ispoleet / Network-SecurityLinks
A collection of some interesting network security projects
☆59Updated 6 years ago
Alternatives and similar repositories for Network-Security
Users that are interested in Network-Security are comparing it to the libraries listed below
Sorting:
- Evergrowing compilation of challenges I authored for various CTF's and my Intended solutions☆13Updated 2 years ago
- A collection of code examples e.g. a buffer overflow + exploit, crypter, shellcodes and more.☆16Updated last year
- Simple LKM linux kernel rootkit (x86 / x86_64)☆23Updated 4 years ago
- Assignments for the SecurityTube Linux Assembly Expert Certification (SLAE)☆21Updated 6 years ago
- CVE-2019-10149 privilege escalation☆9Updated 5 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆79Updated 8 years ago
- Reverse shell and rootkit☆19Updated 8 years ago
- Miscellanous scripts used for malware analysis☆22Updated 6 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- ☆41Updated 7 years ago
- Damn vulnerable linux device driver for people to play with.☆28Updated 5 years ago
- Kernel Hacking study materials collection☆110Updated 8 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 4 years ago
- Red-team tool to hook libc read syscall with a buffer overflow vulnerability.☆36Updated 6 years ago
- Good to know, easy to forget information about binaries and their exploitation!☆68Updated 7 years ago
- Introductory software reverse engineering tutorial for beginners☆35Updated 6 years ago
- Cryptographic Dataset Generation & Modelling Framework☆38Updated 5 years ago
- x86_64 linux rootkit using debug registers☆52Updated 3 years ago
- CTFs I've played so far☆17Updated 4 months ago
- Rootkit Development tutorial series. Works on Kernel version 4.15 Can be adapted for 5.3+☆44Updated 3 years ago
- Security Capture The Flag (CTF) competition writeups and learning notes.☆14Updated 8 years ago
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 6 years ago
- Build a Jekyll blog in minutes, without touching the command line.☆16Updated 6 years ago
- Reverse Engineering and Malware Analysis - Books, Tools, Courses, etc.☆41Updated 8 years ago
- Proof of Concepts of vulnerabilities discovered by me☆10Updated last year
- Emulator, debugger and compiler for the NDH architecture - Emulator for CTF NDH 2k12☆37Updated 12 years ago
- Reverse Windows shell over TLS☆19Updated 9 years ago
- A keylogger for Windows, developed as part of the "Build an Advanced Keylogger using C++ for Ethical Hacking!" course on Udemy☆17Updated 7 years ago
- CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨�…☆31Updated 2 years ago
- A gentle introduction to binary exploitation☆41Updated 5 years ago