Project for a Computer Security class based on CSAW capture the flag challenges
☆13Mar 19, 2014Updated 12 years ago
Alternatives and similar repositories for DNS-Cache-Poisoning-with-Scapy
Users that are interested in DNS-Cache-Poisoning-with-Scapy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An automated collection and analysis of malware from my honeypots.☆25Feb 8, 2018Updated 8 years ago
- A collection of Python code, useful for RF work☆13Sep 2, 2022Updated 3 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- ☆12Dec 8, 2022Updated 3 years ago
- Python tool to parse and decrypt files quarantined by windows defender☆13Feb 25, 2023Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- 这里存放的是我们团队做CTF题目的时候经常用到的一些工具☆11Nov 5, 2018Updated 7 years ago
- scripts to help beginners program in Bro☆21Aug 10, 2013Updated 12 years ago
- Berliner Spargel OS☆12May 26, 2014Updated 11 years ago
- ☆11May 22, 2023Updated 2 years ago
- Public Repo for the source code of the UDCTF in 2022☆12Nov 7, 2022Updated 3 years ago
- Released code from BSidesSF CTF 2023☆18Aug 8, 2023Updated 2 years ago
- Judge is a tool for scoring/debugging network services on a CCDC (or similar competition) network.☆21Oct 4, 2017Updated 8 years ago
- A tool for replacing the Japanese text of Kirara Fantasia's story video.☆13Jan 16, 2019Updated 7 years ago
- Assembly code to use for Windows kernel shellcode to edit winlogon.exe ACL☆13Mar 6, 2017Updated 9 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Various cryptographic backdoors and tools to detect them☆21Sep 5, 2015Updated 10 years ago
- Run Pi-Hole + Unbound on Docker☆21Apr 3, 2026Updated 2 weeks ago
- Broken web app intentionally built with pentesting obstacles☆16Jun 21, 2019Updated 6 years ago
- SEQ/Ack signature triggered SSL back connect☆10May 20, 2016Updated 9 years ago
- DeNiSe is a proof of concept for tunneling TCP over DNS in Python☆38Dec 17, 2021Updated 4 years ago
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Oct 20, 2015Updated 10 years ago
- Firefly Home Automation☆21Sep 12, 2018Updated 7 years ago
- A Discord Rich Presence for cmus player using rust 🦀💙☆17Feb 16, 2024Updated 2 years ago
- A Terraform module for GRR: the distributed incident forensics and response framework☆52May 6, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Post-explotation Hacks☆14Jan 6, 2019Updated 7 years ago
- OSSEC website on Github☆25Feb 23, 2021Updated 5 years ago
- ☆11Apr 30, 2015Updated 10 years ago
- Command line tool to write to x86 boot flash chips via the PCH☆14Mar 30, 2017Updated 9 years ago
- Black Box Fuzzing(Bluetooth)☆10Apr 26, 2016Updated 9 years ago
- Base Code for P2P Network Crawlers☆31Aug 2, 2013Updated 12 years ago
- ☆18Mar 20, 2017Updated 9 years ago
- Simple binary file disassembler based on libopcodes and bfd from binutils.☆27Jun 25, 2015Updated 10 years ago
- ☆24Dec 6, 2015Updated 10 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆21May 10, 2017Updated 8 years ago
- Triage automation for suspect URLs☆13Jul 23, 2019Updated 6 years ago
- D-RAT SRC Extract☆13Dec 24, 2016Updated 9 years ago
- Scripts and tools for ISM hacking☆16Mar 25, 2018Updated 8 years ago
- Dockerised Version of Frida☆21May 10, 2023Updated 2 years ago
- ☆13Feb 16, 2016Updated 10 years ago
- Attack data☆26Apr 20, 2018Updated 7 years ago