A collection of some interesting network security projects
☆61Aug 9, 2018Updated 7 years ago
Alternatives and similar repositories for Network-Security
Users that are interested in Network-Security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- http log post-processing to add client's ASN☆12Apr 14, 2016Updated 10 years ago
- Markdown version of OWASP Testing Checklist v4☆14Aug 15, 2017Updated 8 years ago
- A simple CTF website that I created for Software Security class☆13Jan 26, 2017Updated 9 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 6 years ago
- exploit for dirtycow☆13Dec 21, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- arm64 IOKit class dumper☆21Feb 22, 2025Updated last year
- An Open framework to rate the exposure of ip addresses with services exposed to the internet☆31Dec 20, 2017Updated 8 years ago
- intelligent and automatic build system for C☆15Apr 17, 2021Updated 5 years ago
- Browser Vulnerability Exploit DB(浏览器漏洞PoC数据库)☆10Feb 7, 2017Updated 9 years ago
- HTTP/HTTPS/DNS inspector (windows driver)☆24Feb 20, 2019Updated 7 years ago
- ☆15Jul 11, 2019Updated 6 years ago
- A simple python script which can check HTTP status of branch of URLs/Subdomains and grab URLs/Subdomain title☆12Oct 16, 2019Updated 6 years ago
- The fastest way to test/generate/renew Let's Encrypt SSL certificates!!! Requires root access and a live webserver to run the script at.☆24Aug 6, 2019Updated 6 years ago
- ☆20Feb 27, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- NSA tool hacking☆15May 20, 2018Updated 8 years ago
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16May 5, 2016Updated 10 years ago
- Linux assembly programs☆18May 13, 2026Updated last week
- Plugin to label PEB addresses.☆31Feb 28, 2017Updated 9 years ago
- 用于快速探测未授权MongoDB数据库结构,取第一条内容,并统计数据数量。A tool for unauthorized MongoDB database , take the first content, and the number of statistical da…☆26Dec 5, 2016Updated 9 years ago
- Capture the flag - security challenges☆13Feb 29, 2016Updated 10 years ago
- Training resources for LFCS certification (Linux Foundation Certified System Administrator)☆13Jul 26, 2015Updated 10 years ago
- Gentle introduction to the basics of CMake and meson, and unit-testing with gtest.☆13Jun 24, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A mildly competent autogenerated telegram api wrapper☆10Updated this week
- LDAP library for auditing MS AD☆13Nov 28, 2023Updated 2 years ago
- CIS Benchmark for Server Hardening RHEL Ubuntu☆13Apr 6, 2018Updated 8 years ago
- Rusty Mimikatz - All credits to: github.com/ThottySploity/mimiRust (Original author deleted account so I uploaded for community use)☆21Nov 24, 2022Updated 3 years ago
- Fully automated SSL Secure Site activation☆20Jan 4, 2019Updated 7 years ago
- This version touches disk for registry persistence.☆26Oct 6, 2015Updated 10 years ago
- Malicious shortcut file builder for spear-phishing and red-team engagement.☆18Sep 11, 2023Updated 2 years ago
- Athc0n 2012 CTF setups☆15Mar 12, 2015Updated 11 years ago
- A tool to generate yara signatures from function blocks☆19Dec 8, 2014Updated 11 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Backdoor for Windows systems (client and server) writen in C (client) and ASM (server) using reverse connection☆18Jul 6, 2014Updated 11 years ago
- A fuzzy file finding Light Table plugin with style.☆32Sep 2, 2014Updated 11 years ago
- Alina POS Source Code + Rootkit☆23Nov 3, 2015Updated 10 years ago
- A demo of Github email search☆17Dec 28, 2015Updated 10 years ago
- ☆24Nov 3, 2019Updated 6 years ago
- A Brief List of Introductory Resources for Learning About DevOps☆13Nov 27, 2019Updated 6 years ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago