☆223Jun 18, 2021Updated 4 years ago
Alternatives and similar repositories for NSA-Linux-Hardening-docs
Users that are interested in NSA-Linux-Hardening-docs are comparing it to the libraries listed below
Sorting:
- SSH Backdoor for android☆12Oct 4, 2024Updated last year
- ☆55Oct 12, 2024Updated last year
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆25Apr 19, 2023Updated 2 years ago
- This is a working variant of the Mirai IOT botnet☆15Nov 22, 2022Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- Google Dorking Payloads☆12Jun 24, 2024Updated last year
- A collection of bookmarks for penetration testers, bug bounty hunters, malware developers, reverse engineers and anyone who is just inte…☆917Aug 30, 2023Updated 2 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Jan 12, 2026Updated last month
- some AV / EDR / analysis studies☆10May 21, 2023Updated 2 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- CVE-2023-20273 Exploit PoC☆14Apr 1, 2024Updated last year
- this is a bot that will get the correct answers right at least 90% of the time on edgenuity. edgenuity is a common site used for middle s…☆14Jun 28, 2021Updated 4 years ago
- notepad++堆缓冲区溢出漏洞CVE-2023-40031 分析与复现☆15Sep 8, 2023Updated 2 years ago
- Maltego Transforms for generating screenshots from Websites and URLs☆16Apr 24, 2023Updated 2 years ago
- EduRansW (Vulnransomware) An safe-to-use vulnerable ransomware designed to learn about reversing and exploitation of basic ransomware vri…☆13May 22, 2025Updated 9 months ago
- ☆16Oct 18, 2024Updated last year
- Python bindings for BochsCPU☆38Aug 10, 2025Updated 6 months ago
- Rust Weaponization for Red Team Engagements.☆28Nov 8, 2022Updated 3 years ago
- ☆86Jan 9, 2023Updated 3 years ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆139Jul 27, 2023Updated 2 years ago
- VM Escape for Parallels Desktop <18.1.1☆37May 7, 2023Updated 2 years ago
- ☆19Jan 31, 2023Updated 3 years ago
- ☆18Nov 16, 2024Updated last year
- SymFusion: Hybrid Instrumentation for Concolic Execution☆18May 5, 2023Updated 2 years ago
- Directory/file & DNS busting tool written in Go☆14Nov 26, 2019Updated 6 years ago
- RTAA-72, is CVCIO's real-time intelligence dashboard for Twitter☆21Sep 4, 2022Updated 3 years ago
- Proof-of-concept implementation for the paper "Hammulator: Simulate Now - Exploit Later" (DRAMSec 2023)☆17Sep 15, 2025Updated 5 months ago
- ☆22Feb 3, 2026Updated last month
- ☆15Aug 28, 2014Updated 11 years ago
- "ImpELF: A Python-based ELF hashing utility that generates unique fingerprints for ELF binaries using their imported functions and librar…☆15Dec 26, 2023Updated 2 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.