSE)☆14Jul 21, 2018Updated 7 years ago
- A demo of Github email search☆17Dec 28, 2015Updated 10 years ago
- Awvs 14 Scanner、fahai☆10Jul 1, 2021Updated 4 years ago
- A Brief List of Introductory Resources for Learning About DevOps☆13Nov 27, 2019Updated 6 years ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- Full DLL Hooking, phrack 65☆53Aug 11, 2023Updated 2 years ago
- PC 4k intro, ranked #2 at Evoke 2017.☆10Aug 25, 2017Updated 8 years ago
- AES implementation on FPGA☆13Apr 17, 2016Updated 9 years ago
- Dump Windows PE file information in C☆24May 2, 2015Updated 10 years ago