Network Shredder IDS
☆11Aug 14, 2024Updated last year
Alternatives and similar repositories for Network-Shredder
Users that are interested in Network-Shredder are comparing it to the libraries listed below
Sorting:
- CIT Cyber Security Cell Bootcamp Training modules☆38Apr 7, 2021Updated 4 years ago
- Exploit of CVE-2019-8942 and CVE-2019-8943☆24Feb 2, 2021Updated 5 years ago
- Extract endpoints marked as disallow in robots files to generate wordlists.☆58Mar 2, 2022Updated 4 years ago
- ☆12Nov 27, 2025Updated 3 months ago
- https://academy.tcm-sec.com/☆14Aug 19, 2025Updated 6 months ago
- A template for wrapping any Java builder (eg., Maven Takari builder) and bring it into Bazel.☆10May 1, 2025Updated 10 months ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- Parts House is your very own customizable parts tracker, where you can record valuable info of individual parts from your appliances and/…☆10Jun 30, 2021Updated 4 years ago
- PoC List☆10Sep 4, 2022Updated 3 years ago
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- Provision Amazon Web Services VPC using Terraform☆10Oct 4, 2018Updated 7 years ago
- VMware Guide☆14Dec 14, 2021Updated 4 years ago
- A toolkit for CTF challenges☆10Jan 18, 2017Updated 9 years ago
- Detection of malicious data exfiltration over DNS using Machine Learning techniques☆13Jul 8, 2020Updated 5 years ago
- Source code for 'Software Exorcism' by Bill Blunden☆13Mar 30, 2017Updated 8 years ago
- a brief example of mqtt usage to send camera stream to web page☆11May 4, 2022Updated 3 years ago
- A set of tools that allow researchers to experiment with certificate chain validation issues☆13Dec 4, 2019Updated 6 years ago
- An archive of the challenges found in the Blackhat MEA 2024 Qualifiers CTF☆11Sep 2, 2024Updated last year
- Puppet Guide☆11Jan 2, 2022Updated 4 years ago
- ☆11May 22, 2021Updated 4 years ago
- ☆11Sep 30, 2020Updated 5 years ago
- Wrapper for TSK (Sleuth Kit) Bindings☆12Jan 10, 2023Updated 3 years ago
- LyraX kde is a light clean theme for KDE Plasma desktop.☆12Jun 6, 2022Updated 3 years ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago
- ☆11Aug 21, 2023Updated 2 years ago
- Cache it your way! Record your computers audio output to an audio library.☆10Aug 25, 2020Updated 5 years ago
- ☆10Dec 17, 2020Updated 5 years ago
- ☆10Jan 18, 2021Updated 5 years ago
- Experimentos com flask☆11Jan 29, 2023Updated 3 years ago
- Make ASCII art on your Github profile page !☆10Apr 25, 2016Updated 9 years ago
- Type-safe PubSub wrapper for GraphQL subscriptions☆14Feb 22, 2022Updated 4 years ago
- List of links and resources referred to in my SANS OSINT Summit 2024 Talk "OSINT On The Russian Internet"☆11Feb 29, 2024Updated 2 years ago
- Malicious traffic detection system☆11Nov 2, 2022Updated 3 years ago
- A tool for patching/injecting code into elf binaries.☆14Sep 27, 2012Updated 13 years ago
- An opinionated way to deploy a Kubernetes cluster on top of an OpenStack cloud.☆13Aug 9, 2018Updated 7 years ago
- Script Center for System Center Configuration Manager☆12Jul 20, 2023Updated 2 years ago
- Stream Processing Example using Spring Boot, Spring Cloud Stream, EKS, Kinesis Data Streams, Kinesis Data Analytics☆10Nov 28, 2020Updated 5 years ago
- Pop Os dotfiles☆10Mar 18, 2023Updated 2 years ago