ksukumar0 / HW_TextbooksView external linksLinks
☆30Mar 26, 2017Updated 8 years ago
Alternatives and similar repositories for HW_Textbooks
Users that are interested in HW_Textbooks are comparing it to the libraries listed below
Sorting:
- ☆10Apr 8, 2018Updated 7 years ago
- Stanford Cryptography class excercises☆20May 13, 2012Updated 13 years ago
- A large repository of links spanning all topics in information security.☆13Mar 18, 2016Updated 9 years ago
- Solutions to Flare-On 10 CTF☆14Nov 11, 2023Updated 2 years ago
- This repository is the final location for tools I built from the book Black Hat Python☆12Aug 1, 2018Updated 7 years ago
- Covert Channels for C2 Server☆17Oct 2, 2015Updated 10 years ago
- Nishang - PowerShell for penetration testing and offensive security.☆14May 4, 2015Updated 10 years ago
- Detection of indirect syscall techniques using hardware breakpoints and vectored exception handling.☆51Oct 19, 2025Updated 3 months ago
- A tool for fuzzing for ports that allow outgoing connections☆17Oct 15, 2018Updated 7 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆22Jun 6, 2021Updated 4 years ago
- Are your installed packages _really_ the same as you saw on GitHub?☆24Jun 1, 2018Updated 7 years ago
- MLOps Attack Toolkit☆29Aug 25, 2025Updated 5 months ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆22Aug 6, 2022Updated 3 years ago
- Some of the presentations, workshops, and labs I gave at public conferences.☆34Oct 24, 2025Updated 3 months ago
- A comprehensive PowerShell-based threat hunting and incident response framework for Windows environments, built around Sysmon event analy…☆44Jul 17, 2025Updated 7 months ago
- Alphanumeric Encoder☆25Oct 10, 2018Updated 7 years ago
- This repository contains some tools that I have written in the past☆28Nov 11, 2023Updated 2 years ago
- ☆75Jan 1, 2026Updated last month
- Just a bunch of code snippets to identify and remediate common Active Directory Certificate Services issues.☆36Feb 13, 2024Updated 2 years ago
- Proof of concept for Kerberos Armoring abuse.☆78Dec 12, 2025Updated 2 months ago
- An automated collection and analysis of malware from my honeypots.☆25Feb 8, 2018Updated 8 years ago
- EvilMist is a collection of scripts and utilities designed to support cloud penetration testing & red teaming. The toolkit helps identify…☆96Feb 4, 2026Updated last week
- Password spraying script and helper for creating password lists☆34Sep 4, 2020Updated 5 years ago
- ☆32Feb 7, 2018Updated 8 years ago
- ☆32Nov 15, 2017Updated 8 years ago
- A technique for Active Directory domain persistence☆39May 31, 2023Updated 2 years ago
- A meta-list of public references to threat actor profiles and APT group datasets.☆75Oct 2, 2025Updated 4 months ago
- DNS Botnet Server and Client☆34Aug 28, 2025Updated 5 months ago
- ActionScript3 dynamic instrumentation tool☆36Mar 15, 2017Updated 8 years ago
- CORS checking☆34Jul 16, 2018Updated 7 years ago
- This tool helps inject code into the processes of Antivirus programs.☆160Nov 1, 2025Updated 3 months ago
- Writeups for CTF competitions.☆33May 24, 2016Updated 9 years ago
- create a "simulated internet" cyber range environment☆19Jan 28, 2026Updated 2 weeks ago
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆63Jan 21, 2025Updated last year
- ☆34Nov 17, 2017Updated 8 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆43Apr 27, 2020Updated 5 years ago
- Automation Forensics Tool for Windows☆44Sep 25, 2017Updated 8 years ago
- ☆46Jun 21, 2023Updated 2 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago