ispoleet / Network-SecurityLinks
A collection of some interesting network security projects
☆61Updated 7 years ago
Alternatives and similar repositories for Network-Security
Users that are interested in Network-Security are comparing it to the libraries listed below
Sorting:
- Executables created while writing "Introduction to Manual Backdooring".☆80Updated 8 years ago
- Source codes of malwares, stress tests etc. for computer.☆38Updated 5 years ago
- Kernel Hacking study materials collection☆109Updated 9 years ago
- Linux Rootkits (4.x Kernel)☆86Updated 4 years ago
- ☆40Updated 7 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆24Updated 5 years ago
- A bunch of my exploit development helper tools, collected in one place.☆144Updated 3 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆83Updated 6 years ago
- ☆73Updated 6 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 5 years ago
- CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨�…☆31Updated 3 years ago
- Rootkit Detector for UNIX☆61Updated 2 years ago
- Checkpot Honeypot Checker☆46Updated 6 years ago
- ☆83Updated 11 years ago
- windows-kernel-exploits Windows平台提权漏洞集合☆25Updated 4 years ago
- PoC about CVE-2019-0708 (RDP; Windows 7, Windows Server 2003, Windows Server 2008)☆39Updated 6 years ago
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆97Updated 5 years ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆45Updated 3 years ago
- Python3 Metasploit automation library☆22Updated 3 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 6 years ago
- Materials for a course based on the Practical Malware Analysis text by Andrew Honig and Michael Sikorski☆19Updated 7 years ago
- FUZZBUNCH - NSA security tools☆81Updated 8 years ago
- Writeups/exploit code for CTFs I've done☆13Updated 4 years ago
- Rootkit Development tutorial series. Works on Kernel version 4.15 Can be adapted for 5.3+☆44Updated 3 years ago
- Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.☆73Updated 5 years ago
- A Python malware analysis library.☆50Updated 2 years ago
- Security tools, scanners, exploit code☆31Updated 8 years ago
- Writeups of some of PicoCTF 2017 challenges.☆10Updated 7 years ago
- This repo is all about myself coded exploit codes :)☆55Updated 6 years ago
- Checkpot Honeypot Checker☆27Updated 7 years ago