ispoleet / Network-SecurityLinks
A collection of some interesting network security projects
☆61Updated 7 years ago
Alternatives and similar repositories for Network-Security
Users that are interested in Network-Security are comparing it to the libraries listed below
Sorting:
- Executables created while writing "Introduction to Manual Backdooring".☆81Updated 8 years ago
- Kernel Hacking study materials collection☆110Updated 9 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 5 years ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆44Updated 3 years ago
- windows-kernel-exploits Windows平台提权漏洞集合☆24Updated 4 years ago
- A bunch of my exploit development helper tools, collected in one place.☆143Updated 2 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆23Updated 5 years ago
- Linux Rootkits (4.x Kernel)☆82Updated 4 years ago
- A simple ELF Virus that can execute malacious code, infect other ELF files, and execute the host file's code normally.☆43Updated 7 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things. Inspired by awesom☆70Updated 5 years ago
- The Ultimate Guide to Pwning☆58Updated 7 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- Python script to automatically deobfuscate malware code☆59Updated 7 years ago
- Rootkit Detector for UNIX☆61Updated 2 years ago
- Assignments for the SecurityTube Linux Assembly Expert Certification (SLAE)☆21Updated 6 years ago
- Incarcero is a tool that creates Virtual Machines (VMs) preconfigured with malware analysis tools and security settings tailored for malw…☆92Updated last year
- A curated list of awesome Cisco exploitation resources☆69Updated 7 years ago
- BLACKPHENIX is an open source malware analysis automation framework composed of services, scripts, plug-ins, and tools and is based on a …☆31Updated 2 years ago
- A Simple PE File Heuristics Scanners☆50Updated 6 years ago
- ☆14Updated 6 years ago
- Red-team tool to hook libc read syscall with a buffer overflow vulnerability.☆37Updated 6 years ago
- Simple Polymorphic x86_64 Runtime Code Segment Cryptor☆57Updated 7 years ago
- A gentle introduction to binary exploitation☆41Updated 5 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆84Updated 5 years ago
- Papers about known hacking, security, hardware, software, computer, network and other ressources.☆76Updated 5 years ago
- Assembly language files and Shellcode☆34Updated 4 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- FUZZBUNCH - NSA security tools☆76Updated 8 years ago
- This repository has everything I have learnt so far while reading the book Practical Malware Analysis☆32Updated 5 years ago
- Miscellanous scripts used for malware analysis☆22Updated 6 years ago