maxtnkrs / NetsecStudents
☆11Updated this week
Related projects: ⓘ
- Some simple and useful tools☆15Updated 6 years ago
- ☆21Updated this week
- ☆23Updated this week
- ☆41Updated this week
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆6Updated 5 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆46Updated 9 years ago
- Metasploit Framework☆26Updated 6 years ago
- Ansible Playbook for setting up Datasploit☆14Updated 8 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 6 years ago
- Practice and learning in the world of C RE and exploit analysis☆31Updated 6 years ago
- ☆27Updated this week
- ☆25Updated 7 years ago
- ☆42Updated this week
- Source Code Intelligence☆30Updated 7 years ago
- A simplified SMB Email Client Attack script used for pentests.☆30Updated 5 years ago
- tundeep☆42Updated 5 years ago
- Bash scripts to help setup port redirects with iptables☆16Updated 7 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆43Updated 5 years ago
- A scripted library of hacking techniques.☆18Updated 6 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆47Updated 7 years ago
- ☆51Updated this week
- Malware analysis using Docker project☆25Updated 8 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Updated 5 years ago
- Anti-Honeypot Demo (obsolete)☆18Updated 7 years ago
- Collection of information security policies.☆27Updated 7 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆97Updated 6 years ago
- The initial conversation slides and menu of scenarios☆38Updated 3 years ago
- ☆14Updated 6 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 8 years ago