ispoleet / Network-Security
A collection of some interesting network security projects
☆53Updated 6 years ago
Related projects: ⓘ
- Red-team tool to hook libc read syscall with a buffer overflow vulnerability.☆34Updated 5 years ago
- Data and code for malware classification using machine learning (for fun, not production)☆39Updated 4 years ago
- Kernel Hacking study materials collection☆105Updated 8 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆45Updated 4 years ago
- A simple ELF Virus that can execute malacious code, infect other ELF files, and execute the host file's code normally.☆40Updated 6 years ago
- Meltdown PoC for reading passwords from Google Chrome.☆469Updated 6 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆75Updated 7 years ago
- ☆67Updated this week
- This is an example buffer overflow attack on a small vulnerable C program.☆78Updated 8 years ago
- Code from the book "Designing BSD Rootkits: An Introduction to Kernel Hacking"☆43Updated 7 years ago
- Good to know, easy to forget information about binaries and their exploitation!☆66Updated 6 years ago
- ☆22Updated 7 years ago
- Miscellanous scripts used for malware analysis☆23Updated 5 years ago
- SPRITZ plays CTFs! Writeups by spritzers☆63Updated 6 years ago
- Cryptographic Dataset Generation & Modelling Framework☆38Updated 4 years ago
- ☆21Updated this week
- ☆49Updated this week
- A simple tool to organise large malicious/benign files into a organised Structure.☆1Updated 6 years ago
- Write-Ups for CTF challenges☆11Updated 7 years ago
- Malware Machine Learning☆27Updated 6 years ago
- Live Dangerous Linux Malware Samples!☆19Updated 4 years ago
- Rootkit Detector for UNIX☆60Updated last year
- Yet another CTF writeups repository. PWN and RE tasks☆33Updated 4 years ago
- It is demonstration tool that contains collection techniques to detect the virtualisation environment in Linux Operating System.☆22Updated 5 years ago
- Python implementation of pattern_create and pattern_offset from Metasploit Framework☆18Updated 5 years ago
- Damn vulnerable linux device driver for people to play with.☆26Updated 4 years ago
- This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CV…☆93Updated 6 years ago
- Downloads VirusShare hashes (https://virusshare.com/hashes.4n6) and searches them for specified MD5 hashes☆67Updated 3 years ago
- ☆48Updated this week
- Malware Sandbox Emulation in Python @ HITCON 2018☆47Updated 6 years ago