Repository of my Computer and Information Security work.
☆66Feb 25, 2018Updated 8 years ago
Alternatives and similar repositories for Security
Users that are interested in Security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Jun 28, 2017Updated 8 years ago
- ☆22Jan 2, 2018Updated 8 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Jun 24, 2016Updated 9 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆40Dec 20, 2016Updated 9 years ago
- Solutions from multiple CTFs we have played.☆11Oct 16, 2018Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Berliner Spargel OS☆12May 26, 2014Updated 11 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- ☆10Jul 8, 2015Updated 10 years ago
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- Siberkamp 2016 Kış Kampı Notları☆12Feb 20, 2017Updated 9 years ago
- Various cryptographic backdoors and tools to detect them☆21Sep 5, 2015Updated 10 years ago
- A DNS library for Rust.☆23Mar 31, 2025Updated 11 months ago
- Example ASM code following SLAE course and exam assignments.☆37May 23, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆35Dec 9, 2023Updated 2 years ago
- Zeromutarts Capture the Flag 2013 challenge writeups☆22Dec 9, 2013Updated 12 years ago
- a Software Defined Infrared (SDIR) neighbor☆19Dec 6, 2021Updated 4 years ago
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13May 5, 2016Updated 9 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Happy Hacker☆99Aug 16, 2023Updated 2 years ago
- Next Generation of White Chapel☆21Oct 17, 2014Updated 11 years ago
- Various things to share☆11Sep 22, 2018Updated 7 years ago
- Push "BAD" IPs/Networks into QRadar's "Remote Networks", tag them properly, and use them!☆18Nov 5, 2013Updated 12 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- An automated collection and analysis of malware from my honeypots.☆25Feb 8, 2018Updated 8 years ago
- ☆11Aug 2, 2016Updated 9 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- Docker container for datasploit framework☆25Aug 3, 2017Updated 8 years ago
- Automated Information Retrieval From APKs For Initial Analysis☆33Oct 2, 2017Updated 8 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Jul 14, 2015Updated 10 years ago
- ☆21Mar 18, 2019Updated 7 years ago
- A simulation of the RFCTF KOTH game.☆10Aug 14, 2020Updated 5 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Dec 7, 2018Updated 7 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Windows 10 De-Clutter script☆25Jul 5, 2020Updated 5 years ago
- VirusTotal Intelligence Notification Puller☆28Jun 29, 2016Updated 9 years ago
- Zabbix Jsrpc.php Injection Exploit☆25Aug 29, 2016Updated 9 years ago
- So many people in Information Security create resources for students transitioning into the industry, but the struggle is to share them t…☆55Jan 24, 2018Updated 8 years ago
- Malformity is a Maltego project based on the Canari framework for malicious binary and infrastructure research.☆115May 4, 2016Updated 9 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- ☆16Oct 28, 2024Updated last year