F-Secure Virus World Map / Console Edition
☆70Apr 25, 2013Updated 12 years ago
Alternatives and similar repositories for wm3con
Users that are interested in wm3con are comparing it to the libraries listed below
Sorting:
- Ansible module which allows to easily add, remove or set mount options in /etc/fstab.☆12Apr 21, 2022Updated 3 years ago
- Easy installers for Maru OS.☆12May 19, 2019Updated 6 years ago
- Some yara rules and tools☆16Feb 12, 2014Updated 12 years ago
- A simple Icinga/Nagios script to validate DNSSEC☆10Oct 11, 2017Updated 8 years ago
- Detect some forms of linux kernel tampering☆12Jun 12, 2015Updated 10 years ago
- Cowrie SSH/Telnet Honeypot☆12Sep 3, 2018Updated 7 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Feb 6, 2017Updated 9 years ago
- Proof of concept tool used for phishing multi-factor authentication on O365☆14Aug 8, 2018Updated 7 years ago
- local dns cache to anti dns polution in china. inspired by chinadns. writing in ruby☆11Jul 8, 2020Updated 5 years ago
- JSON API for ExploitDB Website☆17Jan 11, 2015Updated 11 years ago
- Golang AES Reader Writer Struct☆17Jan 30, 2018Updated 8 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆65Aug 28, 2018Updated 7 years ago
- Website for Modern PGP☆14Mar 15, 2018Updated 7 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Nov 26, 2017Updated 8 years ago
- Load nested directory structures as ansible facts.☆19Mar 13, 2019Updated 6 years ago
- ☆15Apr 9, 2018Updated 7 years ago
- Dumps TCP packets☆20Jan 8, 2018Updated 8 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆50Nov 30, 2020Updated 5 years ago
- documentation and notes on how to rebase PM on CyanogenMod☆16Oct 20, 2016Updated 9 years ago
- TLS SNI virtual hosts bruteforcer☆21Aug 26, 2014Updated 11 years ago
- docker based telnet honeypot☆80Feb 19, 2018Updated 8 years ago
- CVE-2015-3152 PoC☆43May 11, 2015Updated 10 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Monitor and analyze DNSSEC key rollovers☆24Dec 28, 2019Updated 6 years ago
- quals-2014☆21Nov 3, 2014Updated 11 years ago
- Bash Bunny fun!☆53May 24, 2018Updated 7 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆127Sep 23, 2023Updated 2 years ago
- SMTP DANE testing tool☆24Nov 20, 2025Updated 3 months ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Jan 15, 2017Updated 9 years ago
- Ruby-Elf is a pure-Ruby library for parse and fetch information about ELF format used by Linux, FreeBSD, Solaris and other Unix-like oper…☆38Jan 31, 2023Updated 3 years ago
- Go HTTP Strict Transport Security library☆22Oct 3, 2024Updated last year
- Social Engineering Abusing Google App Scripts☆24Jan 13, 2026Updated last month
- ☆25Jul 8, 2015Updated 10 years ago
- 3.10 kernel for Bacon running CM☆18May 27, 2017Updated 8 years ago
- Source IP spoofing for anonymization over UDP☆25Jan 9, 2018Updated 8 years ago
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆27Dec 8, 2015Updated 10 years ago
- Offensive Data Storage☆61Sep 1, 2016Updated 9 years ago
- An nginx module to enable the use of SPNEGO, GSSAPI, and Kerberos for HTTP SSO authentication.☆37Mar 30, 2025Updated 11 months ago
- A collection of shellcodes☆70May 17, 2012Updated 13 years ago