oussama-rahali / Network-ShredderLinks
Network Shredder IDS
☆11Updated last year
Alternatives and similar repositories for Network-Shredder
Users that are interested in Network-Shredder are comparing it to the libraries listed below
Sorting:
- CIT Cyber Security Cell Bootcamp Training modules☆38Updated 4 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- ☆14Updated 2 years ago
- Auto scanning tool that will help you during playing on HackTheBox, TryHackMe...etc☆18Updated 2 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆27Updated 4 years ago
- Mnemonic Cryptography☆18Updated 2 years ago
- RCE exploit for Microsoft Exchange Server (CVE-2021-26855).☆22Updated 3 years ago
- The Hack3r News B'darija☆18Updated 2 years ago
- CVE's we discovered along the way☆17Updated 3 years ago
- PoC List☆11Updated 3 years ago
- Pentest stuff☆49Updated last year
- DNS hijacking via dead records automation tool☆53Updated 4 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆32Updated 3 years ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆30Updated 3 years ago
- A series of writes about “Binary Exploitation”.☆84Updated 2 years ago
- This is the official repository for Basic Malware Analysis Course☆20Updated 3 years ago
- Collection of our CTF write-ups☆29Updated 5 years ago
- Random Exploits☆50Updated 2 years ago
- New Framework Red Team Operations☆18Updated 4 years ago
- Offensive Security Wireless Professional☆17Updated 5 years ago
- Trolling Keyloggers by Forcing them to log Specific Text then freezing them☆21Updated 3 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated 2 years ago
- Fast and intuitive manager for multiple reverse shells☆86Updated 9 months ago
- Materials from different CTFs for later reuse☆26Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Extract endpoints marked as disallow in robots files to generate wordlists.☆59Updated 3 years ago
- Get GTFOBins info about a given exploit from the command line☆40Updated last year
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆108Updated last year
- ☆13Updated last year