☆47Mar 28, 2017Updated 9 years ago
Alternatives and similar repositories for security
Users that are interested in security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Feb 26, 2026Updated 2 months ago
- ☆139May 17, 2017Updated 8 years ago
- A list of collected articles and resources from the website Peerlyst☆17Dec 14, 2016Updated 9 years ago
- ☆12Jan 21, 2019Updated 7 years ago
- Files and Folders list used in file enumeration during Bug Bounty☆12Oct 16, 2020Updated 5 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆13Mar 7, 2025Updated last year
- CVE-2020-8515-PoC☆14Mar 30, 2020Updated 6 years ago
- S2-057 poc test☆13Aug 31, 2018Updated 7 years ago
- PowerShell tool to triage systems☆12May 17, 2023Updated 2 years ago
- ☆22Aug 28, 2025Updated 8 months ago
- ☆32Oct 21, 2023Updated 2 years ago
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆20May 15, 2025Updated 11 months ago
- Script(s) to assist with the setup of various tools on a Windows 11/10 VM, in preparation for Corelan Training☆39May 2, 2026Updated last week
- Notes of my OSCP study plan☆467Jun 29, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Python template to assist with buffer overflows☆73Nov 12, 2019Updated 6 years ago
- Machine Learning basics with phishing dataset☆10Apr 19, 2021Updated 5 years ago
- Exploits a stack buffer overflow in AT-TFTP v1.9, by sending a request (get/write) for an overly long file name.☆11Jun 22, 2015Updated 10 years ago
- This code bypass AMSI by setting JE instruction to JNE in assembly of amsi.dll file☆37Mar 10, 2023Updated 3 years ago
- Collection of things made during my OSCP journey☆954Feb 24, 2022Updated 4 years ago
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- ☆17Oct 25, 2018Updated 7 years ago
- Plattform to develop and experiment with existing java web attacks.☆31Jan 8, 2018Updated 8 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Stuff about it-security that might be good to know☆1,030Oct 28, 2023Updated 2 years ago
- Passwordless RDP Session Hijacking☆73Aug 28, 2021Updated 4 years ago
- Automatically generating WADL in Spring MVC REST application☆28Jul 7, 2022Updated 3 years ago
- Demo server for testing Java deserialization payloads☆15Sep 18, 2016Updated 9 years ago
- My linux config files☆10Apr 4, 2026Updated last month
- A collection of open source and commercial tools that aid in red team operations.☆13Jun 14, 2018Updated 7 years ago
- Basic Binary Exploitation / Buffer Overflows☆11Jun 11, 2017Updated 8 years ago
- ☆10Jun 9, 2021Updated 4 years ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- AntSword Generate Shell Plugin☆12Jun 26, 2022Updated 3 years ago
- ☆59Jan 27, 2021Updated 5 years ago
- Limit USB devices plugged to a linux host☆12Feb 12, 2018Updated 8 years ago
- An archive of everything related to OSCP☆637Sep 14, 2020Updated 5 years ago
- Docker image with ps4-exploit-host application☆10Mar 11, 2024Updated 2 years ago
- A modular framework and program for synchronous pwning with ssh, powered by Python 3, for educational and controlled penetration testing…☆10Sep 4, 2016Updated 9 years ago
- ☆12Jun 28, 2017Updated 8 years ago