pale-shadow / 1337-Noms-The-Hacker-CookbookView external linksLinks
food food food
☆239Nov 20, 2025Updated 2 months ago
Alternatives and similar repositories for 1337-Noms-The-Hacker-Cookbook
Users that are interested in 1337-Noms-The-Hacker-Cookbook are comparing it to the libraries listed below
Sorting:
- Tools and library to manipulate EFI variables.☆10Jan 16, 2026Updated last month
- Repo for MIRR Workshop Heroku app☆52Apr 25, 2020Updated 5 years ago
- Materials from my Circle City Con talk: Fantastic OSINT (and where to find it)☆23Jul 1, 2016Updated 9 years ago
- Modular tool to test exfiltration techniques.☆37Apr 27, 2017Updated 8 years ago
- This is a list of Computer and Network Security Axioms☆30May 1, 2020Updated 5 years ago
- PoC for an adaptive parallelised DNS prober☆44Oct 4, 2017Updated 8 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Jun 6, 2017Updated 8 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Oct 14, 2020Updated 5 years ago
- Malware Classifier From Network Captures☆82Jan 27, 2017Updated 9 years ago
- Damn vulnerable linux device driver for people to play with.☆28Feb 25, 2020Updated 5 years ago
- a python-based netstat equivalent☆34Jan 12, 2018Updated 8 years ago
- docker based telnet honeypot☆80Feb 19, 2018Updated 7 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 11 years ago
- DCZia Defcon 28 Badge - 2020 #badgelife☆22Aug 12, 2020Updated 5 years ago
- Attacks against weak 802.11 Random Number Generators☆24Feb 8, 2017Updated 9 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Oct 31, 2017Updated 8 years ago
- Cleans out "open" wireless connections from OSX machine☆154Jul 2, 2020Updated 5 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,037May 27, 2020Updated 5 years ago
- ☆22Sep 27, 2017Updated 8 years ago
- Just a dumping ground of random gnuradio stuff☆23Apr 25, 2016Updated 9 years ago
- Scripts and parsers to facilitate data visualization with various tools.☆21May 3, 2015Updated 10 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Netwitness Maltego integration Project☆18May 9, 2017Updated 8 years ago
- CTF Writeups☆10Nov 7, 2016Updated 9 years ago
- Security Onion Splunk App☆10May 18, 2015Updated 10 years ago
- A simple tool for bulk adding/updating/removing tags from AWS resources.☆13Jan 8, 2016Updated 10 years ago
- Anatomy of a linux kernel development☆27Mar 30, 2017Updated 8 years ago
- Git module to prevent from committing sensitive information into the repository.☆43Aug 20, 2019Updated 6 years ago
- Generate vulnerable virtual machines on the fly (current team development is taking place in the cliffe/SecGen fork)☆316Apr 18, 2019Updated 6 years ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Mar 11, 2013Updated 12 years ago
- Linux assembly programs☆17Updated this week
- Useful Powershell modules.☆11Mar 10, 2017Updated 8 years ago
- /ˈhäjˌpäj/ "a confused mixture."☆13Updated this week
- Random experiments in C☆15Sep 30, 2020Updated 5 years ago
- Technical add-on to ingest json formatted volatility memory analysis plugin outputs☆13May 21, 2018Updated 7 years ago
- Tools to measure the maturity of Enterprise Security Architecture processes☆13Sep 22, 2017Updated 8 years ago
- Decrypts Cisco VPN Group Passwords☆18Jan 20, 2012Updated 14 years ago
- Security Product Taskbar Icons (to identify from screenshots)☆58Mar 27, 2020Updated 5 years ago