oussama-rahali / Network-ShredderLinks
Network Shredder IDS
☆11Updated last year
Alternatives and similar repositories for Network-Shredder
Users that are interested in Network-Shredder are comparing it to the libraries listed below
Sorting:
- CIT Cyber Security Cell Bootcamp Training modules☆38Updated 4 years ago
- ☆14Updated 2 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆64Updated 5 years ago
- Solutions of xchg rax,rax☆15Updated 5 years ago
- Open Redirect scanner☆18Updated 3 years ago
- PoC List☆11Updated 3 years ago
- The Hack3r News B'darija☆18Updated 2 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆28Updated 4 years ago
- Pentest stuff☆49Updated last year
- Simple encryption tool designed to perform a bitwise XOR operation (XORing) on the contents of files with specific extensions in a given …☆20Updated last year
- Trolling Keyloggers by Forcing them to log Specific Text then freezing them☆21Updated 3 years ago
- CVE's we discovered along the way☆17Updated 3 years ago
- ✍️ A curated list of CVE PoCs.☆12Updated 7 years ago
- Auto scanning tool that will help you during playing on HackTheBox, TryHackMe...etc☆18Updated 2 years ago
- Rawsec's Cybersecurity Inventory cli. Search pentesting tools, resources, ctf, os.☆27Updated 2 weeks ago
- The all-in-one Red Team extension for Web Pentester. Added more functionality☆16Updated 3 years ago
- Just another vulnerable web application.☆36Updated last year
- RCE exploit for Microsoft Exchange Server (CVE-2021-26855).☆22Updated 3 years ago
- The SecurityTube Linux Assembly Expert (SLAE) is an online course and certification which focuses on teaching the basics of 32-bit assemb…☆23Updated 6 years ago
- LLM Vulnerable Application☆13Updated 2 years ago
- [180+ scripts] There are a few genuine gems in there. And a lot of spaghetti code. Most of these scripts were for solving CTF's. If you …☆63Updated 2 years ago
- Get GTFOBins info about a given exploit from the command line☆40Updated last year
- Write-Ups for TryHackMe☆24Updated 4 years ago
- CATANA - CUT your Wordlist!☆14Updated 3 years ago
- This is the official repository for Basic Malware Analysis Course☆20Updated 3 years ago
- Extract endpoints marked as disallow in robots files to generate wordlists.☆59Updated 3 years ago
- New Framework Red Team Operations☆18Updated 4 years ago
- All the members of bugbounty and infosec. If you don't know who to follow, see!☆35Updated 3 years ago
- ☆29Updated 2 years ago
- Multipurpose tool, currently aimed for HackTheBox Battlegrounds☆21Updated 4 years ago