ispoleet / Network-SecurityLinks
A collection of some interesting network security projects
☆61Updated 7 years ago
Alternatives and similar repositories for Network-Security
Users that are interested in Network-Security are comparing it to the libraries listed below
Sorting:
- Executables created while writing "Introduction to Manual Backdooring".☆80Updated 8 years ago
- Kernel Hacking study materials collection☆109Updated 9 years ago
- Linux Rootkits (4.x Kernel)☆86Updated 4 years ago
- A bunch of my exploit development helper tools, collected in one place.☆143Updated 3 years ago
- Papers about known hacking, security, hardware, software, computer, network and other ressources.☆78Updated 6 years ago
- A way to backdoor every process☆67Updated 8 years ago
- Ivan Ricart Borges - Program to detect the existence of remote/local stack-based buffer-overflow vulnerabilities using the standard commu…☆54Updated 4 years ago
- DHCP attack tool☆20Updated last year
- Shellcode / Buffer Overflow 💣☆20Updated 5 years ago
- This repo is all about myself coded exploit codes :)☆54Updated 6 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 5 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆84Updated 6 years ago
- ☆40Updated 7 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆24Updated 5 years ago
- Writeups for all the HTB machines I have done☆64Updated 2 years ago
- Source codes of malwares, stress tests etc. for computer.☆38Updated 5 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things. Inspired by awesom☆71Updated 5 years ago
- Python implementation of pattern_create and pattern_offset from Metasploit Framework☆18Updated 6 years ago
- FUZZBUNCH - NSA security tools☆78Updated 8 years ago
- Miscellaneous exploit scripts☆17Updated 3 years ago
- LOCAL ROOT EXPLOITS☆37Updated 7 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 8 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Reverse shell and rootkit☆19Updated 8 years ago
- ☆36Updated 7 years ago
- ☆73Updated 6 years ago
- ☆58Updated 7 years ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆45Updated 3 years ago