Repositorio de ciberseguridad aeroespacial en español
☆25Jan 10, 2025Updated last year
Alternatives and similar repositories for AeroSpace-Cybersecurity--ESP
Users that are interested in AeroSpace-Cybersecurity--ESP are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Heramineta de analisis en red☆11Feb 13, 2023Updated 3 years ago
- Enumerate your Kubernetes cluster with just 1 command☆11Apr 10, 2026Updated last month
- Simple netcat wrote in C☆15Jun 25, 2025Updated 10 months ago
- Este proyecto implementa un poderoso túnel SSH totalmente anónimo utilizando la red Tor y múltiples proxies intermedios. Permite enrutar …☆13Aug 17, 2023Updated 2 years ago
- Os comparto mis apuntes de hackign en MarkDown☆31Sep 26, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Sencillo script para identificar los puertos abiertos de una dirección IP.☆18Jan 20, 2023Updated 3 years ago
- The Shodan MCP Server by ADEO Cybersecurity Services provides cybersecurity professionals with streamlined access to Shodan's powerful re…☆20Mar 22, 2025Updated last year
- ShadowDropper is a utility for covertly delivering and executing payloads on a target system.☆27Jul 4, 2025Updated 10 months ago
- A PoC C2 implementation that uses Native Messaging API to execute direct commands in the OS☆17Nov 5, 2025Updated 6 months ago
- Script que automatiza ciertas comprobaciones para escalar privilegios en Linux☆20Oct 23, 2024Updated last year
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆24Nov 12, 2024Updated last year
- Notes and resources for the AD☆11Aug 2, 2022Updated 3 years ago
- ☆24Dec 9, 2020Updated 5 years ago
- Herramienta de extracción de exploits desde Shodan Exploits para facilitar la búsqueda de vulnerabilidades conocidas. 👁☆41Sep 20, 2025Updated 8 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- BOF to impersonate TrustedInstaller via DISM API trigger and thread impersonation☆129Mar 27, 2026Updated last month
- Tool for WPA Enterprise hacking☆18Feb 24, 2024Updated 2 years ago
- A file watcher system written in Rust.☆21Jun 18, 2023Updated 2 years ago
- ☆18Dec 23, 2024Updated last year
- Minimalist Custom .NET Core Garbage Collector☆23Jun 15, 2020Updated 5 years ago
- A structured red-team prompt for generating ethical hacking tools using AI - designed for use in labs, CTFs, and authorized security asse…☆28Jun 26, 2025Updated 10 months ago
- DefCon Red Team Village 2023 Workshop on DLL Sideloading☆19Aug 15, 2023Updated 2 years ago
- Collection of images and examples to use with Shoggoth.☆19Aug 24, 2020Updated 5 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24May 8, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Ip-Recon is a python powerful reconnaissance tool for retrieving ip address information by using Geo.ipfy API, it developed for termux a…☆38Jul 13, 2024Updated last year
- The Dumb Network Fuzzer☆21Jul 18, 2023Updated 2 years ago
- Chameleon is a polymorphic engine for x86_64 position independent shellcode that has been created out of the need to evade signature-base…☆48Oct 3, 2025Updated 7 months ago
- Sencilla Herramienta la cual usa 2 tipos de técnicas para Desconectar a dispositivos conectados a una red por tiempo ilimitado. Herramien…☆66Aug 25, 2023Updated 2 years ago
- Red Team Scaner☆62Mar 28, 2026Updated last month
- A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯☆38Dec 13, 2020Updated 5 years ago
- A powerful Go-based multi-shell handler for managing multiple reverse shell connections simultaneously with features like shell type dete…☆68Feb 23, 2026Updated 2 months ago
- A Proof-of-Concept using Cache Smuggling + Exif data to passively download a second stage payload☆50Oct 28, 2025Updated 6 months ago
- ☆78Jan 1, 2026Updated 4 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- React2Shell Auto Exploit: A CLI tool to exploit prototype pollution vulnerabilities (RCE) in React Server Actions☆59Dec 6, 2025Updated 5 months ago
- Vault de Obsidian Apuntes BSCP (Suscribete a Kr4k3nEU chaval)☆22May 31, 2024Updated last year
- ADDVulcan 2020 Hack-A-Sat writeups☆29Mar 8, 2023Updated 3 years ago
- Dumps information about all the callback objects found in a dump file and the functions registered for them☆38Oct 21, 2020Updated 5 years ago
- Bash script to manage insecure web apps using docker and hosts aliases for pentest practice☆38Jan 3, 2026Updated 4 months ago
- Sliver agents for Mythic☆48Nov 18, 2024Updated last year
- Fedora Security Lab - The Fedora Security Lab (FSL) provides a safe test environment to work on security auditing, forensics, system resc…☆41Aug 6, 2024Updated last year