A powerful and flexible Python-based network scanning framework. Inspired by Nmap, designed to combine simplicity and effectiveness for both Local Network Scanning, Deep Target Host Analysis and Camera/CCTV
☆32Nov 30, 2025Updated 3 months ago
Alternatives and similar repositories for NetSweep
Users that are interested in NetSweep are comparing it to the libraries listed below
Sorting:
- A Python-based tool for analyzing IoT firmware, supporting both filesystem-based and RTOS-based (e.g. FreeRTOS, Zephyr) images. Features …☆19Apr 25, 2025Updated 10 months ago
- A simple binary vulnerability scanner module for Linux that statically analyzes ELF binary files to identify potential vulnerabilities.☆18Jun 29, 2025Updated 8 months ago
- CTF Scoreboard Archive is a web app for storing and displaying CTF scoreboards, supporting links (CTFd, rCTF), MHTML uploads, and GIF gen…☆12Oct 28, 2024Updated last year
- This project detects malicious or abnormal traffic in industrial control networks, visualizes network topology, and identifies compromise…☆14Mar 21, 2025Updated 11 months ago
- Bài tập lớn IT3180 - Nhập môn Công nghệ phần mềm - Chủ đề Quản lý thu phí đóng góp của Tổ dân phố☆12Jan 12, 2024Updated 2 years ago
- School Project for Course "System Programming"☆15Jan 16, 2022Updated 4 years ago
- CTFd plugin allowing for individual Docker containers per team☆22Jan 15, 2026Updated last month
- National Graduation Exam Score from 2022 to 2024☆11Jul 17, 2024Updated last year
- Things help you get started with Java Vulnerability☆75Feb 26, 2023Updated 3 years ago
- A Windows kernel driver unit testing framework. Provides a macro free modern cpp syntax. Includes tools for automatic running on your vm.☆11May 15, 2023Updated 2 years ago
- 999% powerfull ast obf by ngocuyencoder☆16May 19, 2025Updated 9 months ago
- Binary exploitation exercises and scripts☆12Mar 15, 2022Updated 3 years ago
- Demonstrate the behavior of the tunnel cache on Windows☆11Aug 13, 2019Updated 6 years ago
- ☆11Aug 4, 2023Updated 2 years ago
- Hot reload DLL on windows☆11Oct 7, 2018Updated 7 years ago
- ☆45Jan 12, 2026Updated last month
- ☆10Sep 24, 2023Updated 2 years ago
- A tool is used to infected a shellcode to PE file, the shellcode is packed at compile time and unpacked at runtime☆13Jul 16, 2020Updated 5 years ago
- HEVD Exploit: BufferOverflowNonPagedPoolNx on Windows 10 22H2 - Escalating from Low Integrity to SYSTEM via Aligned Chunk Confusion☆65Apr 22, 2025Updated 10 months ago
- Qiling Framework Documentation☆18Mar 9, 2025Updated 11 months ago
- Qiling Advanced Binary Emulation framework☆12Aug 22, 2019Updated 6 years ago
- Change the entry point of Windows PE file and inject a dynamic library, in order to crack software of fix games.☆10Jun 11, 2021Updated 4 years ago
- Pentest Q&A trick written in Vietnamese☆11May 16, 2019Updated 6 years ago
- A malware scanner with Yara and ClamAV binding☆12Apr 16, 2025Updated 10 months ago
- Challenges for ImaginaryCTF 2025☆25Sep 7, 2025Updated 5 months ago
- ☆12Aug 3, 2025Updated 7 months ago
- *This is only for educational purposes, I'm not responsible for anything whatsoever made using those actually malicious software* A malwa…☆13Nov 7, 2021Updated 4 years ago
- A mini project for Fundamentals of Optimization course of SoICT - HUST☆17Jun 6, 2023Updated 2 years ago
- [ICSE'24] An Empirical Study of Data Disruption by Ransomware Attacks☆14Mar 1, 2024Updated 2 years ago
- ☆35Oct 6, 2025Updated 4 months ago
- 🪲 A list of malware and benign datasets for malware research☆32Jan 31, 2026Updated last month
- Python script to decrypt Synology .pat files☆31Mar 26, 2025Updated 11 months ago
- Template for graduate thesis, especially in FPT University☆19Nov 21, 2024Updated last year
- Procmonel is Procmon like monitoring system implemented using Microsoft WDK☆12Dec 25, 2019Updated 6 years ago
- Biometric system that can recognize users using photos of their irides. Based on ResNet50.☆23Jun 16, 2020Updated 5 years ago
- Malicious PowerShell Dataset☆24Aug 8, 2023Updated 2 years ago
- NapierOne. A Publicly Available Modern Mixed File Data Set. The data set is suitable for a variety of testing scenarios such as Ransomwar…☆22Jan 25, 2022Updated 4 years ago
- Windows Minifilter driver that redirects any I/O Request of mp3 files to a target file☆18Jul 7, 2015Updated 10 years ago
- CVE-2023-4911☆17Oct 11, 2023Updated 2 years ago