oussama-rahali / Network-Shredder
Network Shredder IDS
☆11Updated 7 months ago
Alternatives and similar repositories for Network-Shredder:
Users that are interested in Network-Shredder are comparing it to the libraries listed below
- Open Redirect scanner☆18Updated 2 years ago
- CIT Cyber Security Cell Bootcamp Training modules☆37Updated 3 years ago
- The Hack3r News B'darija☆18Updated 2 years ago
- ☆14Updated last year
- CVE-2023-38831 winrar exploit generator and get reverse shell☆11Updated last year
- some of my IOCs from malware investigations☆10Updated 2 years ago
- Osint French People Location☆15Updated 2 years ago
- Mass exploitation of CVE-2021-24499 unauthenticated upload leading to remote code execution in Workreap theme.☆17Updated 3 years ago
- A tool that encrypt and hide your data inside your images.☆30Updated 3 years ago
- Restful Api developed with Flask using Prometheus and Grafana for monitoring and containerization with Docker☆17Updated last year
- RCE exploit for Microsoft Exchange Server (CVE-2021-26855).☆20Updated 2 years ago
- Writeups of CTFs i play - this repository will also include POCs, RFCs and Related Resources to support the writeups.☆8Updated 2 years ago
- linux debugger☆11Updated last year
- Framework For Exploring kernel vulnerabilities, network vulnerabilities ✨☆25Updated last year
- Auto scanning tool that will help you during playing on HackTheBox, TryHackMe...etc☆18Updated last year
- Ray-casting game for wasting productive time.☆11Updated 3 years ago
- Trolling Keyloggers by Forcing them to log Specific Text then freezing them☆20Updated 2 years ago
- Solutions of xchg rax,rax☆15Updated 4 years ago
- The Hacking Week☆2Updated 2 years ago
- Simple encryption tool designed to perform a bitwise XOR operation (XORing) on the contents of files with specific extensions in a given …☆20Updated 8 months ago
- WinGPG is a tray-based classical Windows application, Windows NT Explorer shell extension, and a classic GPGv2 distribution. Secure your …☆12Updated 3 years ago
- CVE's we discovered along the way☆16Updated 3 years ago
- All the members of bugbounty and infosec. If you don't know who to follow, see!☆35Updated 2 years ago
- A really good cybersec reading materials.☆13Updated 2 years ago
- My attempt to reverse the Discord nitro token generation function.☆29Updated 6 months ago
- Mnemonic Cryptography☆17Updated 2 years ago
- ✍️ A curated list of CVE PoCs.☆12Updated 7 years ago
- ☆38Updated 4 years ago
- Test your Security Skills, and Clean Code Development as a Pythonist, Hacker & Warrior 🥷🏻☆46Updated 2 months ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆11Updated 4 years ago