Project for a Computer Security class based on CSAW capture the flag challenges
☆13Mar 19, 2014Updated 11 years ago
Alternatives and similar repositories for DNS-Cache-Poisoning-with-Scapy
Users that are interested in DNS-Cache-Poisoning-with-Scapy are comparing it to the libraries listed below
Sorting:
- Judge is a tool for scoring/debugging network services on a CCDC (or similar competition) network.☆21Oct 4, 2017Updated 8 years ago
- An automated collection and analysis of malware from my honeypots.☆25Feb 8, 2018Updated 8 years ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- Fluxion is a easy to use wifi cracker, to test your own network☆11Feb 8, 2017Updated 9 years ago
- H4MTool es una herramienta enfocada en escaneos de puertos☆10Apr 27, 2022Updated 3 years ago
- Most Popular Attack and Defend Competitive A/D mode for 5 years!☆12Feb 5, 2018Updated 8 years ago
- Automate ISSG Tool Setups☆13Nov 21, 2024Updated last year
- Malware distributed via phishing campaign on discord. Steals browser data and discord tokens. (Formerly SonicGlyde-Discord-Malware)☆10Dec 18, 2024Updated last year
- Install your remote server for the Lamassu Cryptomat☆18Feb 16, 2026Updated 3 weeks ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- A Velocity proxy plugin which adds customizable commands from the bungeecord proxy and a little bit more.☆11Jun 19, 2023Updated 2 years ago
- Terraform playbook of a vulnerable Azure deployment☆10Apr 28, 2022Updated 3 years ago
- Run PowerShell command without invoking powershell.exe☆12Sep 2, 2017Updated 8 years ago
- A collection of scripts designed to secure/harden Linux based distributions☆12Nov 2, 2025Updated 4 months ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- Python tool to parse and decrypt files quarantined by windows defender☆13Feb 25, 2023Updated 3 years ago
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- Bash scripts for use on Linux for minting Cardano NFTs☆12Aug 2, 2022Updated 3 years ago
- bash script to prepare Debian machines for OSINT use☆11Apr 10, 2020Updated 5 years ago
- Remote Administration Tool☆10Mar 27, 2025Updated 11 months ago
- The NSE Script plugin integrates with Criminal IP CTI search engine for network scanning, showing IP details like WHOIS, running products…☆16Nov 29, 2023Updated 2 years ago
- .Net Core library for cryptocurrency trading with support for many exchanges on the Bitcoin and Ethereum blockchains☆11Aug 27, 2025Updated 6 months ago
- The Second Version of Car Demo☆12Jan 6, 2023Updated 3 years ago
- ☆10Nov 21, 2023Updated 2 years ago
- Change your DNS from the toolbar in OSX (10.9+)☆17Mar 16, 2017Updated 8 years ago
- An outdated external multihack for CS:GO on MacOS☆11Jul 11, 2019Updated 6 years ago
- Find out cryptocurrency arbitrage opportunities across exchanges. (No Fiat withdrawal involved)☆11Jan 30, 2018Updated 8 years ago
- Scoring engine for cyber defense competitions☆10Jan 30, 2022Updated 4 years ago
- Various Crypter Project☆10Feb 26, 2014Updated 12 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- Assembly code to use for Windows kernel shellcode to edit winlogon.exe ACL☆13Mar 6, 2017Updated 9 years ago
- Enhanced version of finddupe, a duplicate file detector for Windows☆11Dec 31, 2025Updated 2 months ago
- PoC for hiding data within $MFT☆12Aug 14, 2014Updated 11 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago