Repositorio de ciberseguridad aeroespacial en español
☆25Jan 10, 2025Updated last year
Alternatives and similar repositories for AeroSpace-Cybersecurity--ESP
Users that are interested in AeroSpace-Cybersecurity--ESP are comparing it to the libraries listed below
Sorting:
- Heramineta de analisis en red☆11Feb 13, 2023Updated 3 years ago
- Enumerate your Kubernetes cluster with just 1 command☆11Feb 25, 2026Updated last week
- A PoC C2 implementation that uses Native Messaging API to execute direct commands in the OS☆17Nov 5, 2025Updated 4 months ago
- ShadowDropper is a utility for covertly delivering and executing payloads on a target system.☆27Jul 4, 2025Updated 8 months ago
- Simple netcat wrote in C☆16Jun 25, 2025Updated 8 months ago
- The Shodan MCP Server by ADEO Cybersecurity Services provides cybersecurity professionals with streamlined access to Shodan's powerful re…☆20Mar 22, 2025Updated 11 months ago
- Tool for WPA Enterprise hacking☆17Feb 24, 2024Updated 2 years ago
- Notes and resources for the AD☆11Aug 2, 2022Updated 3 years ago
- ☆14Oct 24, 2023Updated 2 years ago
- [ICFEM2017 / IEEE Transactions on Reliability] Learning Type for Binary / Type Learning for Binaries and its Applications☆15Sep 14, 2018Updated 7 years ago
- Code & other materials from SEC-T 2022 talk "When SysAdmin & Hacker Unite: 21 One-Liners to make you convert from bash to Powershell"☆16Sep 17, 2022Updated 3 years ago
- Code for the paper "A Lightweight Framework for Function Name Reassignment Based on Large-Scale Stripped Binaries"☆15Jul 3, 2021Updated 4 years ago
- Este proyecto implementa un poderoso túnel SSH totalmente anónimo utilizando la red Tor y múltiples proxies intermedios. Permite enrutar …☆13Aug 17, 2023Updated 2 years ago
- Sencillo script para identificar los puertos abiertos de una dirección IP.☆18Jan 20, 2023Updated 3 years ago
- A structured red-team prompt for generating ethical hacking tools using AI - designed for use in labs, CTFs, and authorized security asse…☆25Jun 26, 2025Updated 8 months ago
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆24Nov 12, 2024Updated last year
- ☆18Dec 23, 2024Updated last year
- DefCon Red Team Village 2023 Workshop on DLL Sideloading☆19Aug 15, 2023Updated 2 years ago
- Vault de Obsidian Apuntes BSCP (Suscribete a Kr4k3nEU chaval)☆20May 31, 2024Updated last year
- ☆53Updated this week
- Script que automatiza ciertas comprobaciones para escalar privilegios en Linux☆20Oct 23, 2024Updated last year
- Chameleon is a polymorphic engine for x86_64 position independent shellcode that has been created out of the need to evade signature-base…☆48Oct 3, 2025Updated 5 months ago
- Supplementary Material for XFL☆19Nov 30, 2025Updated 3 months ago
- Challenges where you can practice heap tecnics☆24Nov 18, 2017Updated 8 years ago
- A powerful Go-based multi-shell handler for managing multiple reverse shell connections simultaneously with features like shell type dete…☆66Feb 23, 2026Updated 2 weeks ago
- Bash script to manage insecure web apps using docker and hosts aliases for pentest practice☆38Jan 3, 2026Updated 2 months ago
- Official implementation of AsmDepictor, "A Transformer-based Function Symbol Name Inference Model from an Assembly Language for Binary Re…☆29Apr 30, 2024Updated last year
- CONCOCTION is an automated machine learning-based vulnerability detection framework that combines static source code information and dyna…☆27Aug 18, 2024Updated last year
- A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯☆38Dec 13, 2020Updated 5 years ago
- ☆75Jan 1, 2026Updated 2 months ago
- A quick and dirty (and a little shitty) burp extension that uses cheap deepseek api to send request and response and maybe found somethin…☆34Jan 26, 2025Updated last year
- Sliver agents for Mythic☆48Nov 18, 2024Updated last year
- Interract with Microsoft SQL Server (MS SQL | MSSQL) servers and their linked instances in restricted environments, without the need for …☆53Updated this week
- A cheat sheet that contains common enumeration and attack methods for Mail Server.☆41Oct 18, 2022Updated 3 years ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Apr 23, 2024Updated last year
- Notes, Lab Commands and Vulnerability Information for BSCP Exam Prep☆51Jun 7, 2023Updated 2 years ago
- Labs & Code snippets for RRT on TTI☆40Nov 16, 2022Updated 3 years ago
- ☆42Sep 19, 2021Updated 4 years ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆55Mar 8, 2025Updated last year