oussama-rahali / Network-ShredderLinks
Network Shredder IDS
☆11Updated last year
Alternatives and similar repositories for Network-Shredder
Users that are interested in Network-Shredder are comparing it to the libraries listed below
Sorting:
- CIT Cyber Security Cell Bootcamp Training modules☆38Updated 4 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- ☆14Updated 2 years ago
- The Hack3r News B'darija☆18Updated 3 years ago
- Materials from different CTFs for later reuse☆27Updated 2 years ago
- PoC List☆10Updated 3 years ago
- Auto scanning tool that will help you during playing on HackTheBox, TryHackMe...etc☆19Updated 2 years ago
- This is the official repository for Basic Malware Analysis Course☆20Updated 4 years ago
- RCE exploit for Microsoft Exchange Server (CVE-2021-26855).☆22Updated 3 years ago
- CVE's we discovered along the way☆17Updated 4 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆28Updated 4 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Updated 3 months ago
- Random Exploits☆50Updated 2 years ago
- Pentest stuff☆50Updated 2 years ago
- Get GTFOBins info about a given exploit from the command line☆39Updated last year
- Mnemonic Cryptography☆18Updated 3 years ago
- Windows Stack Based Auto Buffer Overflow Exploiter☆20Updated 4 years ago
- Rawsec's Cybersecurity Inventory cli. Search pentesting tools, resources, ctf, os.☆28Updated 3 weeks ago
- New Framework Red Team Operations☆19Updated 4 years ago
- ✍️ A curated list of CVE PoCs.☆13Updated 8 years ago
- Offensive Security Wireless Professional☆17Updated 5 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆33Updated 3 years ago
- A series of writes about “Binary Exploitation”.☆85Updated 2 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Updated 2 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆49Updated 2 years ago
- ☆30Updated 2 years ago
- A python approach to interacting with web shells.☆30Updated 5 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆10Updated 4 years ago