ispoleet / Network-SecurityLinks
A collection of some interesting network security projects
☆61Updated 6 years ago
Alternatives and similar repositories for Network-Security
Users that are interested in Network-Security are comparing it to the libraries listed below
Sorting:
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 4 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Introductory software reverse engineering tutorial for beginners☆35Updated 6 years ago
- Reverse shell and rootkit☆19Updated 8 years ago
- Kernel Hacking study materials collection☆110Updated 9 years ago
- PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610☆77Updated 5 years ago
- ☆41Updated 7 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆23Updated 5 years ago
- A gentle introduction to binary exploitation☆41Updated 5 years ago
- This repository has everything I have learnt so far while reading the book Practical Malware Analysis☆31Updated 5 years ago
- CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨�…☆31Updated 2 years ago
- Miscellaneous exploit scripts☆17Updated 3 years ago
- Assembly language files and Shellcode☆34Updated 3 years ago
- A collection of darkc0de old scripts (for education purposes only)☆85Updated 9 years ago
- Tool for finding Buffer Overflows in simple binaries. CTF use mainly.☆20Updated 7 years ago
- A collection of code examples e.g. a buffer overflow + exploit, crypter, shellcodes and more.☆16Updated last year
- Rootkit Development tutorial series. Works on Kernel version 4.15 Can be adapted for 5.3+☆44Updated 3 years ago
- DHCP attack tool☆20Updated 9 months ago
- ☆24Updated 4 years ago
- Lightweight FreeBSD rootkit for stealth persistence, process hiding, and system control.☆19Updated 5 years ago
- Assignments for the SecurityTube Linux Assembly Expert Certification (SLAE)☆21Updated 6 years ago
- Reverse Engineering and Malware Analysis - Books, Tools, Courses, etc.☆41Updated 8 years ago
- A Simple PE File Heuristics Scanners☆50Updated 6 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆80Updated 8 years ago
- CVE-2019-10149 privilege escalation☆9Updated 6 years ago
- A way to backdoor every process☆66Updated 7 years ago
- A proof-of-concept DLL that prints out the password a user enters into Veracrypt while decrypting a volume.☆15Updated 6 years ago
- Writeups of some of PicoCTF 2017 challenges.☆10Updated 6 years ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆44Updated 3 years ago
- This is a small Python3 script that allows you to search and download samples from Hybrid Analysis' v2 API☆9Updated 5 years ago