Materials from the previous MCC trainers
☆18Jan 16, 2026Updated 2 months ago
Alternatives and similar repositories for MCC
Users that are interested in MCC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A project aims to make public transportation in the Klang Valley more accessible to everyone, including tourists.☆21Feb 24, 2026Updated last month
- These are the notes i have been taking since i started learning about ethical hacking and cybersecurity☆24Oct 16, 2023Updated 2 years ago
- LEKIR - Vulnerable by design to help people learn about common web security☆30Mar 9, 2026Updated 2 weeks ago
- CraftCMS RCE Checker (CVE-2025-32432)☆10Apr 27, 2025Updated 10 months ago
- ☆23Jul 18, 2023Updated 2 years ago
- GDBP-PEDA Cheat Sheet☆16Feb 14, 2017Updated 9 years ago
- Challenge handouts, source code, and solutions for UofTCTF 2026☆42Jan 13, 2026Updated 2 months ago
- CVE-2023-1671-POC, based on dnslog platform☆17Apr 26, 2023Updated 2 years ago
- # Keylogger-BOF☆37Mar 13, 2026Updated last week
- ☆61Feb 12, 2026Updated last month
- ☆34Jun 11, 2024Updated last year
- A tool for patching/injecting code into elf binaries.☆14Sep 27, 2012Updated 13 years ago
- General purpose attack-defense range for zero-config deployment☆44Nov 20, 2025Updated 4 months ago
- Converts a string country code to an emoji in Go.☆22Apr 11, 2021Updated 4 years ago
- CTFs solve scripts☆20Jan 9, 2026Updated 2 months ago
- HITB SECCONF EDU CTF 2021. Developed with ❤️ by Hackerdom team and HITB.☆19Aug 28, 2021Updated 4 years ago
- ☆22Dec 16, 2023Updated 2 years ago
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆23Jun 22, 2021Updated 4 years ago
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆13May 28, 2025Updated 9 months ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 5 months ago
- Digital forensics for Google Drive—done right. Identify, preserve, and document cloud evidence with hash verification, timeline reconstru…☆26Dec 8, 2025Updated 3 months ago
- Template for creating Go Edge, BFF, Microservice use case☆24Sep 17, 2025Updated 6 months ago
- Nmap script to check vulnerability CVE-2021-21972☆28Mar 3, 2021Updated 5 years ago
- DLL Malware for Signal Desktop. Now utilizes missing dbghelp.dll since Signal patched cryptbase.☆14Jan 24, 2025Updated last year
- https://academy.tcm-sec.com/☆14Aug 19, 2025Updated 7 months ago
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- LyraX kde is a light clean theme for KDE Plasma desktop.☆12Jun 6, 2022Updated 3 years ago
- ☆19Apr 28, 2025Updated 10 months ago
- ZoomBotC2 is a stealthy Command and Control (C2) framework that leverages Zoom's API endpoints for covert communication between implants …☆56Jun 30, 2025Updated 8 months ago
- ☆53Jun 28, 2025Updated 8 months ago
- Python tool to parse and decrypt files quarantined by windows defender☆13Feb 25, 2023Updated 3 years ago
- my beautiful page <3☆20Feb 22, 2026Updated last month
- ☆25Mar 3, 2026Updated 3 weeks ago
- This repository contains a basic custom lab environment designed to demonstrate and explore SQL injection vulnerabilities. The lab provid…☆10Sep 20, 2023Updated 2 years ago
- Detection of malicious data exfiltration over DNS using Machine Learning techniques