nullsecuritynet / papersLinks
Papers about known hacking, security, hardware, software, computer, network and other ressources.
☆77Updated 5 years ago
Alternatives and similar repositories for papers
Users that are interested in papers are comparing it to the libraries listed below
Sorting:
- Public Advisories for Security Vulnerabilities.☆25Updated 10 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Updated 9 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Updated 8 years ago
- This repo is all about myself coded exploit codes :)☆54Updated 6 years ago
- Metasploit Usage Wiki☆47Updated 10 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆80Updated 8 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆148Updated 4 years ago
- This is a big smash up of a lot of various tools I have made in the past along with some new ones. It includes a array of tools for helpi…☆86Updated 11 years ago
- Network based protocol fuzzer☆74Updated 3 years ago
- Post-Exploitation Framework☆78Updated 8 years ago
- Black Nurse DOS attack☆72Updated 7 years ago
- Fetch, install and search exploit archives from exploit sites.☆116Updated last year
- ssh session type for metasploit☆100Updated 2 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 8 years ago
- an experimental linux kernel module (rootkit) with a keylogger and built-in IRC bot☆56Updated 10 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆59Updated 2 years ago
- Tools that are related to pentest and network security☆97Updated 4 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆75Updated 8 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆37Updated 9 years ago
- Perform MiTM attack and remove encryption on Windows Remote Registry Protocol.☆36Updated 8 years ago
- Automated Cyber Offense☆91Updated 6 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Updated 7 years ago
- Arp spoof detection tool☆25Updated 8 years ago
- Metasploit Framework with Viproy installed.☆36Updated 8 years ago
- Script to generate malicious debian packages (debain trojans).☆120Updated 6 years ago
- Generate customized and undetectable exploits for Metasploit.☆23Updated 8 years ago
- Wi-Fi Backdoors☆39Updated 10 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- Exploits and research stuffs☆55Updated 2 years ago
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆63Updated 2 years ago