Challenges, notes & other stuff from the HackEire CTF.....
☆35Apr 1, 2016Updated 10 years ago
Alternatives and similar repositories for hackeire
Users that are interested in hackeire are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Extract unencrypted SSH keys from pageant memory dump☆15Oct 3, 2015Updated 10 years ago
- Covert Channels for C2 Server☆17Oct 2, 2015Updated 10 years ago
- Process HTTP Pcaps With YARA☆108Jul 29, 2013Updated 12 years ago
- #Pwn Linux (CrunchPwn) is a penetration testing repository/addition for CrunchBang Linux.☆27Feb 16, 2014Updated 12 years ago
- Your last stop for password list generation needs!☆27Mar 4, 2015Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- Tool to test for existence of CVE-2020-8218☆22Sep 5, 2020Updated 5 years ago
- Code and Slides of my BSides London 2019 presentation about Attacker Emulation using CALDERA☆22Jun 9, 2019Updated 6 years ago
- SHURIKEN: Exploit throwing framework☆36Dec 8, 2015Updated 10 years ago
- A Windows Installer for SickRage☆24Dec 13, 2015Updated 10 years ago
- Optional plugins for MITMf☆17Dec 16, 2014Updated 11 years ago
- Source code of https://blahcat.github.io☆13Oct 6, 2025Updated 6 months ago
- Configuration for openvpn to route traffic selectively over the VPN☆49Oct 2, 2015Updated 10 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- Automatically exported from code.google.com/p/yaptest☆66Feb 25, 2022Updated 4 years ago
- SEQ/Ack signature triggered SSL back connect☆10May 20, 2016Updated 9 years ago
- ☆36Dec 7, 2020Updated 5 years ago
- experimenting w/ apple script for various macOS functionality☆14Aug 4, 2019Updated 6 years ago
- Telegram Bot that performs checks of the yararules.com ruleset☆13May 13, 2016Updated 9 years ago
- Python Malware Crawler for Zoos and Repositories☆109Apr 9, 2018Updated 8 years ago
- Binary archive and installation package building script☆14Dec 24, 2025Updated 3 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆12Oct 20, 2016Updated 9 years ago
- a netdude clone☆10May 23, 2019Updated 6 years ago
- IOCs for CRASHOVERRIDE malware framework☆27Jun 15, 2017Updated 8 years ago
- Public Repository of all Publicly Available Packet Captures that I've used or come across☆182Jan 17, 2013Updated 13 years ago
- Security Onion Elastic Stack☆46Feb 1, 2021Updated 5 years ago
- Go bindings for yara: pattern matching swiss knife http://plusvic.github.io/yara/☆10Jul 21, 2015Updated 10 years ago
- ☆15Apr 12, 2018Updated 8 years ago
- ssh session type for metasploit☆101Feb 5, 2023Updated 3 years ago
- simple c2 written in python to demonstrate security concepts☆13Sep 17, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- upstream for seccheck☆15Jun 11, 2018Updated 7 years ago
- TightVNC Vulnerability.☆16Jan 26, 2022Updated 4 years ago
- Library for creating CTF services.☆75Nov 11, 2016Updated 9 years ago
- ipip.net(17MonIP) parsing library for OpenResty.☆12Jun 4, 2018Updated 7 years ago
- pure Python binary analysis framework☆23Oct 26, 2018Updated 7 years ago
- initial push☆14Feb 10, 2015Updated 11 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆61May 11, 2015Updated 10 years ago